mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
523431e023
commit
5360620792
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060201 Blackboard Authentication Error",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/423654/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060201 Re: Blackboard Authentication Error",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/423686/100/0/threaded"
|
||||
"name": "16438",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16438"
|
||||
},
|
||||
{
|
||||
"name": "20060202 Re: Blackboard Authentication Error",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/423778/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "16438",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16438"
|
||||
"name": "20060201 Re: Blackboard Authentication Error",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/423686/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20060201 Blackboard Authentication Error",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/423654/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "28023",
|
||||
|
@ -53,39 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060224 [eVuln] Guestex XSS Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/426034/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.evuln.com/vulns/77/summary.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.evuln.com/vulns/77/summary.html"
|
||||
"name": "18927",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18927"
|
||||
},
|
||||
{
|
||||
"name": "16711",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16711"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0640",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0640"
|
||||
},
|
||||
{
|
||||
"name" : "23182",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/23182"
|
||||
},
|
||||
{
|
||||
"name": "1015678",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015678"
|
||||
},
|
||||
{
|
||||
"name" : "18927",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18927"
|
||||
"name": "http://www.evuln.com/vulns/77/summary.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.evuln.com/vulns/77/summary.html"
|
||||
},
|
||||
{
|
||||
"name": "guestex-script-xss(24644)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24644"
|
||||
},
|
||||
{
|
||||
"name": "490",
|
||||
@ -93,9 +83,19 @@
|
||||
"url": "http://securityreason.com/securityalert/490"
|
||||
},
|
||||
{
|
||||
"name" : "guestex-script-xss(24644)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24644"
|
||||
"name": "23182",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/23182"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0640",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0640"
|
||||
},
|
||||
{
|
||||
"name": "20060224 [eVuln] Guestex XSS Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/426034/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060705 Re: phpSysInfo arbitrary file identification",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0066.html"
|
||||
"name": "1016440",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016440"
|
||||
},
|
||||
{
|
||||
"name" : "20060705 phpSysInfo arbitrary file identification",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0065.html"
|
||||
},
|
||||
{
|
||||
"name" : "18868",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18868"
|
||||
"name": "phpsysinfo-lng-information-disclosure(27527)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27527"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2668",
|
||||
@ -77,20 +72,25 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/27015"
|
||||
},
|
||||
{
|
||||
"name" : "1016440",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016440"
|
||||
},
|
||||
{
|
||||
"name": "20939",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20939"
|
||||
},
|
||||
{
|
||||
"name" : "phpsysinfo-lng-information-disclosure(27527)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27527"
|
||||
"name": "20060705 Re: phpSysInfo arbitrary file identification",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0066.html"
|
||||
},
|
||||
{
|
||||
"name": "18868",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18868"
|
||||
},
|
||||
{
|
||||
"name": "20060705 phpSysInfo arbitrary file identification",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0065.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060704 Re: file include exploits in randshop v1.2",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/439063/100/0/threaded"
|
||||
"name": "18809",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18809"
|
||||
},
|
||||
{
|
||||
"name": "20060704 file include exploits in randshop v1.2",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/439040/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "18809",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18809"
|
||||
},
|
||||
{
|
||||
"name": "1016438",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016438"
|
||||
},
|
||||
{
|
||||
"name": "20060704 Re: file include exploits in randshop v1.2",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/439063/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://lostmon.blogspot.com/2006/07/multiple-vulnerabilities-in.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://lostmon.blogspot.com/2006/07/multiple-vulnerabilities-in.html"
|
||||
},
|
||||
{
|
||||
"name" : "18840",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18840"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-2690",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/2690"
|
||||
},
|
||||
{
|
||||
"name": "27016",
|
||||
"refsource": "OSVDB",
|
||||
@ -77,10 +62,25 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016439"
|
||||
},
|
||||
{
|
||||
"name": "18840",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18840"
|
||||
},
|
||||
{
|
||||
"name": "http://lostmon.blogspot.com/2006/07/multiple-vulnerabilities-in.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://lostmon.blogspot.com/2006/07/multiple-vulnerabilities-in.html"
|
||||
},
|
||||
{
|
||||
"name": "20959",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20959"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2690",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2690"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,120 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060725 TSRT-06-03: eIQnetworks Enterprise Security Analyzer Syslog Server Buffer Overflow Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/441200/100/0/threaded"
|
||||
"name": "http://www.tippingpoint.com/security/advisories/TSRT-06-07.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.tippingpoint.com/security/advisories/TSRT-06-07.html"
|
||||
},
|
||||
{
|
||||
"name": "19167",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19167"
|
||||
},
|
||||
{
|
||||
"name": "http://www.eiqnetworks.com/products/enterprisesecurity/EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.eiqnetworks.com/products/enterprisesecurity/EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf"
|
||||
},
|
||||
{
|
||||
"name": "21218",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21218"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3007",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3007"
|
||||
},
|
||||
{
|
||||
"name": "27526",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/27526"
|
||||
},
|
||||
{
|
||||
"name": "eiqnetworks-esa-syslog-string-bo(27950)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27950"
|
||||
},
|
||||
{
|
||||
"name": "21217",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21217"
|
||||
},
|
||||
{
|
||||
"name": "27527",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/27527"
|
||||
},
|
||||
{
|
||||
"name": "1016580",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016580"
|
||||
},
|
||||
{
|
||||
"name": "http://www.tippingpoint.com/security/advisories/TSRT-06-03.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.tippingpoint.com/security/advisories/TSRT-06-03.html"
|
||||
},
|
||||
{
|
||||
"name": "19163",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19163"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2985",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2985"
|
||||
},
|
||||
{
|
||||
"name": "20060725 TSRT-06-04: eIQnetworks Enterprise Security Analyzer Topology Server Buffer Overflow Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/441198/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "21215",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21215"
|
||||
},
|
||||
{
|
||||
"name": "20060725 ZDI-06-024: eIQNetworks Enterprise Security Analyzer License Manager Buffer Overflow Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/441195/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3008",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3008"
|
||||
},
|
||||
{
|
||||
"name": "eiqnetworks-esa-topology-bo(27953)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27953"
|
||||
},
|
||||
{
|
||||
"name": "27528",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/27528"
|
||||
},
|
||||
{
|
||||
"name": "21211",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21211"
|
||||
},
|
||||
{
|
||||
"name": "19164",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19164"
|
||||
},
|
||||
{
|
||||
"name": "VU#513068",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/513068"
|
||||
},
|
||||
{
|
||||
"name": "20060725 TSRT-06-03: eIQnetworks Enterprise Security Analyzer Syslog Server Buffer Overflow Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/441200/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20060808 TSRT-06-07: eIQnetworks Enterprise Security Analyzer Monitoring Agent Buffer Overflow Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -73,9 +178,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/441197/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060725 ZDI-06-024: eIQNetworks Enterprise Security Analyzer License Manager Buffer Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/441195/100/0/threaded"
|
||||
"name": "ADV-2006-3006",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3006"
|
||||
},
|
||||
{
|
||||
"name": "http://www.tippingpoint.com/security/advisories/TSRT-06-04.html",
|
||||
@ -83,149 +188,24 @@
|
||||
"url": "http://www.tippingpoint.com/security/advisories/TSRT-06-04.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.tippingpoint.com/security/advisories/TSRT-06-07.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.tippingpoint.com/security/advisories/TSRT-06-07.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-06-023.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-06-023.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-06-024.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-06-024.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.eiqnetworks.com/products/enterprisesecurity/EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.eiqnetworks.com/products/enterprisesecurity/EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.tippingpoint.com/security/advisories/TSRT-06-03.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.tippingpoint.com/security/advisories/TSRT-06-03.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#513068",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/513068"
|
||||
},
|
||||
{
|
||||
"name" : "19163",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19163"
|
||||
},
|
||||
{
|
||||
"name" : "19164",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19164"
|
||||
"name": "21214",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21214"
|
||||
},
|
||||
{
|
||||
"name": "19165",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19165"
|
||||
},
|
||||
{
|
||||
"name" : "19167",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19167"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-2985",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/2985"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3007",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3007"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3010",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3010"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3006",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3006"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3008",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3008"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3009",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3009"
|
||||
},
|
||||
{
|
||||
"name": "27525",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/27525"
|
||||
},
|
||||
{
|
||||
"name" : "27526",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/27526"
|
||||
},
|
||||
{
|
||||
"name" : "27527",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/27527"
|
||||
},
|
||||
{
|
||||
"name" : "27528",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/27528"
|
||||
},
|
||||
{
|
||||
"name" : "1016580",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016580"
|
||||
},
|
||||
{
|
||||
"name" : "21211",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21211"
|
||||
},
|
||||
{
|
||||
"name" : "21213",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21213"
|
||||
},
|
||||
{
|
||||
"name" : "21217",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21217"
|
||||
},
|
||||
{
|
||||
"name" : "21214",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21214"
|
||||
},
|
||||
{
|
||||
"name" : "21215",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21215"
|
||||
},
|
||||
{
|
||||
"name" : "21218",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21218"
|
||||
},
|
||||
{
|
||||
"name" : "eiqnetworks-esa-syslog-string-bo(27950)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27950"
|
||||
},
|
||||
{
|
||||
"name" : "eiqnetworks-esa-monitoring-bo(27954)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27954"
|
||||
"name": "ADV-2006-3010",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3010"
|
||||
},
|
||||
{
|
||||
"name": "eiqnetworks-esa-licensemanager-bo(27952)",
|
||||
@ -238,9 +218,29 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27951"
|
||||
},
|
||||
{
|
||||
"name" : "eiqnetworks-esa-topology-bo(27953)",
|
||||
"name": "21213",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21213"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3009",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3009"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-06-023.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-023.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-06-024.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-024.html"
|
||||
},
|
||||
{
|
||||
"name": "eiqnetworks-esa-monitoring-bo(27954)",
|
||||
"refsource": "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27953"
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27954"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2006-3888",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061011 AOL YGPPDownload SetAlbumName ActiveX Control Buffer Overflow Vulnerability",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=420"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kb.cert.org/vuls/id/MIMG-6MUUJ8",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/MIMG-6MUUJ8"
|
||||
},
|
||||
{
|
||||
"name" : "VU#661524",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/661524"
|
||||
},
|
||||
{
|
||||
"name" : "20425",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20425"
|
||||
"name": "ADV-2006-3967",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3967"
|
||||
},
|
||||
{
|
||||
"name": "20472",
|
||||
@ -78,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/20472"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3967",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3967"
|
||||
"name": "http://www.kb.cert.org/vuls/id/MIMG-6MUUJ8",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kb.cert.org/vuls/id/MIMG-6MUUJ8"
|
||||
},
|
||||
{
|
||||
"name": "1017024",
|
||||
@ -88,19 +73,34 @@
|
||||
"url": "http://securitytracker.com/id?1017024"
|
||||
},
|
||||
{
|
||||
"name" : "22304",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22304"
|
||||
"name": "VU#661524",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/661524"
|
||||
},
|
||||
{
|
||||
"name": "20061011 AOL YGPPDownload SetAlbumName ActiveX Control Buffer Overflow Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=420"
|
||||
},
|
||||
{
|
||||
"name": "aol-ygp-pic-downloader-bo(29410)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29410"
|
||||
},
|
||||
{
|
||||
"name": "20425",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20425"
|
||||
},
|
||||
{
|
||||
"name": "aol-ygp-setalbumname-bo(29494)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29494"
|
||||
},
|
||||
{
|
||||
"name": "22304",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22304"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060821 Diesel Paid Mail getad.php Cross-Site Scripting Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/443929/100/0/threaded"
|
||||
"name": "paidmail-getad-xss(28495)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28495"
|
||||
},
|
||||
{
|
||||
"name" : "19646",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19646"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3352",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3352"
|
||||
"name": "1452",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1452"
|
||||
},
|
||||
{
|
||||
"name": "28072",
|
||||
@ -78,14 +73,19 @@
|
||||
"url": "http://secunia.com/advisories/21568"
|
||||
},
|
||||
{
|
||||
"name" : "1452",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1452"
|
||||
"name": "ADV-2006-3352",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3352"
|
||||
},
|
||||
{
|
||||
"name" : "paidmail-getad-xss(28495)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28495"
|
||||
"name": "20060821 Diesel Paid Mail getad.php Cross-Site Scripting Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/443929/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "19646",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19646"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061005 rPSA-2006-0182-1 php php-mysql php-pgsql",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/447866/100/0/threaded"
|
||||
"name": "oval:org.mitre.oval:def:10121",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10121"
|
||||
},
|
||||
{
|
||||
"name" : "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.php.net/ChangeLog-5.php#5.1.5",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.php.net/ChangeLog-5.php#5.1.5"
|
||||
"name": "1016984",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016984"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php.net/release_5_1_5.php",
|
||||
@ -78,24 +73,9 @@
|
||||
"url": "https://issues.rpath.com/browse/RPL-683"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1206",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1206"
|
||||
"name": "21768",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21768"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2006:0669",
|
||||
@ -103,15 +83,115 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2006-0669.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2006:0682",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0682.html"
|
||||
"name": "22487",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22487"
|
||||
},
|
||||
{
|
||||
"name": "USN-342-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-342-1"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-221.htm"
|
||||
},
|
||||
{
|
||||
"name": "22039",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22039"
|
||||
},
|
||||
{
|
||||
"name": "TLSA-2006-38",
|
||||
"refsource": "TURBO",
|
||||
"url": "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2006:0688",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2006-0688.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1206",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1206"
|
||||
},
|
||||
{
|
||||
"name": "19582",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19582"
|
||||
},
|
||||
{
|
||||
"name": "22004",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22004"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-222.htm"
|
||||
},
|
||||
{
|
||||
"name": "22538",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22538"
|
||||
},
|
||||
{
|
||||
"name": "22713",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22713"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2006:0682",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2006-0682.html"
|
||||
},
|
||||
{
|
||||
"name": "21546",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21546"
|
||||
},
|
||||
{
|
||||
"name": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11",
|
||||
"refsource": "MISC",
|
||||
"url": "http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11"
|
||||
},
|
||||
{
|
||||
"name": "22440",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22440"
|
||||
},
|
||||
{
|
||||
"name": "20061005 rPSA-2006-0182-1 php php-mysql php-pgsql",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/447866/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "22069",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22069"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3318",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3318"
|
||||
},
|
||||
{
|
||||
"name": "22225",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22225"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-223.htm"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php.net/ChangeLog-5.php#5.1.5",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.php.net/ChangeLog-5.php#5.1.5"
|
||||
},
|
||||
{
|
||||
"name": "20061001-01-P",
|
||||
"refsource": "SGI",
|
||||
@ -121,86 +201,6 @@
|
||||
"name": "SUSE-SA:2006:052",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2006_52_php.html"
|
||||
},
|
||||
{
|
||||
"name" : "TLSA-2006-38",
|
||||
"refsource" : "TURBO",
|
||||
"url" : "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt"
|
||||
},
|
||||
{
|
||||
"name" : "USN-342-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-342-1"
|
||||
},
|
||||
{
|
||||
"name" : "19582",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19582"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10121",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10121"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3318",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3318"
|
||||
},
|
||||
{
|
||||
"name" : "1016984",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016984"
|
||||
},
|
||||
{
|
||||
"name" : "21546",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21546"
|
||||
},
|
||||
{
|
||||
"name" : "21768",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21768"
|
||||
},
|
||||
{
|
||||
"name" : "22004",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22004"
|
||||
},
|
||||
{
|
||||
"name" : "22069",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22069"
|
||||
},
|
||||
{
|
||||
"name" : "22225",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22225"
|
||||
},
|
||||
{
|
||||
"name" : "22440",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22440"
|
||||
},
|
||||
{
|
||||
"name" : "22538",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22538"
|
||||
},
|
||||
{
|
||||
"name" : "22487",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22487"
|
||||
},
|
||||
{
|
||||
"name" : "22713",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22713"
|
||||
},
|
||||
{
|
||||
"name" : "22039",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22039"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://cybozu.co.jp/products/dl/notice_060825/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://cybozu.co.jp/products/dl/notice_060825/"
|
||||
},
|
||||
{
|
||||
"name": "JVN#90420168",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/jp/JVN%2390420168/index.html"
|
||||
},
|
||||
{
|
||||
"name": "http://cybozu.co.jp/products/dl/notice_060825/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cybozu.co.jp/products/dl/notice_060825/"
|
||||
},
|
||||
{
|
||||
"name": "28262",
|
||||
"refsource": "OSVDB",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "21269",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21269"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4685",
|
||||
"refsource": "VUPEN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "23082",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23082"
|
||||
},
|
||||
{
|
||||
"name": "21269",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21269"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061118 [MajorSecurity Advisory #36]dev4u CMS - Multiple SQL Injection and Cross Site Scripting Issues",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/452008/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls36",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls36"
|
||||
},
|
||||
{
|
||||
"name" : "21170",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21170"
|
||||
},
|
||||
{
|
||||
"name": "dev4ucms-index-sql-injection(30395)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30395"
|
||||
},
|
||||
{
|
||||
"name": "20061118 [MajorSecurity Advisory #36]dev4u CMS - Multiple SQL Injection and Cross Site Scripting Issues",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/452008/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name": "21170",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21170"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2010-2208",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ADV-2010-1636",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1636"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb10-15.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,20 +67,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/41244"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:7188",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7188"
|
||||
},
|
||||
{
|
||||
"name": "1024159",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1024159"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-1636",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/1636"
|
||||
"name": "oval:org.mitre.oval:def:7188",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7188"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "14260",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/14260"
|
||||
},
|
||||
{
|
||||
"name": "66155",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/66155"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-1766",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/1766"
|
||||
"name": "14260",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/14260"
|
||||
},
|
||||
{
|
||||
"name": "sijio-parent-sql-injection(60177)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60177"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1766",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1766"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2010-2861",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@ubuntu.com",
|
||||
"ID": "CVE-2010-3905",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://open.eucalyptus.com/wiki/esa-01",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://open.eucalyptus.com/wiki/esa-01"
|
||||
"name": "45462",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/45462"
|
||||
},
|
||||
{
|
||||
"name": "USN-1033-1",
|
||||
@ -63,34 +63,34 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-1033-1"
|
||||
},
|
||||
{
|
||||
"name" : "45462",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/45462"
|
||||
},
|
||||
{
|
||||
"name" : "42632",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42632"
|
||||
"name": "eucalyptus-adminui-security-bypass(64167)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64167"
|
||||
},
|
||||
{
|
||||
"name": "42666",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42666"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-3259",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/3259"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-3260",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/3260"
|
||||
},
|
||||
{
|
||||
"name" : "eucalyptus-adminui-security-bypass(64167)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64167"
|
||||
"name": "42632",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42632"
|
||||
},
|
||||
{
|
||||
"name": "http://open.eucalyptus.com/wiki/esa-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://open.eucalyptus.com/wiki/esa-01"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-3259",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/3259"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2011-0256",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20110118 AST-2011-001: Stack buffer overflow in SIP channel driver",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/515781/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff"
|
||||
},
|
||||
{
|
||||
"name" : "http://downloads.asterisk.org/pub/security/AST-2011-001.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://downloads.asterisk.org/pub/security/AST-2011-001.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2171",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2011/dsa-2171"
|
||||
"name": "ADV-2011-0159",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0159"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-0794",
|
||||
@ -78,29 +63,9 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053713.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2011-0774",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html"
|
||||
},
|
||||
{
|
||||
"name" : "45839",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/45839"
|
||||
},
|
||||
{
|
||||
"name" : "70518",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/70518"
|
||||
},
|
||||
{
|
||||
"name" : "43119",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43119"
|
||||
},
|
||||
{
|
||||
"name" : "42935",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42935"
|
||||
"name": "http://downloads.asterisk.org/pub/security/AST-2011-001.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://downloads.asterisk.org/pub/security/AST-2011-001.html"
|
||||
},
|
||||
{
|
||||
"name": "43373",
|
||||
@ -108,9 +73,19 @@
|
||||
"url": "http://secunia.com/advisories/43373"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0159",
|
||||
"name": "ADV-2011-0449",
|
||||
"refsource": "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0159"
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0449"
|
||||
},
|
||||
{
|
||||
"name": "70518",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/70518"
|
||||
},
|
||||
{
|
||||
"name": "45839",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/45839"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0281",
|
||||
@ -118,14 +93,39 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0281"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0449",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0449"
|
||||
"name": "FEDORA-2011-0774",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053689.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2171",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2011/dsa-2171"
|
||||
},
|
||||
{
|
||||
"name": "43119",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43119"
|
||||
},
|
||||
{
|
||||
"name": "asterisk-asturiencode-bo(64831)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64831"
|
||||
},
|
||||
{
|
||||
"name": "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff",
|
||||
"refsource": "MISC",
|
||||
"url": "http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff"
|
||||
},
|
||||
{
|
||||
"name": "20110118 AST-2011-001: Stack buffer overflow in SIP channel driver",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/515781/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "42935",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42935"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-1166",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wiki.xen.org/wiki/Security_Announcements#XSA-1_Host_crash_due_to_failure_to_correctly_validate_PV_kernel_execution_state."
|
||||
},
|
||||
{
|
||||
"name" : "http://downloads.avaya.com/css/P8/documents/100145416",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://downloads.avaya.com/css/P8/documents/100145416"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0833",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2011-0833.html"
|
||||
},
|
||||
{
|
||||
"name": "http://downloads.avaya.com/css/P8/documents/100145416",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://downloads.avaya.com/css/P8/documents/100145416"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-1591",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,6 +57,31 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/17185"
|
||||
},
|
||||
{
|
||||
"name": "wireshark-dect-bo(66834)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66834"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:083",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:083"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-5621",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058900.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-5529",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058993.html"
|
||||
},
|
||||
{
|
||||
"name": "17195",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -68,29 +93,9 @@
|
||||
"url": "http://openwall.com/lists/oss-security/2011/04/18/8"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110418 Wireshark 1.2.16 / 1.4.5",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2011/04/18/2"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2011-06.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2011-06.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5836"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2011-5529",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058993.html"
|
||||
"name": "oval:org.mitre.oval:def:15000",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15000"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-5569",
|
||||
@ -98,19 +103,9 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058983.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2011-5621",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058900.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2011:083",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:083"
|
||||
},
|
||||
{
|
||||
"name" : "VU#243670",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/243670"
|
||||
"name": "44374",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/44374"
|
||||
},
|
||||
{
|
||||
"name": "71848",
|
||||
@ -118,14 +113,14 @@
|
||||
"url": "http://www.osvdb.org/71848"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:15000",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15000"
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2011-06.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2011-06.html"
|
||||
},
|
||||
{
|
||||
"name" : "1025389",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1025389"
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838"
|
||||
},
|
||||
{
|
||||
"name": "44172",
|
||||
@ -133,24 +128,29 @@
|
||||
"url": "http://secunia.com/advisories/44172"
|
||||
},
|
||||
{
|
||||
"name" : "44374",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/44374"
|
||||
"name": "1025389",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1025389"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-1022",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/1022"
|
||||
},
|
||||
{
|
||||
"name": "VU#243670",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/243670"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110418 Wireshark 1.2.16 / 1.4.5",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2011/04/18/2"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-1106",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/1106"
|
||||
},
|
||||
{
|
||||
"name" : "wireshark-dect-bo(66834)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66834"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2011-1969",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS11-079",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-079"
|
||||
},
|
||||
{
|
||||
"name": "49983",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/49983"
|
||||
},
|
||||
{
|
||||
"name": "MS11-079",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-079"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:13032",
|
||||
"refsource": "OVAL",
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/78009"
|
||||
},
|
||||
{
|
||||
"name" : "47139",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/47139"
|
||||
},
|
||||
{
|
||||
"name": "obm-test-information-disclosure(71924)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71924"
|
||||
},
|
||||
{
|
||||
"name": "47139",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/47139"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-2965",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "68143",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/68143"
|
||||
},
|
||||
{
|
||||
"name": "VU#849500",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/849500"
|
||||
},
|
||||
{
|
||||
"name": "20140623 SpamTitan contains a reflected cross-site scripting (XSS) vulnerability CVE-2014-2965",
|
||||
"refsource": "FULLDISC",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "http://packetstormsecurity.com/files/127184/SpamTitan-6.01-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/127184/SpamTitan-6.01-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#849500",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/849500"
|
||||
},
|
||||
{
|
||||
"name" : "68143",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/68143"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2014-3293",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,25 +57,25 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36195"
|
||||
},
|
||||
{
|
||||
"name" : "20141027 Cisco ASR901 Crafted IPv4 Packet Denial of Service Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3293"
|
||||
},
|
||||
{
|
||||
"name": "70744",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/70744"
|
||||
},
|
||||
{
|
||||
"name": "61830",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/61830"
|
||||
},
|
||||
{
|
||||
"name": "1031122",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031122"
|
||||
},
|
||||
{
|
||||
"name" : "61830",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/61830"
|
||||
"name": "20141027 Cisco ASR901 Crafted IPv4 Packet Denial of Service Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3293"
|
||||
},
|
||||
{
|
||||
"name": "cisco-asr901-cve20143293-dos(97769)",
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://blog.guya.net/2014/04/07/to-listen-without-consent-abusing-the-html5-speech/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blog.guya.net/2014/04/07/to-listen-without-consent-abusing-the-html5-speech/"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=360448",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=360448"
|
||||
},
|
||||
{
|
||||
"name": "https://src.chromium.org/viewvc/blink?revision=171373&view=revision",
|
||||
"refsource": "CONFIRM",
|
||||
@ -77,10 +62,25 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/67582"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=360448",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=360448"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html"
|
||||
},
|
||||
{
|
||||
"name": "60372",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60372"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.guya.net/2014/04/07/to-listen-without-consent-abusing-the-html5-speech/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.guya.net/2014/04/07/to-listen-without-consent-abusing-the-html5-speech/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "70204",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/70204"
|
||||
},
|
||||
{
|
||||
"name": "20141001 Cross-Site Scripting (XSS) in Photo Gallery WordPress plugin",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/533595/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/128518/WordPress-Photo-Gallery-1.1.30-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/128518/WordPress-Photo-Gallery-1.1.30-Cross-Site-Scripting.html"
|
||||
"name": "wp-photogallery-cve20146315-xss(96799)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96799"
|
||||
},
|
||||
{
|
||||
"name": "https://www.htbridge.com/advisory/HTB23232",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.htbridge.com/advisory/HTB23232"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/128518/WordPress-Photo-Gallery-1.1.30-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/128518/WordPress-Photo-Gallery-1.1.30-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "https://plugins.trac.wordpress.org/changeset?new=986500",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?new=986500"
|
||||
},
|
||||
{
|
||||
"name" : "70204",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/70204"
|
||||
},
|
||||
{
|
||||
"name": "61649",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/61649"
|
||||
},
|
||||
{
|
||||
"name" : "wp-photogallery-cve20146315-xss(96799)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/96799"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-6360",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-6754",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#159481",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-6763",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
"name": "VU#590065",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/590065"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name" : "VU#590065",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/590065"
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-6865",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#518257",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7070",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#301249",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7456",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#415737",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7475",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
"name": "VU#975417",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/975417"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name" : "VU#975417",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/975417"
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7721",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#949633",
|
||||
"refsource": "CERT-VN",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2014-8638",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,90 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2015-03.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2015-03.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1080987",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1080987"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://linux.oracle.com/errata/ELSA-2015-0046.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://linux.oracle.com/errata/ELSA-2015-0046.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://linux.oracle.com/errata/ELSA-2015-0047.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://linux.oracle.com/errata/ELSA-2015-0047.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3127",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3127"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3132",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3132"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201504-01",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:0046",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0046.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:0047",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0047.html"
|
||||
"name": "62242",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62242"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:0133",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:0077",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:0192",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:0171",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:0173",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:0180",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1266",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"
|
||||
"name": "1031533",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031533"
|
||||
},
|
||||
{
|
||||
"name": "USN-2460-1",
|
||||
@ -148,64 +78,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/72047"
|
||||
},
|
||||
{
|
||||
"name" : "1031533",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1031533"
|
||||
},
|
||||
{
|
||||
"name" : "1031534",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1031534"
|
||||
},
|
||||
{
|
||||
"name" : "62237",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62237"
|
||||
},
|
||||
{
|
||||
"name" : "62242",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62242"
|
||||
},
|
||||
{
|
||||
"name" : "62250",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62250"
|
||||
},
|
||||
{
|
||||
"name" : "62446",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62446"
|
||||
},
|
||||
{
|
||||
"name" : "62657",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62657"
|
||||
},
|
||||
{
|
||||
"name" : "62790",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62790"
|
||||
},
|
||||
{
|
||||
"name" : "62253",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62253"
|
||||
},
|
||||
{
|
||||
"name" : "62273",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62273"
|
||||
},
|
||||
{
|
||||
"name" : "62274",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62274"
|
||||
},
|
||||
{
|
||||
"name" : "62293",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62293"
|
||||
"name": "openSUSE-SU-2015:0192",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "62304",
|
||||
@ -213,19 +88,9 @@
|
||||
"url": "http://secunia.com/advisories/62304"
|
||||
},
|
||||
{
|
||||
"name" : "62313",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62313"
|
||||
},
|
||||
{
|
||||
"name" : "62315",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62315"
|
||||
},
|
||||
{
|
||||
"name" : "62316",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62316"
|
||||
"name": "http://linux.oracle.com/errata/ELSA-2015-0047.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://linux.oracle.com/errata/ELSA-2015-0047.html"
|
||||
},
|
||||
{
|
||||
"name": "62259",
|
||||
@ -233,19 +98,154 @@
|
||||
"url": "http://secunia.com/advisories/62259"
|
||||
},
|
||||
{
|
||||
"name" : "62283",
|
||||
"name": "62250",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62283"
|
||||
"url": "http://secunia.com/advisories/62250"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:0173",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html"
|
||||
},
|
||||
{
|
||||
"name": "62237",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62237"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0077",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name": "62418",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62418"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:0171",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1080987",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1080987"
|
||||
},
|
||||
{
|
||||
"name": "62316",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62316"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3132",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3132"
|
||||
},
|
||||
{
|
||||
"name": "62274",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62274"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201504-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name": "62313",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62313"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:0047",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0047.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2014/mfsa2015-03.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2014/mfsa2015-03.html"
|
||||
},
|
||||
{
|
||||
"name": "62790",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62790"
|
||||
},
|
||||
{
|
||||
"name": "62293",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62293"
|
||||
},
|
||||
{
|
||||
"name": "62283",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62283"
|
||||
},
|
||||
{
|
||||
"name": "firefox-cve20148638-csrf(99958)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99958"
|
||||
},
|
||||
{
|
||||
"name": "62446",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62446"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
|
||||
},
|
||||
{
|
||||
"name": "62657",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62657"
|
||||
},
|
||||
{
|
||||
"name": "62273",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62273"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0133",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1266",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3127",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3127"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:0180",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html"
|
||||
},
|
||||
{
|
||||
"name": "62315",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62315"
|
||||
},
|
||||
{
|
||||
"name": "http://linux.oracle.com/errata/ELSA-2015-0046.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://linux.oracle.com/errata/ELSA-2015-0046.html"
|
||||
},
|
||||
{
|
||||
"name": "62253",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62253"
|
||||
},
|
||||
{
|
||||
"name": "1031534",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031534"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2016-2812",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-42.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-42.html"
|
||||
"name": "openSUSE-SU-2016:1211",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "1035692",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035692"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1251",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2936-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2936-2"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1261776",
|
||||
@ -68,34 +83,19 @@
|
||||
"url": "https://security.gentoo.org/glsa/201701-15"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1211",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1251",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html"
|
||||
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-42.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-42.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2936-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2936-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2936-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2936-2"
|
||||
},
|
||||
{
|
||||
"name": "USN-2936-3",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2936-3"
|
||||
},
|
||||
{
|
||||
"name" : "1035692",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1035692"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2016-2814",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,54 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-44.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-44.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1254721",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1254721"
|
||||
"name": "openSUSE-SU-2016:1211",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3559",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3559"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201701-15",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201701-15"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:0695",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-0695.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1211",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1258",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1251",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1352",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html"
|
||||
"name": "1035692",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035692"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1374",
|
||||
@ -108,24 +78,54 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2936-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2936-1"
|
||||
"name": "openSUSE-SU-2016:1251",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2936-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2936-2"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:1352",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-15"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-44.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-44.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3559",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3559"
|
||||
},
|
||||
{
|
||||
"name": "USN-2936-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2936-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2936-3",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2936-3"
|
||||
},
|
||||
{
|
||||
"name" : "1035692",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1035692"
|
||||
"name": "SUSE-SU-2016:1258",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1254721",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1254721"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2016-2914",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988263",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988263"
|
||||
},
|
||||
{
|
||||
"name": "92334",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92334"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21988263",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988263"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "100214",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/100214"
|
||||
},
|
||||
{
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/126684",
|
||||
"refsource": "MISC",
|
||||
@ -65,11 +70,6 @@
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006647",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22006647"
|
||||
},
|
||||
{
|
||||
"name" : "100214",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/100214"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user