mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
fc9bf59a1b
commit
4601b5fb87
@ -57,15 +57,15 @@
|
||||
"refsource": "HP",
|
||||
"url": "http://packetstorm.securify.com/advisories/hpalert/008"
|
||||
},
|
||||
{
|
||||
"name" : "E-23",
|
||||
"refsource" : "CIAC",
|
||||
"url" : "http://ciac.llnl.gov/ciac/bulletins/e-23.shtml"
|
||||
},
|
||||
{
|
||||
"name": "hp-vue(2284)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/2284.php"
|
||||
},
|
||||
{
|
||||
"name": "E-23",
|
||||
"refsource": "CIAC",
|
||||
"url": "http://ciac.llnl.gov/ciac/bulletins/e-23.shtml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBUX9701-044",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/templates/advisory.html?id=1514"
|
||||
},
|
||||
{
|
||||
"name": "H-21",
|
||||
"refsource": "CIAC",
|
||||
"url": "http://ciac.llnl.gov/ciac/bulletins/h-21.shtml"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX9701-044",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/templates/advisory.html?id=1514"
|
||||
},
|
||||
{
|
||||
"name": "hp-glanceplus(2059)",
|
||||
"refsource": "XF",
|
||||
|
@ -57,41 +57,11 @@
|
||||
"refsource": "NTBUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/ntbugtraq/1998-1999/msg00371.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010117 Re: Invalid WINS entries",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://seclists.org/bugtraq/2001/Jan/0269.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010117 Invalid WINS entries",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://seclists.org/bugtraq/2001/Jan/0264.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010117 Re: Invalid WINS entries",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://seclists.org/bugtraq/2001/Jan/0276.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010117 Re: Invalid WINS entries",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://seclists.org/bugtraq/2001/Jan/0274.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010118 Re: Invalid WINS entries",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://seclists.org/bugtraq/2001/Jan/0289.html"
|
||||
},
|
||||
{
|
||||
"name": "20010118 Re: Invalid WINS entries",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://seclists.org/bugtraq/2001/Jan/0271.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010119 Re: Invalid WINS entries",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://seclists.org/bugtraq/2001/Jan/0298.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www2.sans.org/reading_room/whitepapers/win2k/185.php",
|
||||
"refsource": "MISC",
|
||||
@ -101,6 +71,36 @@
|
||||
"name": "2221",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2221"
|
||||
},
|
||||
{
|
||||
"name": "20010117 Invalid WINS entries",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://seclists.org/bugtraq/2001/Jan/0264.html"
|
||||
},
|
||||
{
|
||||
"name": "20010119 Re: Invalid WINS entries",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://seclists.org/bugtraq/2001/Jan/0298.html"
|
||||
},
|
||||
{
|
||||
"name": "20010117 Re: Invalid WINS entries",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://seclists.org/bugtraq/2001/Jan/0276.html"
|
||||
},
|
||||
{
|
||||
"name": "20010118 Re: Invalid WINS entries",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://seclists.org/bugtraq/2001/Jan/0289.html"
|
||||
},
|
||||
{
|
||||
"name": "20010117 Re: Invalid WINS entries",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://seclists.org/bugtraq/2001/Jan/0274.html"
|
||||
},
|
||||
{
|
||||
"name": "20010117 Re: Invalid WINS entries",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://seclists.org/bugtraq/2001/Jan/0269.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0223.html"
|
||||
},
|
||||
{
|
||||
"name" : "CSSA-2000-012.0",
|
||||
"refsource" : "CALDERA",
|
||||
"url" : "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2000-012.0.txt"
|
||||
},
|
||||
{
|
||||
"name": "1235",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1235"
|
||||
},
|
||||
{
|
||||
"name": "CSSA-2000-012.0",
|
||||
"refsource": "CALDERA",
|
||||
"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2000-012.0.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20000806 HPUX FTPd vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-08/0028.html"
|
||||
},
|
||||
{
|
||||
"name": "1560",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1560"
|
||||
},
|
||||
{
|
||||
"name": "20000806 HPUX FTPd vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -68,9 +68,9 @@
|
||||
"url": "http://www.debian.org/security/2000/20000910a"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2000:060",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2000-060.html"
|
||||
"name": "1624",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1624"
|
||||
},
|
||||
{
|
||||
"name": "CSSA-2000-031.0",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://www.calderasystems.com/support/security/advisories/CSSA-2000-031.0.txt"
|
||||
},
|
||||
{
|
||||
"name" : "1624",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/1624"
|
||||
"name": "RHSA-2000:060",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2000-060.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=100094373621813&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/5552251934afaa9585256c0000737a7f?OpenDocument&Highlight=0,AWHN4A8QWM",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/5552251934afaa9585256c0000737a7f?OpenDocument&Highlight=0,AWHN4A8QWM"
|
||||
},
|
||||
{
|
||||
"name": "VU#984555",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/984555"
|
||||
},
|
||||
{
|
||||
"name": "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/5552251934afaa9585256c0000737a7f?OpenDocument&Highlight=0,AWHN4A8QWM",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/5552251934afaa9585256c0000737a7f?OpenDocument&Highlight=0,AWHN4A8QWM"
|
||||
},
|
||||
{
|
||||
"name": "lotus-domino-information-disclosure(10685)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "2283",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2283"
|
||||
},
|
||||
{
|
||||
"name": "20070211 Re: mcRefer SQL injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "42619",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/42619"
|
||||
},
|
||||
{
|
||||
"name" : "2283",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/2283"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2007-1757",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,26 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3683",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3683"
|
||||
},
|
||||
{
|
||||
"name" : "23365",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23365"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1301",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1301"
|
||||
},
|
||||
{
|
||||
"name" : "34806",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/34806"
|
||||
},
|
||||
{
|
||||
"name": "24806",
|
||||
"refsource": "SECUNIA",
|
||||
@ -81,6 +61,26 @@
|
||||
"name": "eboard-member-file-include(33493)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33493"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1301",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1301"
|
||||
},
|
||||
{
|
||||
"name": "23365",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23365"
|
||||
},
|
||||
{
|
||||
"name": "34806",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34806"
|
||||
},
|
||||
{
|
||||
"name": "3683",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3683"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "38165",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/38165"
|
||||
},
|
||||
{
|
||||
"name": "20070921 greensql firewall permanent xss",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/480278/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.greensql.net/security",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.greensql.net/security"
|
||||
},
|
||||
{
|
||||
"name": "25767",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25767"
|
||||
},
|
||||
{
|
||||
"name" : "38165",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/38165"
|
||||
},
|
||||
{
|
||||
"name" : "38166",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/38166"
|
||||
"name": "http://www.greensql.net/security",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.greensql.net/security"
|
||||
},
|
||||
{
|
||||
"name": "greensql-adminpanel-xss(36749)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36749"
|
||||
},
|
||||
{
|
||||
"name": "38166",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/38166"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/481977/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "26009",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26009"
|
||||
},
|
||||
{
|
||||
"name": "45490",
|
||||
"refsource": "OSVDB",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "3217",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3217"
|
||||
},
|
||||
{
|
||||
"name": "26009",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26009"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.irmplc.com/index.php/111-Vendor-Alerts",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.irmplc.com/index.php/111-Vendor-Alerts"
|
||||
},
|
||||
{
|
||||
"name": "43742",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/43742"
|
||||
},
|
||||
{
|
||||
"name": "http://www.irmplc.com/index.php/111-Vendor-Alerts",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.irmplc.com/index.php/111-Vendor-Alerts"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2007-5607",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,44 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.csis.dk/dk/forside/CSIS-RI-0003.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.csis.dk/dk/forside/CSIS-RI-0003.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMA02326",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01422264"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT071490",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01422264"
|
||||
},
|
||||
{
|
||||
"name" : "VU#526131",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/526131"
|
||||
},
|
||||
{
|
||||
"name" : "29526",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29526"
|
||||
},
|
||||
{
|
||||
"name" : "29534",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29534"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-1740",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/1740/references"
|
||||
},
|
||||
{
|
||||
"name" : "1020165",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1020165"
|
||||
"name": "hp-instantsupport-registrystring-bo(42848)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42848"
|
||||
},
|
||||
{
|
||||
"name": "30516",
|
||||
@ -98,9 +63,44 @@
|
||||
"url": "http://secunia.com/advisories/30516"
|
||||
},
|
||||
{
|
||||
"name" : "hp-instantsupport-registrystring-bo(42848)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42848"
|
||||
"name": "HPSBMA02326",
|
||||
"refsource": "HP",
|
||||
"url": "http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01422264"
|
||||
},
|
||||
{
|
||||
"name": "29534",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29534"
|
||||
},
|
||||
{
|
||||
"name": "29526",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29526"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-1740",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1740/references"
|
||||
},
|
||||
{
|
||||
"name": "http://www.csis.dk/dk/forside/CSIS-RI-0003.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.csis.dk/dk/forside/CSIS-RI-0003.pdf"
|
||||
},
|
||||
{
|
||||
"name": "VU#526131",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/526131"
|
||||
},
|
||||
{
|
||||
"name": "1020165",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020165"
|
||||
},
|
||||
{
|
||||
"name": "SSRT071490",
|
||||
"refsource": "HP",
|
||||
"url": "http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01422264"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,44 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071101 SEC Consult SA-20071101-0 :: Multiple Vulnerabilities in SonicWALLSSL-VPN Client",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/483097/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.sec-consult.com/303.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.sec-consult.com/303.html"
|
||||
"name": "ADV-2007-3696",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3696"
|
||||
},
|
||||
{
|
||||
"name": "http://www.sec-consult.com/fileadmin/Advisories/20071101-0_sonicwall_multiple.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.sec-consult.com/fileadmin/Advisories/20071101-0_sonicwall_multiple.txt"
|
||||
},
|
||||
{
|
||||
"name": "3342",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3342"
|
||||
},
|
||||
{
|
||||
"name": "26288",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26288"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3696",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3696"
|
||||
},
|
||||
{
|
||||
"name": "27469",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27469"
|
||||
},
|
||||
{
|
||||
"name" : "3342",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3342"
|
||||
"name": "20071101 SEC Consult SA-20071101-0 :: Multiple Vulnerabilities in SonicWALLSSL-VPN Client",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/483097/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "sonicwall-webcachecleaner-file-delete(38221)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38221"
|
||||
},
|
||||
{
|
||||
"name": "http://www.sec-consult.com/303.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.sec-consult.com/303.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2007-5962",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,36 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080606 rPSA-2008-0185-1 vsftpd",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/493167/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "5814",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/5814"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20080521 Re: vsftpd CVE-2007-5962 (Red Hat / Fedora specific)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/05/21/10"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20080521 Re: vsftpd CVE-2007-5962 (Red Hat / Fedora specific)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/05/21/12"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20080521 vsftpd CVE-2007-5962 (Red Hat / Fedora specific)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/05/21/8"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=397011",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=397011"
|
||||
},
|
||||
{
|
||||
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0185",
|
||||
"refsource": "CONFIRM",
|
||||
@ -92,20 +62,60 @@
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00681.html"
|
||||
},
|
||||
{
|
||||
"name": "30341",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30341"
|
||||
},
|
||||
{
|
||||
"name": "5814",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5814"
|
||||
},
|
||||
{
|
||||
"name": "30354",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30354"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0295",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0295.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-4362",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00691.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20080521 Re: vsftpd CVE-2007-5962 (Red Hat / Fedora specific)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/05/21/10"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=397011",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=397011"
|
||||
},
|
||||
{
|
||||
"name": "vsftpd-denyfile-dos(42593)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42593"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-4373",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00699.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0295",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0295.html"
|
||||
"name": "ADV-2008-1600",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1600"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20080521 Re: vsftpd CVE-2007-5962 (Red Hat / Fedora specific)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/05/21/12"
|
||||
},
|
||||
{
|
||||
"name": "29322",
|
||||
@ -118,29 +128,19 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8850"
|
||||
},
|
||||
{
|
||||
"name" : "30354",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30354"
|
||||
"name": "[oss-security] 20080521 vsftpd CVE-2007-5962 (Red Hat / Fedora specific)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/05/21/8"
|
||||
},
|
||||
{
|
||||
"name" : "30341",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30341"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-1600",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/1600"
|
||||
"name": "20080606 rPSA-2008-0185-1 vsftpd",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/493167/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1020079",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1020079"
|
||||
},
|
||||
{
|
||||
"name" : "vsftpd-denyfile-dos(42593)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42593"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2009-2962",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478"
|
||||
"name": "http://blog.rubygems.org/2015/06/08/2.2.5-released.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blog.rubygems.org/2015/06/08/2.2.5-released.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/",
|
||||
@ -63,9 +63,14 @@
|
||||
"url": "https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/"
|
||||
},
|
||||
{
|
||||
"name" : "http://blog.rubygems.org/2015/06/08/2.2.5-released.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://blog.rubygems.org/2015/06/08/2.2.5-released.html"
|
||||
"name": "75431",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75431"
|
||||
},
|
||||
{
|
||||
"name": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.rubygems.org/2015/06/08/2.4.8-released.html",
|
||||
@ -77,20 +82,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/rubygems/rubygems/commit/5c7bfb5"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||
},
|
||||
{
|
||||
"name": "https://puppet.com/security/cve/CVE-2015-3900",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://puppet.com/security/cve/CVE-2015-3900"
|
||||
},
|
||||
{
|
||||
"name" : "75431",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/75431"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-4292",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150730 Cisco Prime Central Hosted Collaboration Solution Cross-Site Scripting Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=40214"
|
||||
},
|
||||
{
|
||||
"name": "1033172",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033172"
|
||||
},
|
||||
{
|
||||
"name": "20150730 Cisco Prime Central Hosted Collaboration Solution Cross-Site Scripting Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40214"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2015-4909",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -58,9 +58,14 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
|
||||
},
|
||||
{
|
||||
"name" : "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
|
||||
"name": "82990",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/82990"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2015-eb896290d3",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
|
||||
@ -73,19 +78,14 @@
|
||||
"url": "https://bto.bluecoat.com/security-advisory/sa128"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2015-eb896290d3",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
|
||||
"name": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201607-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201607-02"
|
||||
},
|
||||
{
|
||||
"name" : "82990",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/82990"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2015-8431",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "39054",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/39054/"
|
||||
},
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
|
||||
"name": "openSUSE-SU-2015:2239",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
|
||||
@ -73,39 +63,49 @@
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201601-03",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201601-03"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:2236",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:2247",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:2239",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html"
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html"
|
||||
},
|
||||
{
|
||||
"name": "78715",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/78715"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:2236",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:2247",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name": "1034318",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034318"
|
||||
},
|
||||
{
|
||||
"name": "39054",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/39054/"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201601-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201601-03"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1356",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-1361",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160311 Cisco Gigabit Switch Router 12000 Series Routers Denial of Service Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160311-gsr"
|
||||
},
|
||||
{
|
||||
"name": "1035314",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035314"
|
||||
},
|
||||
{
|
||||
"name": "20160311 Cisco Gigabit Switch Router 12000 Series Routers Denial of Service Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160311-gsr"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2016-1777",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1035342",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035342"
|
||||
},
|
||||
{
|
||||
"name": "85054",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/85054"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206173",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "APPLE-SA-2016-03-21-7",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "85054",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/85054"
|
||||
},
|
||||
{
|
||||
"name" : "1035342",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1035342"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2016-1827",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206564",
|
||||
"name": "https://support.apple.com/HT206567",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206564"
|
||||
"url": "https://support.apple.com/HT206567"
|
||||
},
|
||||
{
|
||||
"name": "90691",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/90691"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-05-16-4",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206566",
|
||||
@ -63,9 +73,24 @@
|
||||
"url": "https://support.apple.com/HT206566"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206567",
|
||||
"name": "APPLE-SA-2016-05-16-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206564",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206567"
|
||||
"url": "https://support.apple.com/HT206564"
|
||||
},
|
||||
{
|
||||
"name": "1035890",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035890"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-05-16-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206568",
|
||||
@ -76,31 +101,6 @@
|
||||
"name": "APPLE-SA-2016-05-16-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/May/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-05-16-2",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-05-16-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-05-16-4",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/May/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "90691",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/90691"
|
||||
},
|
||||
{
|
||||
"name" : "1035890",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1035890"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20160609 Re: CVE Request: wireshark releases",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/06/09/3"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12408",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12408"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/wireshark/wireshark/commit/b8e0d416898bb975a02c1b55883342edc5b4c9c0",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/wireshark/wireshark/commit/b8e0d416898bb975a02c1b55883342edc5b4c9c0"
|
||||
},
|
||||
{
|
||||
"name": "https://www.wireshark.org/security/wnpa-sec-2016-38.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.wireshark.org/security/wnpa-sec-2016-38.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160609 Re: CVE Request: wireshark releases",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/09/3"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/wireshark/wireshark/commit/b8e0d416898bb975a02c1b55883342edc5b4c9c0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/wireshark/wireshark/commit/b8e0d416898bb975a02c1b55883342edc5b4c9c0"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3615",
|
||||
"refsource": "DEBIAN",
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "40813",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/40813/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/CylanceVulnResearch/disclosures/blob/master/CLVA-2016-05-001.md",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/CylanceVulnResearch/disclosures/blob/master/CLVA-2016-05-001.md"
|
||||
},
|
||||
{
|
||||
"name" : "VU#603047",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/603047"
|
||||
"name": "40813",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/40813/"
|
||||
},
|
||||
{
|
||||
"name": "92216",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92216"
|
||||
},
|
||||
{
|
||||
"name": "VU#603047",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/603047"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-2226",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -58,15 +58,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name" : "103871",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/103871"
|
||||
},
|
||||
{
|
||||
"name": "1040700",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040700"
|
||||
},
|
||||
{
|
||||
"name": "103871",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103871"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,9 +62,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
"name": "1040695",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040695"
|
||||
},
|
||||
{
|
||||
"name": "103797",
|
||||
@ -72,9 +72,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/103797"
|
||||
},
|
||||
{
|
||||
"name" : "1040695",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040695"
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "Secure@Microsoft.com",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2019-0574",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -127,6 +127,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "106431",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106431"
|
||||
},
|
||||
{
|
||||
"name": "46160",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -136,11 +141,6 @@
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0574",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0574"
|
||||
},
|
||||
{
|
||||
"name" : "106431",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/106431"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "Secure@Microsoft.com",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2019-0582",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user