mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3d570e8696
commit
452e95c734
@ -62,6 +62,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://evuln.com/vulns/6/summary.html"
|
"url": "http://evuln.com/vulns/6/summary.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "18268",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/18268"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "16106",
|
"name": "16106",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -71,11 +76,6 @@
|
|||||||
"name": "ADV-2006-0002",
|
"name": "ADV-2006-0002",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/0002"
|
"url": "http://www.vupen.com/english/advisories/2006/0002"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18268",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/18268"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "22412",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/22412"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22407",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/22407"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22405",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/22405"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22411",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/22411"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=382411&group_id=122682",
|
"name": "http://sourceforge.net/project/shownotes.php?release_id=382411&group_id=122682",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -63,9 +83,14 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/16273"
|
"url": "http://www.securityfocus.com/bid/16273"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-0231",
|
"name": "22404",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/0231"
|
"url": "http://www.osvdb.org/22404"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18459",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/18459"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "22403",
|
"name": "22403",
|
||||||
@ -73,29 +98,14 @@
|
|||||||
"url": "http://www.osvdb.org/22403"
|
"url": "http://www.osvdb.org/22403"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22404",
|
"name": "22410",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.osvdb.org/22404"
|
"url": "http://www.osvdb.org/22410"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22405",
|
"name": "ADV-2006-0231",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.osvdb.org/22405"
|
"url": "http://www.vupen.com/english/advisories/2006/0231"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "22406",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/22406"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "22407",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/22407"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "22408",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/22408"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "22409",
|
"name": "22409",
|
||||||
@ -103,24 +113,14 @@
|
|||||||
"url": "http://www.osvdb.org/22409"
|
"url": "http://www.osvdb.org/22409"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22410",
|
"name": "22406",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.osvdb.org/22410"
|
"url": "http://www.osvdb.org/22406"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22411",
|
"name": "22408",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.osvdb.org/22411"
|
"url": "http://www.osvdb.org/22408"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "22412",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/22412"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "22413",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/22413"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "22414",
|
"name": "22414",
|
||||||
@ -133,9 +133,9 @@
|
|||||||
"url": "http://www.osvdb.org/22415"
|
"url": "http://www.osvdb.org/22415"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "18459",
|
"name": "22413",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://secunia.com/advisories/18459"
|
"url": "http://www.osvdb.org/22413"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060204 PeopleSoft (Oracle) PSCipher Encryption Weakness",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/424086/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "16507",
|
"name": "16507",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "22952",
|
"name": "22952",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/22952"
|
"url": "http://www.osvdb.org/22952"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060204 PeopleSoft (Oracle) PSCipher Encryption Weakness",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/424086/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,26 +57,6 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/425936/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/425936/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.nsag.ru/vuln/953.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.nsag.ru/vuln/953.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "16797",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/16797"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-0717",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/0717"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18989",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/18989"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "485",
|
"name": "485",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
@ -86,6 +66,26 @@
|
|||||||
"name": "thebat-subject-bo(24882)",
|
"name": "thebat-subject-bo(24882)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24882"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24882"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "16797",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/16797"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18989",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/18989"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.nsag.ru/vuln/953.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.nsag.ru/vuln/953.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-0717",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/0717"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,60 +52,60 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060706 Mico crashes when contected with wrong IOR / DoS",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/439439/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20060709 Re: Mico crashes when contected with wrong IOR / DoS",
|
"name": "20060709 Re: Mico crashes when contected with wrong IOR / DoS",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/439606"
|
"url": "http://www.securityfocus.com/archive/1/439606"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20060710 Re: Mico crashes when contected with wrong IOR / DoS",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/439655/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060706 Mico crashes when contected with wrong IOR / DoS",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047708.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://mico.org/down.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://mico.org/down.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18869",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/18869"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-2709",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/2709"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "27029",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/27029"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20970",
|
"name": "20970",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/20970"
|
"url": "http://secunia.com/advisories/20970"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "18869",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/18869"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060706 Mico crashes when contected with wrong IOR / DoS",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047708.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060710 Re: Mico crashes when contected with wrong IOR / DoS",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/439655/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27029",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/27029"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1210",
|
"name": "1210",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/1210"
|
"url": "http://securityreason.com/securityalert/1210"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20060706 Mico crashes when contected with wrong IOR / DoS",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/439439/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://mico.org/down.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://mico.org/down.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "mico-setanswerinvoke-dos(27686)",
|
"name": "mico-setanswerinvoke-dos(27686)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27686"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27686"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-2709",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/2709"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "1984",
|
"name": "27031",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "OSVDB",
|
||||||
"url" : "https://www.exploit-db.com/exploits/1984"
|
"url": "http://www.osvdb.org/27031"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1985",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/1985"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1992",
|
"name": "1992",
|
||||||
@ -73,9 +68,14 @@
|
|||||||
"url": "http://www.rarlabs.com/rarnew.htm"
|
"url": "http://www.rarlabs.com/rarnew.htm"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "27031",
|
"name": "1984",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://www.osvdb.org/27031"
|
"url": "https://www.exploit-db.com/exploits/1984"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1985",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/1985"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,49 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060809 Multiple buffer-overflows in AlsaPlayer 0.99.76",
|
"name": "19450",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/442725/100/0/threaded"
|
"url": "http://www.securityfocus.com/bid/19450"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27883",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/27883"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1356",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/1356"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27885",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/27885"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27884",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/27884"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21749",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21749"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "alsaplayer-reconnect-bo(28306)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28306"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22018",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/22018"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20060809 Multiple buffer-overflows in AlsaPlayer 0.99.76",
|
"name": "20060809 Multiple buffer-overflows in AlsaPlayer 0.99.76",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0249.html"
|
"url": "http://www.securityfocus.com/archive/1/442725/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://aluigi.altervista.org/adv/alsapbof-adv.txt",
|
"name": "http://aluigi.altervista.org/adv/alsapbof-adv.txt",
|
||||||
@ -68,9 +103,9 @@
|
|||||||
"url": "http://aluigi.altervista.org/adv/alsapbof-adv.txt"
|
"url": "http://aluigi.altervista.org/adv/alsapbof-adv.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-1179",
|
"name": "21422",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.debian.org/security/2006/dsa-1179"
|
"url": "http://secunia.com/advisories/21422"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-200608-24",
|
"name": "GLSA-200608-24",
|
||||||
@ -83,54 +118,9 @@
|
|||||||
"url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
|
"url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "19450",
|
"name": "DSA-1179",
|
||||||
"refsource" : "BID",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://www.securityfocus.com/bid/19450"
|
"url": "http://www.debian.org/security/2006/dsa-1179"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-3235",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/3235"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "27883",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/27883"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "27884",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/27884"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "27885",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/27885"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21422",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21422"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21639",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21639"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "22018",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/22018"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21749",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21749"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1356",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/1356"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "alsaplayer-cddblookup-bo(28308)",
|
"name": "alsaplayer-cddblookup-bo(28308)",
|
||||||
@ -143,9 +133,19 @@
|
|||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28307"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28307"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "alsaplayer-reconnect-bo(28306)",
|
"name": "ADV-2006-3235",
|
||||||
"refsource" : "XF",
|
"refsource": "VUPEN",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28306"
|
"url": "http://www.vupen.com/english/advisories/2006/3235"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060809 Multiple buffer-overflows in AlsaPlayer 0.99.76",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0249.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21639",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21639"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060815 local file include in PHP-Nuke (autohtml.php)",
|
"name": "1398",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/443289/100/0/threaded"
|
"url": "http://securityreason.com/securityalert/1398"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.lezr.com/vb/showthread.php?p=104324",
|
"name": "http://www.lezr.com/vb/showthread.php?p=104324",
|
||||||
@ -67,15 +67,15 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/19525"
|
"url": "http://www.securityfocus.com/bid/19525"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1398",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/1398"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "phpnuke-autohtml-file-include(28388)",
|
"name": "phpnuke-autohtml-file-include(28388)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28388"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28388"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060815 local file include in PHP-Nuke (autohtml.php)",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/443289/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "2186",
|
"name": "spidey-blog-projegoster-sql-injection(28374)",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "XF",
|
||||||
"url" : "https://www.exploit-db.com/exploits/2186"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28374"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "19518",
|
"name": "19518",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://secunia.com/advisories/21482"
|
"url": "http://secunia.com/advisories/21482"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "spidey-blog-projegoster-sql-injection(28374)",
|
"name": "2186",
|
||||||
"refsource" : "XF",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28374"
|
"url": "https://www.exploit-db.com/exploits/2186"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2010-2749",
|
"ID": "CVE-2010-2749",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2010-2867",
|
"ID": "CVE-2010-2867",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20100824 TPTI-10-14: Adobe Shockwave Director rcsL Chunk Pointer Offset Remote Code Execution Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/513299/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14",
|
"name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14"
|
"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1024361",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1024361"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html",
|
"name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -72,15 +72,15 @@
|
|||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1024361",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1024361"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2010-2176",
|
"name": "ADV-2010-2176",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2010/2176"
|
"url": "http://www.vupen.com/english/advisories/2010/2176"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20100824 TPTI-10-14: Adobe Shockwave Director rcsL Chunk Pointer Offset Remote Code Execution Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/513299/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2010-2872",
|
"ID": "CVE-2010-2872",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20100824 ZDI-10-161: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability",
|
"name": "1024361",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/513306/100/0/threaded"
|
"url": "http://www.securitytracker.com/id?1024361"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-161",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-161"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html",
|
"name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html"
|
"url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-161",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-161"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:11889",
|
"name": "oval:org.mitre.oval:def:11889",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1024361",
|
"name": "20100824 ZDI-10-161: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securitytracker.com/id?1024361"
|
"url": "http://www.securityfocus.com/archive/1/513306/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2010-2176",
|
"name": "ADV-2010-2176",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2010-3034",
|
"ID": "CVE-2010-3034",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,11 +52,36 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "adselfservice-resetresult-security-bypass(65348)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65348"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "43241",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/43241"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2011-0392",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2011/0392"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20110210 CORE-2011-0103 - ZOHO ManageEngine ADSelfService multiple vulnerabilities",
|
"name": "20110210 CORE-2011-0103 - ZOHO ManageEngine ADSelfService multiple vulnerabilities",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/516396/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/516396/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "8089",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/8089"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "70869",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/70869"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities",
|
"name": "http://www.coresecurity.com/content/zoho-manageengine-vulnerabilities",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -66,31 +91,6 @@
|
|||||||
"name": "46331",
|
"name": "46331",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/46331"
|
"url": "http://www.securityfocus.com/bid/46331"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "70869",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/70869"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "43241",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/43241"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "8089",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/8089"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2011-0392",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/0392"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "adselfservice-resetresult-security-bypass(65348)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65348"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "VU#870532",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/870532"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
|
"name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html",
|
"name": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
|
"url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#870532",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/870532"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1024861",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1024861"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-282",
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-282",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -66,11 +71,6 @@
|
|||||||
"name": "69853",
|
"name": "69853",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/69853"
|
"url": "http://osvdb.org/69853"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1024861",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1024861"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-1082",
|
"ID": "CVE-2011-1082",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,21 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://openwall.com/lists/oss-security/2011/03/02/2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[linux-kernel] 20110205 [PATCH] epoll: Prevent deadlock through unsafe ->f_op->poll() calls.",
|
"name": "[linux-kernel] 20110205 [PATCH] epoll: Prevent deadlock through unsafe ->f_op->poll() calls.",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "https://lkml.org/lkml/2011/2/5/220"
|
"url": "https://lkml.org/lkml/2011/2/5/220"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=681575",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=681575"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll",
|
"name": "[oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://openwall.com/lists/oss-security/2011/03/02/1"
|
"url": "http://openwall.com/lists/oss-security/2011/03/02/1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://openwall.com/lists/oss-security/2011/03/02/2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e",
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -76,11 +81,6 @@
|
|||||||
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38",
|
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38"
|
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=681575",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=681575"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-1770",
|
"ID": "CVE-2011-1770",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,44 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[linux-kernel] 20110506 Re: [PATCH] dccp: handle invalid feature options length",
|
"name": "1025592",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://marc.info/?l=linux-kernel&m=130469305815140&w=2"
|
"url": "http://www.securitytracker.com/id?1025592"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[linux-kernel] 20110506 [PATCH] dccp: handle invalid feature options length",
|
"name": "[linux-kernel] 20110506 [PATCH] dccp: handle invalid feature options length",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://marc.info/?l=linux-kernel&m=130468845209036&w=2"
|
"url": "http://marc.info/?l=linux-kernel&m=130468845209036&w=2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.33/ChangeLog-2.6.33.14",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.33/ChangeLog-2.6.33.14"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=703011",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=703011"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2011-7551",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061366.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2011-7823",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "47769",
|
"name": "47769",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/47769"
|
"url": "http://www.securityfocus.com/bid/47769"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1025592",
|
"name": "[linux-kernel] 20110506 Re: [PATCH] dccp: handle invalid feature options length",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.securitytracker.com/id?1025592"
|
"url": "http://marc.info/?l=linux-kernel&m=130469305815140&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=703011",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=703011"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "44932",
|
"name": "44932",
|
||||||
@ -101,6 +86,21 @@
|
|||||||
"name": "8286",
|
"name": "8286",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/8286"
|
"url": "http://securityreason.com/securityalert/8286"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2011-7823",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061236.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.33/ChangeLog-2.6.33.14",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.33/ChangeLog-2.6.33.14"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2011-7551",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061366.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20110506 Security Advisory: DNS BIND Security Advisory: RRSIG Queries Can Trigger Server Crash When Using Response Policy Zones",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/517900/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.isc.org/CVE-2011-1907",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.isc.org/CVE-2011-1907"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "47734",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/47734"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1025503",
|
"name": "1025503",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1025503"
|
"url": "http://www.securitytracker.com/id?1025503"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2011-1183",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2011/1183"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "44416",
|
"name": "44416",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/44416"
|
"url": "http://secunia.com/advisories/44416"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2011-1183",
|
"name": "47734",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "BID",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/1183"
|
"url": "http://www.securityfocus.com/bid/47734"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.isc.org/CVE-2011-1907",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.isc.org/CVE-2011-1907"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20110506 Security Advisory: DNS BIND Security Advisory: RRSIG Queries Can Trigger Server Crash When Using Response Policy Zones",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/517900/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "iscbind-rrsig-dos(67297)",
|
"name": "iscbind-rrsig-dos(67297)",
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "18184",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/18184"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.security-assessment.com/files/documents/advisory/Final_Draft-Multiple_Stack_Buffer_Overflows.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.security-assessment.com/files/documents/advisory/Final_Draft-Multiple_Stack_Buffer_Overflows.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "50850",
|
"name": "50850",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -72,6 +62,16 @@
|
|||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/77454"
|
"url": "http://osvdb.org/77454"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "18184",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "http://www.exploit-db.com/exploits/18184"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.security-assessment.com/files/documents/advisory/Final_Draft-Multiple_Stack_Buffer_Overflows.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.security-assessment.com/files/documents/advisory/Final_Draft-Multiple_Stack_Buffer_Overflows.pdf"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "47044",
|
"name": "47044",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2014-3059",
|
"ID": "CVE-2014-3059",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2014-3355",
|
"ID": "CVE-2014-3355",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,25 +57,25 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata/cvrf/cisco-sa-20140924-metadata_cvrf.xml"
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata/cvrf/cisco-sa-20140924-metadata_cvrf.xml"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20140924 Cisco IOS Software Metadata Vulnerabilities",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "70130",
|
"name": "70130",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/70130"
|
"url": "http://www.securityfocus.com/bid/70130"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1030894",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1030894"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ciscoios-cve20143355-dos(96175)",
|
"name": "ciscoios-cve20143355-dos(96175)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96175"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96175"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20140924 Cisco IOS Software Metadata Vulnerabilities",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140924-metadata"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1030894",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1030894"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2014-3480",
|
"ID": "CVE-2014-3480",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,55 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[file] 20140612 file-5.19 is now available",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://mx.gw.com/pipermail/file/2014/001553.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.php.net/ChangeLog-5.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.php.net/ChangeLog-5.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugs.php.net/bug.php?id=67412",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugs.php.net/bug.php?id=67412"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT6443",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT6443"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://support.apple.com/HT204659",
|
"name": "https://support.apple.com/HT204659",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://support.apple.com/HT204659"
|
"url": "https://support.apple.com/HT204659"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
"name": "68238",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
"url": "http://www.securityfocus.com/bid/68238"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
|
"name": "RHSA-2014:1766",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-04-08-2",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2974",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-2974"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3021",
|
"name": "DSA-3021",
|
||||||
@ -113,39 +78,74 @@
|
|||||||
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SSRT101681",
|
"name": "https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382",
|
||||||
"refsource" : "HP",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
|
"url": "https://github.com/file/file/commit/40bade80cbe2af1d0b2cd0420cebd5d5905a2382"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2014:1765",
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2014:1766",
|
"name": "DSA-2974",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
|
"url": "http://www.debian.org/security/2014/dsa-2974"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2014:1236",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "68238",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/68238"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "59794",
|
"name": "59794",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/59794"
|
"url": "http://secunia.com/advisories/59794"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.php.net/ChangeLog-5.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.php.net/ChangeLog-5.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[file] 20140612 file-5.19 is now available",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://mx.gw.com/pipermail/file/2014/001553.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-04-08-2",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT6443",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT6443"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.php.net/bug.php?id=67412",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugs.php.net/bug.php?id=67412"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2014:1765",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT101681",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "59831",
|
"name": "59831",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/59831"
|
"url": "http://secunia.com/advisories/59831"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2014:1236",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/126645/BarracudaDrive-6.7.2-Cross-Site-Scripting.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/126645/BarracudaDrive-6.7.2-Cross-Site-Scripting.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "67428",
|
"name": "67428",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "58712",
|
"name": "58712",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/58712"
|
"url": "http://secunia.com/advisories/58712"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/126645/BarracudaDrive-6.7.2-Cross-Site-Scripting.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/126645/BarracudaDrive-6.7.2-Cross-Site-Scripting.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20140527 Fwd: [ruby-core:62800] [ruby-trunk - Bug #9709] Large string causes SEGV\twith x64-mingw32",
|
"name": "ruby-cve20143916-dos(93505)",
|
||||||
"refsource" : "MLIST",
|
"refsource": "XF",
|
||||||
"url" : "http://seclists.org/oss-sec/2014/q2/362"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93505"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20140529 Re: Fwd: [ruby-core:62800] [ruby-trunk - Bug #9709] Large string causes SEGV with x64-mingw32",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://seclists.org/oss-sec/2014/q2/375"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugs.ruby-lang.org/issues/9709",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://bugs.ruby-lang.org/issues/9709"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "67705",
|
"name": "67705",
|
||||||
@ -73,9 +63,19 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/67705"
|
"url": "http://www.securityfocus.com/bid/67705"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ruby-cve20143916-dos(93505)",
|
"name": "https://bugs.ruby-lang.org/issues/9709",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/93505"
|
"url": "https://bugs.ruby-lang.org/issues/9709"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140529 Re: Fwd: [ruby-core:62800] [ruby-trunk - Bug #9709] Large string causes SEGV with x64-mingw32",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://seclists.org/oss-sec/2014/q2/375"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140527 Fwd: [ruby-core:62800] [ruby-trunk - Bug #9709] Large string causes SEGV\twith x64-mingw32",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://seclists.org/oss-sec/2014/q2/362"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-7108",
|
"ID": "CVE-2014-7108",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "VU#582497",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "VU#352729",
|
"name": "VU#352729",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/352729"
|
"url": "http://www.kb.cert.org/vuls/id/352729"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#582497",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/582497"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-7555",
|
"ID": "CVE-2014-7555",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
"name": "VU#855825",
|
||||||
"refsource" : "MISC",
|
"refsource": "CERT-VN",
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
"url": "http://www.kb.cert.org/vuls/id/855825"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#855825",
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/855825"
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-7690",
|
"ID": "CVE-2014-7690",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
"name": "VU#894457",
|
||||||
"refsource" : "MISC",
|
"refsource": "CERT-VN",
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
"url": "http://www.kb.cert.org/vuls/id/894457"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#894457",
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/894457"
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20150110 Wordpress plugin Pods <= 2.4.3 XSS and CSRF vulnerabilities",
|
"name": "71996",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/534437/100/0/threaded"
|
"url": "http://www.securityfocus.com/bid/71996"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20150112 Wordpress plugin Pods <= 2.4.3 XSS and CSRF vulnerabilities",
|
"name": "20150112 Wordpress plugin Pods <= 2.4.3 XSS and CSRF vulnerabilities",
|
||||||
"refsource": "FULLDISC",
|
"refsource": "FULLDISC",
|
||||||
"url": "http://seclists.org/fulldisclosure/2015/Jan/26"
|
"url": "http://seclists.org/fulldisclosure/2015/Jan/26"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://wordpress.org/plugins/pods/changelog/",
|
"name": "https://wordpress.org/plugins/pods/changelog/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://wordpress.org/plugins/pods/changelog/"
|
"url": "https://wordpress.org/plugins/pods/changelog/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "71996",
|
"name": "http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/71996"
|
"url": "http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20150110 Wordpress plugin Pods <= 2.4.3 XSS and CSRF vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/534437/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2014-8222",
|
"ID": "CVE-2014-8222",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@ubuntu.com",
|
||||||
"ID": "CVE-2014-8399",
|
"ID": "CVE-2014-8399",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/desrt/systemd-shim/commit/d2e91c118f6128875274a638007702d1cc665893",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/desrt/systemd-shim/commit/d2e91c118f6128875274a638007702d1cc665893"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-2392-1",
|
"name": "USN-2392-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2392-1"
|
"url": "http://www.ubuntu.com/usn/USN-2392-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/desrt/systemd-shim/commit/d2e91c118f6128875274a638007702d1cc665893",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/desrt/systemd-shim/commit/d2e91c118f6128875274a638007702d1cc665893"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "DSA-3085",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2014/dsa-3085"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20141125 Re: WordPress 4.0.1 Security Release",
|
"name": "[oss-security] 20141125 Re: WordPress 4.0.1 Security Release",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -62,20 +67,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://core.trac.wordpress.org/changeset/30444"
|
"url": "https://core.trac.wordpress.org/changeset/30444"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://wordpress.org/news/2014/11/wordpress-4-0-1/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://wordpress.org/news/2014/11/wordpress-4-0-1/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://advisories.mageia.org/MGASA-2014-0493.html",
|
"name": "http://advisories.mageia.org/MGASA-2014-0493.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://advisories.mageia.org/MGASA-2014-0493.html"
|
"url": "http://advisories.mageia.org/MGASA-2014-0493.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-3085",
|
"name": "1031243",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-3085"
|
"url": "http://www.securitytracker.com/id/1031243"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MDVSA-2014:233",
|
"name": "MDVSA-2014:233",
|
||||||
@ -83,9 +83,9 @@
|
|||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1031243",
|
"name": "https://wordpress.org/news/2014/11/wordpress-4-0-1/",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1031243"
|
"url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://www.mantisbt.org/bugs/view.php?id=17890",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.mantisbt.org/bugs/view.php?id=17890"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/mantisbt/mantisbt/commit/511564cc",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/mantisbt/mantisbt/commit/511564cc"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "62101",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/62101"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT",
|
"name": "[oss-security] 20141201 CVE Request: Multiple XSS vulnerabilities in MantisBT",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -62,25 +77,10 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://seclists.org/oss-sec/2014/q4/902"
|
"url": "http://seclists.org/oss-sec/2014/q4/902"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://github.com/mantisbt/mantisbt/commit/511564cc",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/mantisbt/mantisbt/commit/511564cc"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.mantisbt.org/bugs/view.php?id=17890",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.mantisbt.org/bugs/view.php?id=17890"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-3120",
|
"name": "DSA-3120",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2015/dsa-3120"
|
"url": "http://www.debian.org/security/2015/dsa-3120"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "62101",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/62101"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,16 +57,16 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2016/03/21/1"
|
"url": "http://www.openwall.com/lists/oss-security/2016/03/21/1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-52774",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-52774"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://moodle.org/mod/forum/discuss.php?d=330180",
|
"name": "https://moodle.org/mod/forum/discuss.php?d=330180",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://moodle.org/mod/forum/discuss.php?d=330180"
|
"url": "https://moodle.org/mod/forum/discuss.php?d=330180"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-52774",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-52774"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1035333",
|
"name": "1035333",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -53,120 +53,15 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://git.openssl.org/?p=openssl.git;a=commit;h=07bed46f332fce8c1d157689a2cdf915a982ae34",
|
"name": "1036688",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://git.openssl.org/?p=openssl.git;a=commit;h=07bed46f332fce8c1d157689a2cdf915a982ae34"
|
"url": "http://www.securitytracker.com/id/1036688"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.splunk.com/view/SP-CAAAPSV",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.splunk.com/view/SP-CAAAPSV"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.splunk.com/view/SP-CAAAPUE",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.splunk.com/view/SP-CAAAPUE"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bto.bluecoat.com/security-advisory/sa132",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bto.bluecoat.com/security-advisory/sa132"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10171",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10171"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21995039",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21995039"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.tenable.com/security/tns-2016-16",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.tenable.com/security/tns-2016-16"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.android.com/security/bulletin/2017-03-01.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.android.com/security/bulletin/2017-03-01.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.tenable.com/security/tns-2016-20",
|
"name": "https://www.tenable.com/security/tns-2016-20",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://www.tenable.com/security/tns-2016-20"
|
"url": "https://www.tenable.com/security/tns-2016-20"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.tenable.com/security/tns-2016-21",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.tenable.com/security/tns-2016-21"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FreeBSD-SA-16:26",
|
|
||||||
"refsource" : "FREEBSD",
|
|
||||||
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1940",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1940.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:2185",
|
"name": "RHSA-2018:2185",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
@ -178,9 +73,14 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2018:2186"
|
"url": "https://access.redhat.com/errata/RHSA-2018:2186"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2018:2187",
|
"name": "http://www.splunk.com/view/SP-CAAAPUE",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2187"
|
"url": "http://www.splunk.com/view/SP-CAAAPUE"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "92557",
|
"name": "92557",
|
||||||
@ -193,9 +93,109 @@
|
|||||||
"url": "http://www.securitytracker.com/id/1037968"
|
"url": "http://www.securitytracker.com/id/1037968"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1036688",
|
"name": "RHSA-2016:1940",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.securitytracker.com/id/1036688"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1940.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.splunk.com/view/SP-CAAAPSV",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.splunk.com/view/SP-CAAAPSV"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21995039"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.tenable.com/security/tns-2016-16",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.tenable.com/security/tns-2016-16"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.tenable.com/security/tns-2016-21",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.tenable.com/security/tns-2016-21"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10171",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10171"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://git.openssl.org/?p=openssl.git;a=commit;h=07bed46f332fce8c1d157689a2cdf915a982ae34",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://git.openssl.org/?p=openssl.git;a=commit;h=07bed46f332fce8c1d157689a2cdf915a982ae34"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bto.bluecoat.com/security-advisory/sa132",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bto.bluecoat.com/security-advisory/sa132"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FreeBSD-SA-16:26",
|
||||||
|
"refsource": "FREEBSD",
|
||||||
|
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.android.com/security/bulletin/2017-03-01.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.android.com/security/bulletin/2017-03-01.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2018:2187",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2018:2187"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,45 +52,45 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20160330 CVE-2016-2385 Kamailio SEAS module heap buffer overflow",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/537926/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "39638",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/39638/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html",
|
"name": "http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html"
|
"url": "http://packetstormsecurity.com/files/136477/Kamailio-4.3.4-Heap-Overflow.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.kamailio.org/pub/kamailio/4.3.5/ChangeLog",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.kamailio.org/pub/kamailio/4.3.5/ChangeLog"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/kamailio/kamailio/commit/f50c9c853e7809810099c970780c30b0765b0643",
|
"name": "https://github.com/kamailio/kamailio/commit/f50c9c853e7809810099c970780c30b0765b0643",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/kamailio/kamailio/commit/f50c9c853e7809810099c970780c30b0765b0643"
|
"url": "https://github.com/kamailio/kamailio/commit/f50c9c853e7809810099c970780c30b0765b0643"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3535",
|
"name": "DSA-3535",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2016/dsa-3535"
|
"url": "http://www.debian.org/security/2016/dsa-3535"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "39638",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/39638/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3537",
|
"name": "DSA-3537",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2016/dsa-3537"
|
"url": "http://www.debian.org/security/2016/dsa-3537"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20160330 CVE-2016-2385 Kamailio SEAS module heap buffer overflow",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/537926/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.kamailio.org/pub/kamailio/4.3.5/ChangeLog",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.kamailio.org/pub/kamailio/4.3.5/ChangeLog"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20160819 Onapsis Security Advisory ONAPSIS-2016-027: SAP HANA User information disclosure",
|
"name": "92346",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "BID",
|
||||||
"url" : "http://seclists.org/fulldisclosure/2016/Aug/92"
|
"url": "http://www.securityfocus.com/bid/92346"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components",
|
"name": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components"
|
"url": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://www.onapsis.com/research/security-advisories/sap-hana-user-information-disclosure",
|
"name": "20160819 Onapsis Security Advisory ONAPSIS-2016-027: SAP HANA User information disclosure",
|
||||||
"refsource" : "MISC",
|
"refsource": "FULLDISC",
|
||||||
"url" : "https://www.onapsis.com/research/security-advisories/sap-hana-user-information-disclosure"
|
"url": "http://seclists.org/fulldisclosure/2016/Aug/92"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/138444/SAP-HANA-DB-1.00.091.00.1418659308-Information-Disclosure.html",
|
"name": "http://packetstormsecurity.com/files/138444/SAP-HANA-DB-1.00.091.00.1418659308-Information-Disclosure.html",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://packetstormsecurity.com/files/138444/SAP-HANA-DB-1.00.091.00.1418659308-Information-Disclosure.html"
|
"url": "http://packetstormsecurity.com/files/138444/SAP-HANA-DB-1.00.091.00.1418659308-Information-Disclosure.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "92346",
|
"name": "https://www.onapsis.com/research/security-advisories/sap-hana-user-information-disclosure",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/92346"
|
"url": "https://www.onapsis.com/research/security-advisories/sap-hana-user-information-disclosure"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-7757",
|
"ID": "CVE-2016-7757",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user