mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
1b774a3d61
commit
489a4a90ae
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-0426",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/0426"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23953",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/23953"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://modxcms.com/forums/index.php/topic,10470.0.html",
|
"name": "http://modxcms.com/forums/index.php/topic,10470.0.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,16 +76,6 @@
|
|||||||
"name": "22327",
|
"name": "22327",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/22327"
|
"url": "http://www.securityfocus.com/bid/22327"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-0426",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/0426"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "23953",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/23953"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,21 +57,11 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/3894"
|
"url": "https://www.exploit-db.com/exploits/3894"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "23913",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/23913"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-1767",
|
"name": "ADV-2007-1767",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/1767"
|
"url": "http://www.vupen.com/english/advisories/2007/1767"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "35974",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/35974"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "25213",
|
"name": "25213",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -81,6 +71,16 @@
|
|||||||
"name": "original-config-file-include(34234)",
|
"name": "original-config-file-include(34234)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34234"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34234"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "35974",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/35974"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23913",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/23913"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20070606 Light Blog 4.1 XSS Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/470673/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.secvsn.com/content/Advisories/sr-060607-lightblog.html",
|
"name": "http://www.secvsn.com/content/Advisories/sr-060607-lightblog.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.secvsn.com/content/Advisories/sr-060607-lightblog.html"
|
"url": "http://www.secvsn.com/content/Advisories/sr-060607-lightblog.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20070606 Light Blog 4.1 XSS Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/470673/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "25561",
|
"name": "25561",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/25561"
|
"url": "http://secunia.com/advisories/25561"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "2783",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/2783"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "lightblog-addcomment-xss(34753)",
|
"name": "lightblog-addcomment-xss(34753)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34753"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34753"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "2783",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/2783"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "access2asp-supplierslist-xss(35025)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35025"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://pridels-team.blogspot.com/2007/06/access2asp-xss-vuln.html",
|
"name": "http://pridels-team.blogspot.com/2007/06/access2asp-xss-vuln.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://pridels-team.blogspot.com/2007/06/access2asp-xss-vuln.html"
|
"url": "http://pridels-team.blogspot.com/2007/06/access2asp-xss-vuln.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "25807",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/25807"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "37751",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/37751"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-2371",
|
"name": "ADV-2007-2371",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -66,21 +81,6 @@
|
|||||||
"name": "37750",
|
"name": "37750",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/37750"
|
"url": "http://www.osvdb.org/37750"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "37751",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/37751"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25807",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/25807"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "access2asp-supplierslist-xss(35025)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35025"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.sybsecurity.com/hack-proventia-1.pdf",
|
"name": "25979",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.sybsecurity.com/hack-proventia-1.pdf"
|
"url": "http://secunia.com/advisories/25979"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "36475",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/36475"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-2545",
|
"name": "ADV-2007-2545",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2007/2545"
|
"url": "http://www.vupen.com/english/advisories/2007/2545"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "25979",
|
"name": "36475",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://secunia.com/advisories/25979"
|
"url": "http://osvdb.org/36475"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.sybsecurity.com/hack-proventia-1.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.sybsecurity.com/hack-proventia-1.pdf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.php.net/ChangeLog-5.php#5.2.4",
|
"name": "php-zendalterinientry-unspecified(36380)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://www.php.net/ChangeLog-5.php#5.2.4"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36380"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.php.net/releases/5_2_4.php",
|
"name": "26822",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.php.net/releases/5_2_4.php"
|
"url": "http://secunia.com/advisories/26822"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://issues.rpath.com/browse/RPL-1702",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://issues.rpath.com/browse/RPL-1702"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://issues.rpath.com/browse/RPL-1693",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://issues.rpath.com/browse/RPL-1693"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-1444",
|
"name": "DSA-1444",
|
||||||
@ -82,25 +72,30 @@
|
|||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.php.net/ChangeLog-5.php#5.2.4",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.php.net/ChangeLog-5.php#5.2.4"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "2007-0026",
|
"name": "2007-0026",
|
||||||
"refsource": "TRUSTIX",
|
"refsource": "TRUSTIX",
|
||||||
"url": "http://www.trustix.org/errata/2007/0026/"
|
"url": "http://www.trustix.org/errata/2007/0026/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2007-3023",
|
"name": "https://issues.rpath.com/browse/RPL-1693",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/3023"
|
"url": "https://issues.rpath.com/browse/RPL-1693"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "26642",
|
"name": "28249",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/26642"
|
"url": "http://secunia.com/advisories/28249"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "26822",
|
"name": "https://issues.rpath.com/browse/RPL-1702",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/26822"
|
"url": "https://issues.rpath.com/browse/RPL-1702"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "26838",
|
"name": "26838",
|
||||||
@ -118,14 +113,19 @@
|
|||||||
"url": "http://secunia.com/advisories/27102"
|
"url": "http://secunia.com/advisories/27102"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "28249",
|
"name": "ADV-2007-3023",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://secunia.com/advisories/28249"
|
"url": "http://www.vupen.com/english/advisories/2007/3023"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "php-zendalterinientry-unspecified(36380)",
|
"name": "http://www.php.net/releases/5_2_4.php",
|
||||||
"refsource" : "XF",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36380"
|
"url": "http://www.php.net/releases/5_2_4.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "26642",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/26642"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,50 +52,50 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20070829 Sony: The Return Of The Rootkit",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/478149/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20070830 Re: Sony: The Return Of The Rootkit",
|
"name": "20070830 Re: Sony: The Return Of The Rootkit",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/478315/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/478315/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20070831 Re: Sony: The Return Of The Rootkit",
|
"name": "http://www.f-secure.com/weblog/archives/archive-082007.html#00001266",
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/478357/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20070901 Re: Sony: The Return Of The Rootkit",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/478365/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://hiltont.blogspot.com/2007/08/sony-rootkit-version-2.html",
|
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "http://hiltont.blogspot.com/2007/08/sony-rootkit-version-2.html"
|
"url": "http://www.f-secure.com/weblog/archives/archive-082007.html#00001266"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://observed.de/?entnum=101",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://observed.de/?entnum=101"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.computerdefense.org/?p=380",
|
"name": "http://www.computerdefense.org/?p=380",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.computerdefense.org/?p=380"
|
"url": "http://www.computerdefense.org/?p=380"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20070829 Sony: The Return Of The Rootkit",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/478149/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://hiltont.blogspot.com/2007/08/sony-rootkit-version-2.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://hiltont.blogspot.com/2007/08/sony-rootkit-version-2.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.f-secure.com/weblog/archives/archive-082007.html#00001263",
|
"name": "http://www.f-secure.com/weblog/archives/archive-082007.html#00001263",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.f-secure.com/weblog/archives/archive-082007.html#00001263"
|
"url": "http://www.f-secure.com/weblog/archives/archive-082007.html#00001263"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.f-secure.com/weblog/archives/archive-082007.html#00001266",
|
"name": "20070901 Re: Sony: The Return Of The Rootkit",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/478365/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070831 Re: Sony: The Return Of The Rootkit",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/478357/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://observed.de/?entnum=101",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.f-secure.com/weblog/archives/archive-082007.html#00001266"
|
"url": "http://observed.de/?entnum=101"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "3118",
|
"name": "3118",
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://code.google.com/p/pyftpdlib/issues/detail?id=20",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://code.google.com/p/pyftpdlib/issues/detail?id=20"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY",
|
"name": "http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY"
|
"url": "http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://code.google.com/p/pyftpdlib/source/detail?r=23",
|
"name": "http://code.google.com/p/pyftpdlib/issues/detail?id=20",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://code.google.com/p/pyftpdlib/source/detail?r=23"
|
"url": "http://code.google.com/p/pyftpdlib/issues/detail?id=20"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://code.google.com/p/pyftpdlib/source/diff?spec=svn23&r=23&format=side&path=/trunk/pyftpdlib/FTPServer.py",
|
"name": "http://code.google.com/p/pyftpdlib/source/diff?spec=svn23&r=23&format=side&path=/trunk/pyftpdlib/FTPServer.py",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://code.google.com/p/pyftpdlib/source/diff?spec=svn23&r=23&format=side&path=/trunk/pyftpdlib/FTPServer.py"
|
"url": "http://code.google.com/p/pyftpdlib/source/diff?spec=svn23&r=23&format=side&path=/trunk/pyftpdlib/FTPServer.py"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://code.google.com/p/pyftpdlib/source/detail?r=23",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://code.google.com/p/pyftpdlib/source/detail?r=23"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.org/1004-exploits/joomlazimbmanager-lfi.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.org/1004-exploits/joomlazimbmanager-lfi.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "12284",
|
"name": "12284",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/12284"
|
"url": "http://www.exploit-db.com/exploits/12284"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.org/1004-exploits/joomlazimbmanager-lfi.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.org/1004-exploits/joomlazimbmanager-lfi.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "39546",
|
"name": "39546",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2010-5107",
|
"ID": "CVE-2010-5107",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,20 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20130206 Re: CVE id request: openssh?",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2013/02/07/3"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234",
|
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234"
|
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/servconf.c?r1=1.234#rev1.234"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156",
|
"name": "RHSA-2013:1591",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1591.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBMU03409",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config?r1=1.89#rev1.89",
|
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config?r1=1.89#rev1.89",
|
||||||
@ -78,9 +78,9 @@
|
|||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=908707"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=908707"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
"name": "58162",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
|
"url": "http://www.securityfocus.com/bid/58162"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
||||||
@ -88,29 +88,29 @@
|
|||||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "HPSBMU03409",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
||||||
"refsource" : "HP",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=144050155601375&w=2"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2013:1591",
|
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1591.html"
|
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd_config.5?r1=1.156#rev1.156"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "58162",
|
"name": "[oss-security] 20130206 Re: CVE id request: openssh?",
|
||||||
"refsource" : "BID",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.securityfocus.com/bid/58162"
|
"url": "http://www.openwall.com/lists/oss-security/2013/02/07/3"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:19515",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19515"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:19595",
|
"name": "oval:org.mitre.oval:def:19595",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19595"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19595"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:19515",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19515"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2014-0236",
|
"ID": "CVE-2014-0236",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://git.php.net/?p=php-src.git;a=commit;h=f3f22ff5c697aef854ffc1918bce708b37481b0f",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.php.net/?p=php-src.git;a=commit;h=f3f22ff5c697aef854ffc1918bce708b37481b0f"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://php.net/ChangeLog-5.php",
|
"name": "http://php.net/ChangeLog-5.php",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "https://bugs.php.net/bug.php?id=67329",
|
"name": "https://bugs.php.net/bug.php?id=67329",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugs.php.net/bug.php?id=67329"
|
"url": "https://bugs.php.net/bug.php?id=67329"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.php.net/?p=php-src.git;a=commit;h=f3f22ff5c697aef854ffc1918bce708b37481b0f",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.php.net/?p=php-src.git;a=commit;h=f3f22ff5c697aef854ffc1918bce708b37481b0f"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2014-0305",
|
"ID": "CVE-2014-0305",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2014-1385",
|
"ID": "CVE-2014-1385",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,41 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT6367",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT6367"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/kb/HT6537",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/kb/HT6537"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT6441",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT6441"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT6442",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT6442"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2014-09-17-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2014-09-17-2",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201601-02",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201601-02"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "69223",
|
"name": "69223",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -97,20 +62,55 @@
|
|||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1030731"
|
"url": "http://www.securitytracker.com/id/1030731"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT6441",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT6441"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201601-02",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201601-02"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/kb/HT6537",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/kb/HT6537"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT6367",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT6367"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT6442",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT6442"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "61318",
|
"name": "61318",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/61318"
|
"url": "http://secunia.com/advisories/61318"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "60705",
|
"name": "APPLE-SA-2014-09-17-2",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "APPLE",
|
||||||
"url" : "http://secunia.com/advisories/60705"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2014-09-17-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "apple-safari-cve20141385-code-exec(95268)",
|
"name": "apple-safari-cve20141385-code-exec(95268)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95268"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95268"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "60705",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/60705"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "101919",
|
"name": "101919",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/101919"
|
"url": "http://osvdb.org/101919"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "101921",
|
"name": "101921",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2014-1774",
|
"ID": "CVE-2014-1774",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "MS14-035",
|
"name": "1030370",
|
||||||
"refsource" : "MS",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
|
"url": "http://www.securitytracker.com/id/1030370"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "67867",
|
"name": "67867",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/67867"
|
"url": "http://www.securityfocus.com/bid/67867"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1030370",
|
"name": "MS14-035",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MS",
|
||||||
"url" : "http://www.securitytracker.com/id/1030370"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20140516 Two Cross-Site Scripting (XSS) Vulnerabilities in Seo Panel",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/532119/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.htbridge.com/advisory/HTB23200",
|
"name": "https://www.htbridge.com/advisory/HTB23200",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://www.htbridge.com/advisory/HTB23200"
|
"url": "https://www.htbridge.com/advisory/HTB23200"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/126706/Seo-Panel-3.4.0-Cross-Site-Scripting.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/126706/Seo-Panel-3.4.0-Cross-Site-Scripting.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://forum.seopanel.in/viewtopic.php?f=7&t=10978",
|
"name": "http://forum.seopanel.in/viewtopic.php?f=7&t=10978",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -76,6 +66,16 @@
|
|||||||
"name": "58706",
|
"name": "58706",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/58706"
|
"url": "http://secunia.com/advisories/58706"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20140516 Two Cross-Site Scripting (XSS) Vulnerabilities in Seo Panel",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/532119/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/126706/Seo-Panel-3.4.0-Cross-Site-Scripting.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/126706/Seo-Panel-3.4.0-Cross-Site-Scripting.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.drupal.org/SA-CORE-2014-003",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.drupal.org/SA-CORE-2014-003"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-2983",
|
"name": "DSA-2983",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2014/dsa-2983"
|
"url": "http://www.debian.org/security/2014/dsa-2983"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.drupal.org/SA-CORE-2014-003",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.drupal.org/SA-CORE-2014-003"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,20 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "34361",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/34361"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/127905/Tenda-A5s-Router-Authentication-Bypass.html",
|
"name": "http://packetstormsecurity.com/files/127905/Tenda-A5s-Router-Authentication-Bypass.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/127905/Tenda-A5s-Router-Authentication-Bypass.html"
|
"url": "http://packetstormsecurity.com/files/127905/Tenda-A5s-Router-Authentication-Bypass.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "69267",
|
"name": "34361",
|
||||||
"refsource" : "BID",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://www.securityfocus.com/bid/69267"
|
"url": "http://www.exploit-db.com/exploits/34361"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "tenda-a5srouter-cve20145246-security-bypass(95337)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95337"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "110146",
|
"name": "110146",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://osvdb.org/show/osvdb/110146"
|
"url": "http://osvdb.org/show/osvdb/110146"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "tenda-a5srouter-cve20145246-security-bypass(95337)",
|
"name": "69267",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95337"
|
"url": "http://www.securityfocus.com/bid/69267"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-5612",
|
"ID": "CVE-2014-5612",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
"name": "VU#707457",
|
||||||
"refsource" : "MISC",
|
"refsource": "CERT-VN",
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
"url": "http://www.kb.cert.org/vuls/id/707457"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#707457",
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/707457"
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-5992",
|
"ID": "CVE-2014-5992",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
"name": "VU#735793",
|
||||||
"refsource" : "MISC",
|
"refsource": "CERT-VN",
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
"url": "http://www.kb.cert.org/vuls/id/735793"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#735793",
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/735793"
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "hp-security-alert@hp.com",
|
||||||
"ID": "CVE-2015-2118",
|
"ID": "CVE-2015-2118",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,12 +53,12 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "HPSBPI03322",
|
"name": "SSRT102033",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04649315"
|
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04649315"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SSRT102033",
|
"name": "HPSBPI03322",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04649315"
|
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04649315"
|
||||||
}
|
}
|
||||||
|
@ -54,28 +54,28 @@
|
|||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)",
|
"name": "20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "FULLDISC",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/535679/100/0/threaded"
|
"url": "http://seclists.org/fulldisclosure/2015/Jun/8"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)",
|
"name": "20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://seclists.org/fulldisclosure/2015/Jun/8"
|
"url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html",
|
"name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html"
|
"url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "75038",
|
"name": "75038",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/75038"
|
"url": "http://www.securityfocus.com/bid/75038"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2015-6047",
|
"ID": "CVE-2015-6047",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-522"
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-522"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "MS15-106",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-106"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1033800",
|
"name": "1033800",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1033800"
|
"url": "http://www.securitytracker.com/id/1033800"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MS15-106",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-106"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2015-6718",
|
"ID": "CVE-2015-6718",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-503",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-503"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html",
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb15-24.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-503",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-503"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1033796",
|
"name": "1033796",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -53,44 +53,44 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20170201 Multiple memory access issues in gstreamer",
|
"name": "96001",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2017/02/01/7"
|
"url": "http://www.securityfocus.com/bid/96001"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20170202 Re: Multiple memory access issues in gstreamer",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2017/02/02/9"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=775450",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=775450"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3820",
|
"name": "DSA-3820",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2017/dsa-3820"
|
"url": "http://www.debian.org/security/2017/dsa-3820"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "GLSA-201705-10",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201705-10"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:2060",
|
"name": "RHSA-2017:2060",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2017:2060"
|
"url": "https://access.redhat.com/errata/RHSA-2017:2060"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "96001",
|
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=775450",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/96001"
|
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=775450"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20170202 Re: Multiple memory access issues in gstreamer",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2017/02/02/9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201705-10",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201705-10"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20170201 Multiple memory access issues in gstreamer",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2017/02/01/7"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,15 +53,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/jser/stat-js/blob/master/data/url-mapping.js",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/jser/stat-js/blob/master/data/url-mapping.js"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://nodesecurity.io/advisories/188",
|
"name": "https://nodesecurity.io/advisories/188",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://nodesecurity.io/advisories/188"
|
"url": "https://nodesecurity.io/advisories/188"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/jser/stat-js/blob/master/data/url-mapping.js",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/jser/stat-js/blob/master/data/url-mapping.js"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "USN-3600-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "https://usn.ubuntu.com/3600-1/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugs.php.net/bug.php?id=71323",
|
"name": "https://bugs.php.net/bug.php?id=71323",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5",
|
"name": "https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5"
|
"url": "https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-3600-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "https://usn.ubuntu.com/3600-1/"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2016-4137",
|
"ID": "CVE-2016-4137",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "40089",
|
"name": "1036117",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://www.exploit-db.com/exploits/40089/"
|
"url": "http://www.securitytracker.com/id/1036117"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MS16-083",
|
"name": "MS16-083",
|
||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:1625",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:1238",
|
"name": "RHSA-2016:1238",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2016:1238"
|
"url": "https://access.redhat.com/errata/RHSA-2016:1238"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2016:1613",
|
"name": "40089",
|
||||||
"refsource" : "SUSE",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
|
"url": "https://www.exploit-db.com/exploits/40089/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:1621",
|
"name": "openSUSE-SU-2016:1621",
|
||||||
@ -83,14 +83,14 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2016:1625",
|
"name": "SUSE-SU-2016:1613",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1036117",
|
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1036117"
|
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-18.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2016-4242",
|
"ID": "CVE-2016-4242",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,25 +53,15 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
|
"name": "SUSE-SU-2016:1826",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201607-03",
|
"name": "GLSA-201607-03",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201607-03"
|
"url": "https://security.gentoo.org/glsa/201607-03"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1423",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1423"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:1826",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:1802",
|
"name": "openSUSE-SU-2016:1802",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
@ -82,6 +72,16 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/91725"
|
"url": "http://www.securityfocus.com/bid/91725"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1423",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2016:1423"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1036280",
|
"name": "1036280",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2016-4441",
|
"ID": "CVE-2016-4441",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,20 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20160519 CVE-2016-4441 Qemu: scsi: esp: OOB write while writing to 's-cmdbuf' in get_cmd",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2016/05/19/4"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[qemu-devel] 20160519 [PATCH 2/2] scsi: check dma length before reading scsi command(CVE-2016-4441)",
|
"name": "[qemu-devel] 20160519 [PATCH 2/2] scsi: check dma length before reading scsi command(CVE-2016-4441)",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html"
|
"url": "https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
|
"name": "USN-3047-1",
|
||||||
"refsource" : "MLIST",
|
"refsource": "UBUNTU",
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
|
"url": "http://www.ubuntu.com/usn/USN-3047-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337505",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1337505",
|
||||||
@ -77,16 +72,21 @@
|
|||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201609-01"
|
"url": "https://security.gentoo.org/glsa/201609-01"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "USN-3047-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-3047-1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-3047-2",
|
"name": "USN-3047-2",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-3047-2"
|
"url": "http://www.ubuntu.com/usn/USN-3047-2"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20160519 CVE-2016-4441 Qemu: scsi: esp: OOB write while writing to 's-cmdbuf' in get_cmd",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2016/05/19/4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "90762",
|
"name": "90762",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-8096",
|
"ID": "CVE-2016-8096",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@microfocus.com",
|
"ASSIGNER": "security@suse.com",
|
||||||
"ID": "CVE-2016-9176",
|
"ID": "CVE-2016-9176",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.exploit-db.com/exploits/40648/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/40648/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "94236",
|
"name": "94236",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/94236"
|
"url": "http://www.securityfocus.com/bid/94236"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.exploit-db.com/exploits/40648/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/40648/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-9326",
|
"ID": "CVE-2016-9326",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-9655",
|
"ID": "CVE-2016-9655",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update",
|
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.libsdl.org/show_bug.cgi?id=4496"
|
"url": "https://bugzilla.libsdl.org/show_bug.cgi?id=4496"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720",
|
"name": "https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
Loading…
x
Reference in New Issue
Block a user