mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
e56c8d0de7
commit
4c7fbf6f19
@ -53,29 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020429 eSecurityOnline Security Advisory 2397 - Sun Solaris admintool -d and PRODVERS buffer overflow vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://online.securityfocus.com/archive/1/270122"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.esecurityonline.com/advisories/eSO2397.asp",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.esecurityonline.com/advisories/eSO2397.asp"
|
||||
},
|
||||
{
|
||||
"name" : "4624",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/4624"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:67",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A67"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:68",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A68"
|
||||
"name": "solaris-admintool-prodvers-bo(8955)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/8955.php"
|
||||
},
|
||||
{
|
||||
"name": "solaris-admintool-d-bo(8954)",
|
||||
@ -83,9 +63,29 @@
|
||||
"url": "http://www.iss.net/security_center/static/8954.php"
|
||||
},
|
||||
{
|
||||
"name" : "solaris-admintool-prodvers-bo(8955)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/8955.php"
|
||||
"name": "oval:org.mitre.oval:def:67",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A67"
|
||||
},
|
||||
{
|
||||
"name": "4624",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/4624"
|
||||
},
|
||||
{
|
||||
"name": "http://www.esecurityonline.com/advisories/eSO2397.asp",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.esecurityonline.com/advisories/eSO2397.asp"
|
||||
},
|
||||
{
|
||||
"name": "20020429 eSecurityOnline Security Advisory 2397 - Sun Solaris admintool -d and PRODVERS buffer overflow vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://online.securityfocus.com/archive/1/270122"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:68",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A68"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,45 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "12326",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/12326"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ethereal.com/appnotes/enpa-sa-00017.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ethereal.com/appnotes/enpa-sa-00017.html"
|
||||
},
|
||||
{
|
||||
"name" : "FLSA-2006:152922",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200501-27",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200501-27.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2005:013",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:013"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2005:037",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-037.html"
|
||||
},
|
||||
{
|
||||
"name": "13946",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/13946/"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2005:011",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-011.html"
|
||||
},
|
||||
{
|
||||
"name" : "P-106",
|
||||
"refsource" : "CIAC",
|
||||
"url" : "http://www.ciac.org/ciac/bulletins/p-106.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "12326",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/12326"
|
||||
"name": "ethereal-mmse-free-memory(19003)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19003"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:9521",
|
||||
@ -98,14 +88,24 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9521"
|
||||
},
|
||||
{
|
||||
"name" : "13946",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/13946/"
|
||||
"name": "GLSA-200501-27",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200501-27.xml"
|
||||
},
|
||||
{
|
||||
"name" : "ethereal-mmse-free-memory(19003)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19003"
|
||||
"name": "P-106",
|
||||
"refsource": "CIAC",
|
||||
"url": "http://www.ciac.org/ciac/bulletins/p-106.shtml"
|
||||
},
|
||||
{
|
||||
"name": "FLSA-2006:152922",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2005:013",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:013"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1012996",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1012996"
|
||||
},
|
||||
{
|
||||
"name": "http://www.uniras.gov.uk/niscc/docs/al-20050125-00059.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.uniras.gov.uk/niscc/docs/al-20050125-00059.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.isc.org/index.pl?/sw/bind/bind-security.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
|
||||
"name": "VU#327633",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/327633"
|
||||
},
|
||||
{
|
||||
"name": "14009",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14009"
|
||||
},
|
||||
{
|
||||
"name": "12364",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/12364"
|
||||
},
|
||||
{
|
||||
"name": "http://www.isc.org/index.pl?/sw/bind/bind8.php",
|
||||
@ -73,24 +88,9 @@
|
||||
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.1/SCOSA-2006.1.txt"
|
||||
},
|
||||
{
|
||||
"name" : "VU#327633",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/327633"
|
||||
},
|
||||
{
|
||||
"name" : "12364",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/12364"
|
||||
},
|
||||
{
|
||||
"name" : "1012996",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1012996"
|
||||
},
|
||||
{
|
||||
"name" : "14009",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/14009"
|
||||
"name": "http://www.isc.org/index.pl?/sw/bind/bind-security.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
|
||||
},
|
||||
{
|
||||
"name": "18291",
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050214 AWStats <= 6.4 Multiple vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/390368"
|
||||
},
|
||||
{
|
||||
"name" : "13832",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/13832"
|
||||
},
|
||||
{
|
||||
"name": "14299",
|
||||
"refsource": "SECUNIA",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "awstats-function-code-execution(19336)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19336"
|
||||
},
|
||||
{
|
||||
"name": "20050214 AWStats <= 6.4 Multiple vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/390368"
|
||||
},
|
||||
{
|
||||
"name": "13832",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/13832"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,39 +58,39 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/392653"
|
||||
},
|
||||
{
|
||||
"name" : "20060225 ArGoSoft FTP server remote heap overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/426081/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060225 ArGoSoft FTP server remote heap overflow",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042523.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.securinfos.info/english/security-advisories-alerts/20060225_ArGoSoft.FTP.Server_Heap.Overflow.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.securinfos.info/english/security-advisories-alerts/20060225_ArGoSoft.FTP.Server_Heap.Overflow.html"
|
||||
},
|
||||
{
|
||||
"name" : "12755",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/12755"
|
||||
"name": "14526",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14526"
|
||||
},
|
||||
{
|
||||
"name": "1015681",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015681"
|
||||
},
|
||||
{
|
||||
"name" : "14526",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/14526"
|
||||
},
|
||||
{
|
||||
"name": "494",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/494"
|
||||
},
|
||||
{
|
||||
"name": "12755",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/12755"
|
||||
},
|
||||
{
|
||||
"name": "https://www.securinfos.info/english/security-advisories-alerts/20060225_ArGoSoft.FTP.Server_Heap.Overflow.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.securinfos.info/english/security-advisories-alerts/20060225_ArGoSoft.FTP.Server_Heap.Overflow.html"
|
||||
},
|
||||
{
|
||||
"name": "20060225 ArGoSoft FTP server remote heap overflow",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042523.html"
|
||||
},
|
||||
{
|
||||
"name": "20060225 ArGoSoft FTP server remote heap overflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/426081/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -54,13 +54,13 @@
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "20050307 - Argeniss - Oracle Database Server Directory transversal",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=111023635928211&w=2"
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032273.html"
|
||||
},
|
||||
{
|
||||
"name": "20050307 - Argeniss - Oracle Database Server Directory transversal",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032273.html"
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111023635928211&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.argeniss.com/research/ARGENISS-ADV-030501.txt",
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050309 overwriting low kernel memory",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032314.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://linux.bkbits.net:8080/linux-2.6/cset@422dd06a1p5PsyFhoGAJseinjEq3ew?nav=index.html|ChangeSet@-1d",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://linux.bkbits.net:8080/linux-2.6/cset@422dd06a1p5PsyFhoGAJseinjEq3ew?nav=index.html|ChangeSet@-1d"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2005:293",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-293.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2005:366",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-366.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2005:018",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2005_18_kernel.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-95-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/95-1/"
|
||||
},
|
||||
{
|
||||
"name": "12763",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/12763"
|
||||
},
|
||||
{
|
||||
"name": "http://linux.bkbits.net:8080/linux-2.6/cset@422dd06a1p5PsyFhoGAJseinjEq3ew?nav=index.html|ChangeSet@-1d",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://linux.bkbits.net:8080/linux-2.6/cset@422dd06a1p5PsyFhoGAJseinjEq3ew?nav=index.html|ChangeSet@-1d"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2005:018",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html"
|
||||
},
|
||||
{
|
||||
"name": "20050309 overwriting low kernel memory",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032314.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:9870",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9870"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2005:293",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-293.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-95-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/95-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.snkenjoi.com/secadv/secadv3.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.snkenjoi.com/secadv/secadv3.txt"
|
||||
},
|
||||
{
|
||||
"name": "1013705",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1013705"
|
||||
},
|
||||
{
|
||||
"name": "http://www.snkenjoi.com/secadv/secadv3.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.snkenjoi.com/secadv/secadv3.txt"
|
||||
},
|
||||
{
|
||||
"name": "calendarscript-path-disclosure(20102)",
|
||||
"refsource": "XF",
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111420516900814&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "13325",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/13325"
|
||||
},
|
||||
{
|
||||
"name": "1013790",
|
||||
"refsource": "SECTRACK",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "15058",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15058"
|
||||
},
|
||||
{
|
||||
"name": "13325",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/13325"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2005-1731",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://pridels0.blogspot.com/2005/11/kbase-express-sql-inj-vuln.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://pridels0.blogspot.com/2005/11/kbase-express-sql-inj-vuln.html"
|
||||
},
|
||||
{
|
||||
"name" : "15635",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/15635"
|
||||
"name": "21340",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21340"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-2641",
|
||||
@ -68,24 +63,29 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2641"
|
||||
},
|
||||
{
|
||||
"name" : "21340",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/21340"
|
||||
"name": "17806",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17806"
|
||||
},
|
||||
{
|
||||
"name": "21341",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21341"
|
||||
},
|
||||
{
|
||||
"name" : "17806",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/17806"
|
||||
},
|
||||
{
|
||||
"name": "kbaseexpress-multiple-sql-injection(23309)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23309"
|
||||
},
|
||||
{
|
||||
"name": "15635",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15635"
|
||||
},
|
||||
{
|
||||
"name": "http://pridels0.blogspot.com/2005/11/kbase-express-sql-inj-vuln.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://pridels0.blogspot.com/2005/11/kbase-express-sql-inj-vuln.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "21457",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21457"
|
||||
},
|
||||
{
|
||||
"name": "http://pridels0.blogspot.com/2005/12/web4future-affiliate-manager-pro-sql.html",
|
||||
"refsource": "MISC",
|
||||
@ -63,14 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/15717"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2005-2745",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2005/2745"
|
||||
},
|
||||
{
|
||||
"name" : "21457",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/21457"
|
||||
"name": "affiliatemanager-functions-sql-injection(23415)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23415"
|
||||
},
|
||||
{
|
||||
"name": "17883",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://secunia.com/advisories/17883"
|
||||
},
|
||||
{
|
||||
"name" : "affiliatemanager-functions-sql-injection(23415)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23415"
|
||||
"name": "ADV-2005-2745",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2745"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=381793",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=381793"
|
||||
"name": "18246",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18246"
|
||||
},
|
||||
{
|
||||
"name": "16104",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16104"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0001",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0001"
|
||||
},
|
||||
{
|
||||
"name": "22125",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/22125"
|
||||
},
|
||||
{
|
||||
"name" : "18246",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18246"
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=381793",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=381793"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0001",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0001"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ADV-2007-0970",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0970"
|
||||
},
|
||||
{
|
||||
"name": "24478",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24478"
|
||||
},
|
||||
{
|
||||
"name": "http://www-1.ibm.com/support/docview.wss?uid=swg21243541",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21243541"
|
||||
},
|
||||
{
|
||||
"name" : "PK28963",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg24013840"
|
||||
},
|
||||
{
|
||||
"name": "PQ99537",
|
||||
"refsource": "AIXAPAR",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/22991"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-0970",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/0970"
|
||||
},
|
||||
{
|
||||
"name" : "24478",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24478"
|
||||
"name": "PK28963",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg24013840"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2009-0085",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,35 +57,35 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-007"
|
||||
},
|
||||
{
|
||||
"name": "1021828",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021828"
|
||||
},
|
||||
{
|
||||
"name": "TA09-069A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-069A.html"
|
||||
},
|
||||
{
|
||||
"name" : "52521",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/52521"
|
||||
"name": "ADV-2009-0660",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0660"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:6011",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6011"
|
||||
},
|
||||
{
|
||||
"name" : "1021828",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1021828"
|
||||
},
|
||||
{
|
||||
"name": "34215",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34215"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-0660",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/0660"
|
||||
"name": "52521",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/52521"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,70 +52,70 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.wesnoth.org/forum/viewtopic.php?t=24247",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wesnoth.org/forum/viewtopic.php?t=24247"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.wesnoth.org/forum/viewtopic.php?t=24340",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wesnoth.org/forum/viewtopic.php?t=24340"
|
||||
},
|
||||
{
|
||||
"name" : "https://gna.org/bugs/index.php?13048",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://gna.org/bugs/index.php?13048"
|
||||
},
|
||||
{
|
||||
"name" : "http://launchpad.net/bugs/335089",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://launchpad.net/bugs/335089"
|
||||
},
|
||||
{
|
||||
"name": "http://launchpad.net/bugs/336396",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://launchpad.net/bugs/336396"
|
||||
},
|
||||
{
|
||||
"name" : "http://launchpad.net/bugs/cve/2009-0367",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://launchpad.net/bugs/cve/2009-0367"
|
||||
},
|
||||
{
|
||||
"name" : "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog"
|
||||
},
|
||||
{
|
||||
"name": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1737",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2009/dsa-1737"
|
||||
"name": "https://gna.org/bugs/index.php?13048",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://gna.org/bugs/index.php?13048"
|
||||
},
|
||||
{
|
||||
"name": "wesnoth-pythonai-code-execution(49058)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49058"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wesnoth.org/forum/viewtopic.php?t=24340",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wesnoth.org/forum/viewtopic.php?t=24340"
|
||||
},
|
||||
{
|
||||
"name": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wesnoth.org/forum/viewtopic.php?t=24247",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wesnoth.org/forum/viewtopic.php?t=24247"
|
||||
},
|
||||
{
|
||||
"name": "34058",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34058"
|
||||
},
|
||||
{
|
||||
"name" : "34236",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/34236"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-0595",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0595"
|
||||
},
|
||||
{
|
||||
"name" : "wesnoth-pythonai-code-execution(49058)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49058"
|
||||
"name": "http://launchpad.net/bugs/cve/2009-0367",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://launchpad.net/bugs/cve/2009-0367"
|
||||
},
|
||||
{
|
||||
"name": "34236",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34236"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1737",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2009/dsa-1737"
|
||||
},
|
||||
{
|
||||
"name": "http://launchpad.net/bugs/335089",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://launchpad.net/bugs/335089"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20090302 CVE Request: mpfr (Buffer Overflow)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2009/03/02/4"
|
||||
},
|
||||
{
|
||||
"name" : "http://mpfr.loria.fr/mpfr-2.4.1/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://mpfr.loria.fr/mpfr-2.4.1/"
|
||||
"name": "34204",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34204"
|
||||
},
|
||||
{
|
||||
"name": "USN-772-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-772-1"
|
||||
},
|
||||
{
|
||||
"name": "http://mpfr.loria.fr/mpfr-2.4.1/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://mpfr.loria.fr/mpfr-2.4.1/"
|
||||
},
|
||||
{
|
||||
"name": "33945",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33945"
|
||||
},
|
||||
{
|
||||
"name" : "34204",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/34204"
|
||||
"name": "[oss-security] 20090302 CVE Request: mpfr (Buffer Overflow)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2009/03/02/4"
|
||||
},
|
||||
{
|
||||
"name": "35028",
|
||||
|
@ -53,44 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090601 ZDI-09-024: Safenet SoftRemote IKE Service Remote Stack Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/503981/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-09-024/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-09-024/"
|
||||
},
|
||||
{
|
||||
"name" : "35154",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/35154"
|
||||
},
|
||||
{
|
||||
"name" : "54831",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/54831"
|
||||
"name": "ADV-2009-1472",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1472"
|
||||
},
|
||||
{
|
||||
"name": "1022316",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1022316"
|
||||
},
|
||||
{
|
||||
"name": "54831",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/54831"
|
||||
},
|
||||
{
|
||||
"name": "35280",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35280"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-1472",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/1472"
|
||||
"name": "35154",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/35154"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-09-024/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-024/"
|
||||
},
|
||||
{
|
||||
"name": "softremote-ireike-bo(50880)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50880"
|
||||
},
|
||||
{
|
||||
"name": "20090601 ZDI-09-024: Safenet SoftRemote IKE Service Remote Stack Overflow Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/503981/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "8841",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/8841"
|
||||
"name": "unb-forum-sql-injection(50876)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50876"
|
||||
},
|
||||
{
|
||||
"name": "35183",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://secunia.com/advisories/35299"
|
||||
},
|
||||
{
|
||||
"name" : "unb-forum-sql-injection(50876)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50876"
|
||||
"name": "8841",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/8841"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2009-4274",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20100209 vulnerability in netpbm (CVE-2009-4274)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2010/02/09/11"
|
||||
"name": "RHSA-2011:1811",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-1811.html"
|
||||
},
|
||||
{
|
||||
"name": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch&r1=995&r2=1076&pathrev=1076",
|
||||
@ -63,39 +63,9 @@
|
||||
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch&r1=995&r2=1076&pathrev=1076"
|
||||
},
|
||||
{
|
||||
"name" : "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=546580",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2026",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2010/dsa-2026"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2010:039",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:1811",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1811.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2010:006",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "38164",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/38164"
|
||||
"name": "ADV-2010-0358",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0358"
|
||||
},
|
||||
{
|
||||
"name": "38530",
|
||||
@ -103,14 +73,9 @@
|
||||
"url": "http://secunia.com/advisories/38530"
|
||||
},
|
||||
{
|
||||
"name" : "38915",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/38915"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-0358",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/0358"
|
||||
"name": "[oss-security] 20100209 vulnerability in netpbm (CVE-2009-4274)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/02/09/11"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0780",
|
||||
@ -121,6 +86,41 @@
|
||||
"name": "netpbm-xpm-bo(56207)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=546580",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2010:006",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2026",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2010/dsa-2026"
|
||||
},
|
||||
{
|
||||
"name": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup"
|
||||
},
|
||||
{
|
||||
"name": "38915",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38915"
|
||||
},
|
||||
{
|
||||
"name": "38164",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38164"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2010:039",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.packetstormsecurity.org/0911-exploits/xoopssmartmedia-xss.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.packetstormsecurity.org/0911-exploits/xoopssmartmedia-xss.txt"
|
||||
},
|
||||
{
|
||||
"name": "37156",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/37156"
|
||||
},
|
||||
{
|
||||
"name": "http://www.packetstormsecurity.org/0911-exploits/xoopssmartmedia-xss.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.packetstormsecurity.org/0911-exploits/xoopssmartmedia-xss.txt"
|
||||
},
|
||||
{
|
||||
"name": "smartmedia-folder-xss(54488)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://holisticinfosec.org/content/view/129/45/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://holisticinfosec.org/content/view/129/45/"
|
||||
},
|
||||
{
|
||||
"name": "36789",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36789"
|
||||
},
|
||||
{
|
||||
"name": "http://holisticinfosec.org/content/view/129/45/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://holisticinfosec.org/content/view/129/45/"
|
||||
},
|
||||
{
|
||||
"name": "agoracart-unspecified-csrf(53808)",
|
||||
"refsource": "XF",
|
||||
|
@ -57,35 +57,35 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://arthur.barton.de/cgi-bin/gitweb.cgi?p=ngircd.git;a=blobdiff;f=src/ngircd/conn.c;h=c6095a31c613bc5ca127d55b8723e15b836f1cca;hp=9752a6191c7e2da5b0df64779e9cc28ad1e6241c;hb=627b0b713c52406e50c84bb9459e7794262920a2;hpb=95428a72ffb5214826b61d5e77f860e7ef6a6c9e"
|
||||
},
|
||||
{
|
||||
"name" : "http://arthur.barton.de/cgi-bin/gitweb.cgi?p=ngircd.git;a=commit;h=627b0b713c52406e50c84bb9459e7794262920a2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://arthur.barton.de/cgi-bin/gitweb.cgi?p=ngircd.git;a=commit;h=627b0b713c52406e50c84bb9459e7794262920a2"
|
||||
},
|
||||
{
|
||||
"name": "http://ngircd.barton.de/doc/ChangeLog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://ngircd.barton.de/doc/ChangeLog"
|
||||
},
|
||||
{
|
||||
"name" : "http://ngircd.barton.de/doc/NEWS",
|
||||
"name": "http://arthur.barton.de/cgi-bin/gitweb.cgi?p=ngircd.git;a=commit;h=627b0b713c52406e50c84bb9459e7794262920a2",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://ngircd.barton.de/doc/NEWS"
|
||||
"url": "http://arthur.barton.de/cgi-bin/gitweb.cgi?p=ngircd.git;a=commit;h=627b0b713c52406e50c84bb9459e7794262920a2"
|
||||
},
|
||||
{
|
||||
"name": "37021",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/37021"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-3240",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3240"
|
||||
},
|
||||
{
|
||||
"name": "37343",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37343"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-3240",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/3240"
|
||||
"name": "http://ngircd.barton.de/doc/NEWS",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://ngircd.barton.de/doc/NEWS"
|
||||
},
|
||||
{
|
||||
"name": "ngircd-ssltls-dos(54272)",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090301 EZ-Blog Beta 1 Multiple SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/501352/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "8128",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/8128"
|
||||
},
|
||||
{
|
||||
"name": "20090301 EZ-Blog Beta 1 Multiple SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/501352/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg24019529&aid=1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg24019529&aid=1"
|
||||
},
|
||||
{
|
||||
"name": "http://www-10.lotus.com/ldd/dominowiki.nsf/page.xsp?documentId=A6604E906E0DF2DF8525778B005D4466&action=openDocument",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-10.lotus.com/ldd/dominowiki.nsf/page.xsp?documentId=A6604E906E0DF2DF8525778B005D4466&action=openDocument"
|
||||
},
|
||||
{
|
||||
"name": "ibm-lnt-email-information-disclosure(64743)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64743"
|
||||
},
|
||||
{
|
||||
"name": "LO38116",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO38116"
|
||||
},
|
||||
{
|
||||
"name" : "ibm-lnt-email-information-disclosure(64743)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64743"
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg24019529&aid=1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg24019529&aid=1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2012-2260",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2012-2798",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,56 +52,56 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/08/31/3"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
|
||||
},
|
||||
{
|
||||
"name" : "http://ffmpeg.org/security.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://ffmpeg.org/security.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=72b9537d8886f679494651df517dfed9b420cf1f",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=72b9537d8886f679494651df517dfed9b420cf1f"
|
||||
},
|
||||
{
|
||||
"name" : "http://libav.org/releases/libav-0.7.7.changelog",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://libav.org/releases/libav-0.7.7.changelog"
|
||||
},
|
||||
{
|
||||
"name" : "http://libav.org/releases/libav-0.8.4.changelog",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://libav.org/releases/libav-0.8.4.changelog"
|
||||
},
|
||||
{
|
||||
"name": "http://libav.org/releases/libav-0.8.5.changelog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://libav.org/releases/libav-0.8.5.changelog"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:079",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
|
||||
"name": "http://libav.org/releases/libav-0.8.4.changelog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://libav.org/releases/libav-0.8.4.changelog"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1705-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1705-1"
|
||||
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=72b9537d8886f679494651df517dfed9b420cf1f",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=72b9537d8886f679494651df517dfed9b420cf1f"
|
||||
},
|
||||
{
|
||||
"name": "55355",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/55355"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:079",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
|
||||
},
|
||||
{
|
||||
"name": "http://ffmpeg.org/security.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://ffmpeg.org/security.html"
|
||||
},
|
||||
{
|
||||
"name": "http://libav.org/releases/libav-0.7.7.changelog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://libav.org/releases/libav-0.7.7.changelog"
|
||||
},
|
||||
{
|
||||
"name": "USN-1705-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1705-1"
|
||||
},
|
||||
{
|
||||
"name": "50468",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2012-3899",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,25 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "RHSA-2012:1211",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16853",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16853"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=771976",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=771976"
|
||||
"name": "USN-1548-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1548-1"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:1211",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1211.html"
|
||||
"name": "USN-1548-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1548-2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1210",
|
||||
@ -82,35 +87,30 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2012:1065",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:1157",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1548-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1548-2"
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=771976",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=771976"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1548-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1548-1"
|
||||
"name": "openSUSE-SU-2012:1065",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
|
||||
},
|
||||
{
|
||||
"name": "55325",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/55325"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16853",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16853"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,25 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-usb.c?r1=45310&r2=45309&pathrev=45310",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-usb.c?r1=45310&r2=45309&pathrev=45310"
|
||||
},
|
||||
{
|
||||
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45310",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45310"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2012-31.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2012-31.html"
|
||||
"name": "oval:org.mitre.oval:def:15915",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15915"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7787",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7787"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2012-31.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2012-31.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2012:1633",
|
||||
"refsource": "SUSE",
|
||||
@ -83,9 +78,14 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:15915",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15915"
|
||||
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45310",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45310"
|
||||
},
|
||||
{
|
||||
"name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-usb.c?r1=45310&r2=45309&pathrev=45310",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-usb.c?r1=45310&r2=45309&pathrev=45310"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2012-6284",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2015-5263",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150924 Pulp 2.6.4 released for CVE-2015-5263",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/09/24/4"
|
||||
},
|
||||
{
|
||||
"name": "http://cve.killedkenny.io/cve/CVE-2015-5263",
|
||||
"refsource": "MISC",
|
||||
"url": "http://cve.killedkenny.io/cve/CVE-2015-5263"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/pulp/pulp/blob/aa432bf58497b5e3682333b1d5f5ae4f45788a61/client_consumer/pulp/client/consumer/cli.py#L103",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/pulp/pulp/blob/aa432bf58497b5e3682333b1d5f5ae4f45788a61/client_consumer/pulp/client/consumer/cli.py#L103"
|
||||
"name": "[oss-security] 20150924 Pulp 2.6.4 released for CVE-2015-5263",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/09/24/4"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/pulp/pulp/commit/b542d7465f7e6e02e1ea1aec059ac607a65cefe7#diff-17110211f89c042a9267e2167dedd754",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/pulp/pulp/commit/b542d7465f7e6e02e1ea1aec059ac607a65cefe7#diff-17110211f89c042a9267e2167dedd754"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/pulp/pulp/blob/aa432bf58497b5e3682333b1d5f5ae4f45788a61/client_consumer/pulp/client/consumer/cli.py#L103",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/pulp/pulp/blob/aa432bf58497b5e3682333b1d5f5ae4f45788a61/client_consumer/pulp/client/consumer/cli.py#L103"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-5887",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205267",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205267"
|
||||
"name": "1033703",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033703"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-09-30-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205267",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205267"
|
||||
},
|
||||
{
|
||||
"name": "76908",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/76908"
|
||||
},
|
||||
{
|
||||
"name" : "1033703",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033703"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-5926",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205370",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205370"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205375",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205375"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205378",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205378"
|
||||
"name": "APPLE-SA-2015-10-21-4",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-10-21-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205375",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205375"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-10-21-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-10-21-4",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
|
||||
"name": "https://support.apple.com/HT205370",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205370"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205378",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205378"
|
||||
},
|
||||
{
|
||||
"name": "1033929",
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20181004 CVE update - fixed in Apache Ranger 1.2.0",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://seclists.org/oss-sec/2018/q4/11"
|
||||
},
|
||||
{
|
||||
"name": "https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20181004 CVE update - fixed in Apache Ranger 1.2.0",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://seclists.org/oss-sec/2018/q4/11"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "psampaio@redhat.com",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2018-14652",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -62,6 +62,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "RHSA-2018:3431",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3431"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20181105 [SECURITY] [DLA 1565-1] glusterfs security update",
|
||||
"refsource": "MLIST",
|
||||
@ -72,11 +77,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14652"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:3431",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:3431"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:3432",
|
||||
"refsource": "REDHAT",
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/techcommsuite/apsb18-38.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/techcommsuite/apsb18-38.html"
|
||||
},
|
||||
{
|
||||
"name": "105535",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105535"
|
||||
},
|
||||
{
|
||||
"name" : "1041819",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041819"
|
||||
},
|
||||
{
|
||||
"name": "1041820",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041820"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/techcommsuite/apsb18-38.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/techcommsuite/apsb18-38.html"
|
||||
},
|
||||
{
|
||||
"name": "1041819",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041819"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
|
||||
},
|
||||
{
|
||||
"name": "106164",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106164"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user