mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
bcc9c6142f
commit
4903175cc2
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "subscribemelite-gain-admin-access(5735)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5735"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20001212 Security Advisory: Subscribe Me Lite 1.0 - 2.0 Unix or 1.0 - 2.0 NT and below.",
|
"name": "20001212 Security Advisory: Subscribe Me Lite 1.0 - 2.0 Unix or 1.0 - 2.0 NT and below.",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "2108",
|
"name": "2108",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/2108"
|
"url": "http://www.securityfocus.com/bid/2108"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "subscribemelite-gain-admin-access(5735)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5735"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20010131 [SPSadvisory#40]Solaris7/8 ximp40 shared library buffer overflow",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0517.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "solaris-ximp40-bo(6039)",
|
"name": "solaris-ximp40-bo(6039)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6039"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6039"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20010131 [SPSadvisory#40]Solaris7/8 ximp40 shared library buffer overflow",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-01/0517.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "2322",
|
"name": "2322",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/814187"
|
"url": "http://www.kb.cert.org/vuls/id/814187"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.sarc.com/avcenter/security/Content/2001_07_20.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.sarc.com/avcenter/security/Content/2001_07_20.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "liveupdate-obtain-proxy-password(7013)",
|
"name": "liveupdate-obtain-proxy-password(7013)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7013"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7013"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.sarc.com/avcenter/security/Content/2001_07_20.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.sarc.com/avcenter/security/Content/2001_07_20.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20010613 ScreamingMedia SITEWare source code disclosure vulnerability ",
|
"name": "VU#795707",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "CERT-VN",
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0166.html"
|
"url": "http://www.kb.cert.org/vuls/id/795707"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20010613 ScreamingMedia SITEWare arbitrary file retrieval vulnerability ",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0165.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www01.screamingmedia.com/en/security/sms1001.php",
|
"name": "http://www01.screamingmedia.com/en/security/sms1001.php",
|
||||||
@ -68,14 +63,9 @@
|
|||||||
"url": "http://www01.screamingmedia.com/en/security/sms1001.php"
|
"url": "http://www01.screamingmedia.com/en/security/sms1001.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#795707",
|
"name": "siteware-dot-file-retrieval(6689)",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "XF",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/795707"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6689"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "2869",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/2869"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "13887",
|
"name": "13887",
|
||||||
@ -83,9 +73,19 @@
|
|||||||
"url": "http://www.osvdb.org/13887"
|
"url": "http://www.osvdb.org/13887"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "siteware-dot-file-retrieval(6689)",
|
"refsource": "BUGTRAQ",
|
||||||
"refsource" : "XF",
|
"name": "20010613 ScreamingMedia SITEWare source code disclosure vulnerability",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6689"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0166.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20010613 ScreamingMedia SITEWare arbitrary file retrieval vulnerability",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0165.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "2869",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/2869"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,16 +57,16 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0137.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://support.ca.com/Download/patches/asitnt/QO00945.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://support.ca.com/Download/patches/asitnt/QO00945.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "arcserve-aremote-plaintext(7122)",
|
"name": "arcserve-aremote-plaintext(7122)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7122"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7122"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.ca.com/Download/patches/asitnt/QO00945.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://support.ca.com/Download/patches/asitnt/QO00945.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "3343",
|
"name": "3343",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -52,230 +52,60 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20080318 MITKRB5-SA-2008-001: double-free, uninitialized data vulnerabilities in krb5kdc",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/489761"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20080319 rPSA-2008-0112-1 krb5 krb5-server krb5-services krb5-test krb5-workstation",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/489883/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://docs.info.apple.com/article.html?artnum=307562",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://docs.info.apple.com/article.html?artnum=307562"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://wiki.rpath.com/Advisories:rPSA-2008-0112",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://wiki.rpath.com/Advisories:rPSA-2008-0112"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2008-0009.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2008-0009.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2008-03-18",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1524",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2008/dsa-1524"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2008-2637",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2008-2647",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200803-31",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBOV02682",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=130497213107107&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT100495",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=130497213107107&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2008:070",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:070"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2008:071",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:071"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2008:069",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:069"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0164",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0164.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0180",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0180.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0181",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0181.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0182",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0182.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SA:2008:016",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-587-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/usn-587-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#895609",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/895609"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "28303",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/28303"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:9496",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9496"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-0922",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/0922/references"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-0924",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/0924/references"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-1102",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/1102/references"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-1744",
|
"name": "ADV-2008-1744",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/1744"
|
"url": "http://www.vupen.com/english/advisories/2008/1744"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1019626",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1019626"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29428",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29428"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29438",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29438"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29420",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29420"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29435",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29435"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29450",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29450"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29451",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29451"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "29457",
|
"name": "29457",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/29457"
|
"url": "http://secunia.com/advisories/29457"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2008:069",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:069"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "29464",
|
"name": "29464",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/29464"
|
"url": "http://secunia.com/advisories/29464"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "29423",
|
"name": "GLSA-200803-31",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://secunia.com/advisories/29423"
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "29462",
|
"name": "FEDORA-2008-2637",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://secunia.com/advisories/29462"
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "29516",
|
"name": "MDVSA-2008:071",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:071"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0112",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0112"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT100495",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=130497213107107&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29451",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/29516"
|
"url": "http://secunia.com/advisories/29451"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "29663",
|
"name": "29663",
|
||||||
@ -283,9 +113,89 @@
|
|||||||
"url": "http://secunia.com/advisories/29663"
|
"url": "http://secunia.com/advisories/29663"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "29424",
|
"name": "FEDORA-2008-2647",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29438",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/29424"
|
"url": "http://secunia.com/advisories/29438"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:9496",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9496"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-0924",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:0164",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0164.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2008:070",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:070"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-0922",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/0922/references"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29450",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29450"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29435",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29435"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "krb5-kdc-code-execution(41275)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41275"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1019626",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1019626"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080319 rPSA-2008-0112-1 krb5 krb5-server krb5-services krb5-test krb5-workstation",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/489883/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29428",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29428"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29420",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29420"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1524",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2008/dsa-1524"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "30535",
|
"name": "30535",
|
||||||
@ -293,9 +203,99 @@
|
|||||||
"url": "http://secunia.com/advisories/30535"
|
"url": "http://secunia.com/advisories/30535"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "krb5-kdc-code-execution(41275)",
|
"name": "APPLE-SA-2008-03-18",
|
||||||
"refsource" : "XF",
|
"refsource": "APPLE",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41275"
|
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:0182",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0182.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:0180",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0180.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SA:2008:016",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29516",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29516"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29462",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29462"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29424",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29424"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://docs.info.apple.com/article.html?artnum=307562",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://docs.info.apple.com/article.html?artnum=307562"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:0181",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0181.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29423",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29423"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-587-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/usn-587-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-1102",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/1102/references"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "28303",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/28303"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080318 MITKRB5-SA-2008-001: double-free, uninitialized data vulnerabilities in krb5kdc",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/489761"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBOV02682",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=130497213107107&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#895609",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/895609"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080221 Cisco and Vocera wireless LAN VoIP devices don't check certificates",
|
"name": "http://blogs.zdnet.com/security/?p=896",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "MISC",
|
||||||
"url" : "http://seclists.org/fulldisclosure/2008/Feb/0402.html"
|
"url": "http://blogs.zdnet.com/security/?p=896"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20080223 Cisco confirms vulnerability in 7921 Wi-Fi IP phone",
|
"name": "20080223 Cisco confirms vulnerability in 7921 Wi-Fi IP phone",
|
||||||
@ -63,14 +63,14 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2008/Feb/0449.html"
|
"url": "http://seclists.org/fulldisclosure/2008/Feb/0449.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://blogs.zdnet.com/security/?p=896",
|
"name": "1019494",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://blogs.zdnet.com/security/?p=896"
|
"url": "http://securitytracker.com/id?1019494"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://blogs.zdnet.com/security/?p=901",
|
"name": "20080221 Cisco and Vocera wireless LAN VoIP devices don't check certificates",
|
||||||
"refsource" : "MISC",
|
"refsource": "FULLDISC",
|
||||||
"url" : "http://blogs.zdnet.com/security/?p=901"
|
"url": "http://seclists.org/fulldisclosure/2008/Feb/0402.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "27935",
|
"name": "27935",
|
||||||
@ -78,9 +78,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/27935"
|
"url": "http://www.securityfocus.com/bid/27935"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1019494",
|
"name": "http://blogs.zdnet.com/security/?p=901",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MISC",
|
||||||
"url" : "http://securitytracker.com/id?1019494"
|
"url": "http://blogs.zdnet.com/security/?p=901"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "29082",
|
"name": "29082",
|
||||||
|
@ -52,170 +52,170 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20080409 IOActive Security Advisory: Buffer overflow in Python zlib extension module",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/490690/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://bugs.python.org/issue2586",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://bugs.python.org/issue2586"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0149",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0149"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://issues.rpath.com/browse/RPL-2444",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://issues.rpath.com/browse/RPL-2444"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT3438",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT3438"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.avaya.com/css/P8/documents/100074697",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.avaya.com/css/P8/documents/100074697"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2009-02-12",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1551",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2008/dsa-1551"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1620",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2008/dsa-1620"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-200807-01",
|
"name": "GLSA-200807-01",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "http://security.gentoo.org/glsa/glsa-200807-01.xml"
|
"url": "http://security.gentoo.org/glsa/glsa-200807-01.xml"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "MDVSA-2008:085",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:085"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSA:2008-217-01",
|
|
||||||
"refsource" : "SLACKWARE",
|
|
||||||
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-632-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/usn-632-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "28715",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/28715"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:8249",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8249"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:8494",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8494"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:9407",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9407"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "37471",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/37471"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "38675",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/38675"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-1229",
|
"name": "ADV-2008-1229",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/1229/references"
|
"url": "http://www.vupen.com/english/advisories/2008/1229/references"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1019823",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1019823"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29889",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29889"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29955",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29955"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "30872",
|
"name": "30872",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/30872"
|
"url": "http://secunia.com/advisories/30872"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "31255",
|
"name": "28715",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BID",
|
||||||
"url" : "http://secunia.com/advisories/31255"
|
"url": "http://www.securityfocus.com/bid/28715"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "31358",
|
"name": "38675",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/31358"
|
"url": "http://secunia.com/advisories/38675"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "31365",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/31365"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "33937",
|
"name": "33937",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/33937"
|
"url": "http://secunia.com/advisories/33937"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2008:085",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:085"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "37471",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/37471"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29955",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29955"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1551",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2008/dsa-1551"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT3438",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT3438"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2009-02-12",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "31358",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/31358"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "zlib-pystringfromstringandsize-bo(41748)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41748"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-632-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/usn-632-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1019823",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1019823"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://bugs.python.org/issue2586",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://bugs.python.org/issue2586"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://issues.rpath.com/browse/RPL-2444",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://issues.rpath.com/browse/RPL-2444"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "3802",
|
"name": "3802",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/3802"
|
"url": "http://securityreason.com/securityalert/3802"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "31365",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/31365"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:8249",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8249"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.avaya.com/css/P8/documents/100074697",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.avaya.com/css/P8/documents/100074697"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "31255",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/31255"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080409 IOActive Security Advisory: Buffer overflow in Python zlib extension module",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/490690/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1620",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2008/dsa-1620"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0149",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0149"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:9407",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9407"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSA:2008-217-01",
|
||||||
|
"refsource": "SLACKWARE",
|
||||||
|
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-3316",
|
"name": "ADV-2009-3316",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2009/3316"
|
"url": "http://www.vupen.com/english/advisories/2009/3316"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "zlib-pystringfromstringandsize-bo(41748)",
|
"name": "29889",
|
||||||
"refsource" : "XF",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41748"
|
"url": "http://secunia.com/advisories/29889"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:8494",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8494"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,19 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20081205 ZDI-08-078: Trillian IMG SRC ID Memory Corruption Vulnerability",
|
"name": "4701",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/498933/100/0/threaded"
|
"url": "http://securityreason.com/securityalert/4701"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://blog.ceruleanstudios.com/?p=404",
|
"name": "trillian-xml-code-execution(47098)",
|
||||||
"refsource" : "MISC",
|
"refsource": "XF",
|
||||||
"url" : "http://blog.ceruleanstudios.com/?p=404"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47098"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-078",
|
"name": "1021334",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-078"
|
"url": "http://www.securitytracker.com/id?1021334"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "50473",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/50473"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "32645",
|
"name": "32645",
|
||||||
@ -78,14 +83,14 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2008/3348"
|
"url": "http://www.vupen.com/english/advisories/2008/3348"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "50473",
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-078",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "MISC",
|
||||||
"url" : "http://osvdb.org/50473"
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-078"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1021334",
|
"name": "20081205 ZDI-08-078: Trillian IMG SRC ID Memory Corruption Vulnerability",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securitytracker.com/id?1021334"
|
"url": "http://www.securityfocus.com/archive/1/498933/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "33001",
|
"name": "33001",
|
||||||
@ -93,14 +98,9 @@
|
|||||||
"url": "http://secunia.com/advisories/33001"
|
"url": "http://secunia.com/advisories/33001"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "4701",
|
"name": "http://blog.ceruleanstudios.com/?p=404",
|
||||||
"refsource" : "SREASON",
|
"refsource": "MISC",
|
||||||
"url" : "http://securityreason.com/securityalert/4701"
|
"url": "http://blog.ceruleanstudios.com/?p=404"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "trillian-xml-code-execution(47098)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47098"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080204 [DSECRG-08-008] Textpattern 4.0.5 Multiple Security Vulnerabilities",
|
"name": "28793",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/487483/100/200/threaded"
|
"url": "http://secunia.com/advisories/28793"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://textpattern.com/weblog/310/textpattern-406-released",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://textpattern.com/weblog/310/textpattern-406-released"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "27606",
|
"name": "27606",
|
||||||
@ -68,14 +63,19 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/27606"
|
"url": "http://www.securityfocus.com/bid/27606"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "28793",
|
"name": "20080204 [DSECRG-08-008] Textpattern 4.0.5 Multiple Security Vulnerabilities",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://secunia.com/advisories/28793"
|
"url": "http://www.securityfocus.com/archive/1/487483/100/200/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "4786",
|
"name": "4786",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/4786"
|
"url": "http://securityreason.com/securityalert/4786"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://textpattern.com/weblog/310/textpattern-406-released",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://textpattern.com/weblog/310/textpattern-406-released"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "6553",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/6553"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "31373",
|
"name": "31373",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/31373"
|
"url": "http://www.securityfocus.com/bid/31373"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "31993",
|
"name": "6553",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://secunia.com/advisories/31993"
|
"url": "https://www.exploit-db.com/exploits/6553"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "phpcounter-defs-file-include(45378)",
|
"name": "phpcounter-defs-file-include(45378)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45378"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45378"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "31993",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/31993"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2011-2118",
|
"ID": "CVE-2011-2118",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2013-0364",
|
"ID": "CVE-2013-0364",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,9 +58,9 @@
|
|||||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "HPSBST02955",
|
"name": "57126",
|
||||||
"refsource" : "HP",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
|
"url": "http://secunia.com/advisories/57126"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MDVSA-2013:150",
|
"name": "MDVSA-2013:150",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "57126",
|
"name": "HPSBST02955",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "HP",
|
||||||
"url" : "http://secunia.com/advisories/57126"
|
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-0486",
|
"ID": "CVE-2013-0486",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "domino-get-dos(81812)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81812"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21627597",
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21627597",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,11 +71,6 @@
|
|||||||
"name": "JVNDB-2013-000030",
|
"name": "JVNDB-2013-000030",
|
||||||
"refsource": "JVNDB",
|
"refsource": "JVNDB",
|
||||||
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000030.html"
|
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000030.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "domino-get-dos(81812)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/81812"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-0570",
|
"ID": "CVE-2013-0570",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www-304.ibm.com/support/docview.wss?uid=isg3T1019715",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www-304.ibm.com/support/docview.wss?uid=isg3T1019715"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ibm-networking-cve20130570(83166)",
|
"name": "ibm-networking-cve20130570(83166)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83166"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83166"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www-304.ibm.com/support/docview.wss?uid=isg3T1019715",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www-304.ibm.com/support/docview.wss?uid=isg3T1019715"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2013-1279",
|
"ID": "CVE-2013-1279",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-017"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-017"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "TA13-043B",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:16458",
|
"name": "oval:org.mitre.oval:def:16458",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16458"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16458"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA13-043B",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-1803",
|
"ID": "CVE-2013-1803",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,35 +53,60 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20130228 [waraxe-2013-SA#097] - Multiple Vulnerabilities in PHP-Fusion 7.02.05",
|
"name": "http://www.waraxe.us/advisory-97.html",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "MISC",
|
||||||
"url" : "http://seclists.org/fulldisclosure/2013/Feb/154"
|
"url": "http://www.waraxe.us/advisory-97.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "90714",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/show/osvdb/90714"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130302 Re: CVE request: PHP-Fusion waraxe-2013-SA#097",
|
"name": "[oss-security] 20130302 Re: CVE request: PHP-Fusion waraxe-2013-SA#097",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/03/2"
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/03/2"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "90710",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/90710"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130303 CVE request: PHP-Fusion waraxe-2013-SA#097",
|
"name": "[oss-security] 20130303 CVE request: PHP-Fusion waraxe-2013-SA#097",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/03/1"
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/03/1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "90712",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/90712"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html",
|
"name": "http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html"
|
"url": "http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.waraxe.us/advisory-97.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.waraxe.us/advisory-97.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.php-fusion.co.uk/news.php?readmore=569",
|
"name": "http://www.php-fusion.co.uk/news.php?readmore=569",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.php-fusion.co.uk/news.php?readmore=569"
|
"url": "http://www.php-fusion.co.uk/news.php?readmore=569"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "90709",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/90709"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "90713",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/90713"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "90711",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/90711"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "90693",
|
"name": "90693",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -93,34 +118,9 @@
|
|||||||
"url": "http://osvdb.org/90695"
|
"url": "http://osvdb.org/90695"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "90709",
|
"name": "20130228 [waraxe-2013-SA#097] - Multiple Vulnerabilities in PHP-Fusion 7.02.05",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "FULLDISC",
|
||||||
"url" : "http://osvdb.org/90709"
|
"url": "http://seclists.org/fulldisclosure/2013/Feb/154"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "90710",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/90710"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "90711",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/90711"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "90712",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/90712"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "90713",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/90713"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "90714",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/show/osvdb/90714"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "52403",
|
"name": "52403",
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2013-3022",
|
"ID": "CVE-2013-3022",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||||
"ID": "CVE-2013-3482",
|
"ID": "CVE-2013-3482",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,14 +58,9 @@
|
|||||||
"url": "http://www.exploit-db.com/exploits/26708"
|
"url": "http://www.exploit-db.com/exploits/26708"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.secunia.com/blog/366",
|
"name": "53620",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.secunia.com/blog/366"
|
"url": "http://secunia.com/advisories/53620"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20130523 [Secunia] ERADAS ER Viewer Stack Based Overflow",
|
|
||||||
"refsource" : "VIM",
|
|
||||||
"url" : "http://attrition.org/pipermail/vim/2013-May/002682.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "93650",
|
"name": "93650",
|
||||||
@ -73,9 +68,14 @@
|
|||||||
"url": "http://osvdb.org/show/osvdb/93650"
|
"url": "http://osvdb.org/show/osvdb/93650"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "53620",
|
"name": "20130523 [Secunia] ERADAS ER Viewer Stack Based Overflow",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "VIM",
|
||||||
"url" : "http://secunia.com/advisories/53620"
|
"url": "http://attrition.org/pipermail/vim/2013-May/002682.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.secunia.com/blog/366",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.secunia.com/blog/366"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2013-3838",
|
"ID": "CVE-2013-3838",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2013-3845",
|
"ID": "CVE-2013-3845",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-069"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-069"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "TA13-253A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-253A"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:18719",
|
"name": "oval:org.mitre.oval:def:18719",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18719"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18719"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA13-253A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-4039",
|
"ID": "CVE-2013-4039",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,31 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21647485",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21647485"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21669554",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21669554"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "PM84760",
|
"name": "PM84760",
|
||||||
"refsource": "AIXAPAR",
|
"refsource": "AIXAPAR",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM84760"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM84760"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21647485",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21647485"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "61992",
|
"name": "61992",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/61992"
|
"url": "http://www.securityfocus.com/bid/61992"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "96607",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/96607"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "54651",
|
"name": "54651",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -86,6 +76,16 @@
|
|||||||
"name": "websphere-edcg-cve20134039-infodisc(86175)",
|
"name": "websphere-edcg-cve20134039-infodisc(86175)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86175"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86175"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "96607",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/96607"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21669554",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21669554"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-4560",
|
"ID": "CVE-2013-4560",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,34 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20131112 Re: CVE Request: lighttpd multiple issues (setuid/... unchecked return value, FAM: read after free)",
|
"name": "55682",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2013/11/12/4"
|
"url": "http://secunia.com/advisories/55682"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_03.txt",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_03.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2795",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "https://www.debian.org/security/2013/dsa-2795"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "HPSBGN03191",
|
"name": "HPSBGN03191",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=141576815022399&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=141576815022399&w=2"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_03.txt",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_03.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2014:0072",
|
"name": "openSUSE-SU-2014:0072",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "55682",
|
"name": "DSA-2795",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://secunia.com/advisories/55682"
|
"url": "https://www.debian.org/security/2013/dsa-2795"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20131112 Re: CVE Request: lighttpd multiple issues (setuid/... unchecked return value, FAM: read after free)",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2013/11/12/4"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "hp-security-alert@hp.com",
|
||||||
"ID": "CVE-2013-4837",
|
"ID": "CVE-2013-4837",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,12 +53,12 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "HPSBMU02935",
|
"name": "SSRT101191",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437"
|
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SSRT101191",
|
"name": "HPSBMU02935",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437"
|
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437"
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "26405",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/26405"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "53977",
|
"name": "53977",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/53977"
|
"url": "http://secunia.com/advisories/53977"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "26405",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "http://www.exploit-db.com/exploits/26405"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-cms",
|
"name": "1039913",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-cms"
|
"url": "http://www.securitytracker.com/id/1039913"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "101987",
|
"name": "101987",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/101987"
|
"url": "http://www.securityfocus.com/bid/101987"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1039913",
|
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-cms",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1039913"
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-cms"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-255-01",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-255-01"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "100815",
|
"name": "100815",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/100815"
|
"url": "http://www.securityfocus.com/bid/100815"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-255-01",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-255-01"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update",
|
"name": "https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-invalid-memory-read-in-setimagecolorcallback-image-c/",
|
||||||
"refsource" : "MLIST",
|
"refsource": "MISC",
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html"
|
"url": "https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-invalid-memory-read-in-setimagecolorcallback-image-c/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://hg.code.sf.net/p/graphicsmagick/code/rev/cd699a44f188",
|
"name": "http://hg.code.sf.net/p/graphicsmagick/code/rev/cd699a44f188",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://hg.code.sf.net/p/graphicsmagick/code/rev/cd699a44f188"
|
"url": "http://hg.code.sf.net/p/graphicsmagick/code/rev/cd699a44f188"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-invalid-memory-read-in-setimagecolorcallback-image-c/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://blogs.gentoo.org/ago/2017/08/05/graphicsmagick-invalid-memory-read-in-setimagecolorcallback-image-c/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-4321",
|
"name": "DSA-4321",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "https://www.debian.org/security/2018/dsa-4321"
|
"url": "https://www.debian.org/security/2018/dsa-4321"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"DATE_PUBLIC": "2018-04-02T00:00:00",
|
"DATE_PUBLIC": "2018-04-02T00:00:00",
|
||||||
"ID": "CVE-2017-13267",
|
"ID": "CVE-2017-13267",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"DATE_PUBLIC": "2018-04-02T00:00:00",
|
"DATE_PUBLIC": "2018-04-02T00:00:00",
|
||||||
"ID": "CVE-2017-13277",
|
"ID": "CVE-2017-13277",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-16498",
|
"ID": "CVE-2017-16498",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-17267",
|
"ID": "CVE-2017-17267",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "Secure@Microsoft.com",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2018-1004",
|
"ID": "CVE-2018-1004",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -174,6 +174,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1040655",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1040655"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1004",
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1004",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -183,11 +188,6 @@
|
|||||||
"name": "103657",
|
"name": "103657",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/103657"
|
"url": "http://www.securityfocus.com/bid/103657"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1040655",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1040655"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://zerodayinitiative.com/advisories/ZDI-18-314",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://zerodayinitiative.com/advisories/ZDI-18-314"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
|
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
|
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://zerodayinitiative.com/advisories/ZDI-18-314",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://zerodayinitiative.com/advisories/ZDI-18-314"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,15 +53,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://pivotal.io/security/cve-2018-1263",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://pivotal.io/security/cve-2018-1263"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "104179",
|
"name": "104179",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/104179"
|
"url": "http://www.securityfocus.com/bid/104179"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://pivotal.io/security/cve-2018-1263",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://pivotal.io/security/cve-2018-1263"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user