mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
d7f1fb72f1
commit
564e43034b
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010116 iXsecurity.20001120.compaq-authbo.a",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=97967435023835&w=2"
|
||||
},
|
||||
{
|
||||
"name": "SSRT0705",
|
||||
"refsource": "COMPAQ",
|
||||
"url": "http://www5.compaq.com/products/servers/management/agentsecurity.html"
|
||||
},
|
||||
{
|
||||
"name": "20010116 iXsecurity.20001120.compaq-authbo.a",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=97967435023835&w=2"
|
||||
},
|
||||
{
|
||||
"name": "2200",
|
||||
"refsource": "BID",
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010306 Warftp 1.67b04 Directory Traversal",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=98390925726814&w=2"
|
||||
"name": "874",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/874"
|
||||
},
|
||||
{
|
||||
"name": "http://support.jgaa.com/?cmd=ShowArticle&ID=31",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.jgaa.com/?cmd=ShowArticle&ID=31"
|
||||
},
|
||||
{
|
||||
"name": "20010306 Warftp 1.67b04 Directory Traversal",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=98390925726814&w=2"
|
||||
},
|
||||
{
|
||||
"name": "2444",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2444"
|
||||
},
|
||||
{
|
||||
"name" : "874",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/874"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-10/0012.html"
|
||||
},
|
||||
{
|
||||
"name": "php-includedir-code-execution(7215)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/7215.php"
|
||||
},
|
||||
{
|
||||
"name": "VU#847803",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "3394",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/3394"
|
||||
},
|
||||
{
|
||||
"name" : "php-includedir-code-execution(7215)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/7215.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20011220 Windows XP security concerns",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-12/0213.html"
|
||||
},
|
||||
{
|
||||
"name": "3717",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "winxp-fastswitch-account-lockout(7731)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/7731.php"
|
||||
},
|
||||
{
|
||||
"name": "20011220 Windows XP security concerns",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-12/0213.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-0-1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-0-1"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2006:010",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html"
|
||||
},
|
||||
{
|
||||
"name": "17711",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17711"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1527",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1527"
|
||||
"name": "powerdns-recursor-ednso-dos(26100)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26100"
|
||||
},
|
||||
{
|
||||
"name": "19831",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19831"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2006:010",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html"
|
||||
},
|
||||
{
|
||||
"name": "20117",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20117"
|
||||
},
|
||||
{
|
||||
"name" : "powerdns-recursor-ednso-dos(26100)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26100"
|
||||
"name": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-0-1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-0-1"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1527",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1527"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "17956",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/17956"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1783",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1783"
|
||||
},
|
||||
{
|
||||
"name": "weblabscms-multiple-xss(26421)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26421"
|
||||
},
|
||||
{
|
||||
"name": "20060",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20060"
|
||||
},
|
||||
{
|
||||
"name" : "weblabscms-multiple-xss(26421)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26421"
|
||||
"name": "17956",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17956"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "1821",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/1821"
|
||||
"name": "http://drupal.org/node/65409",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/65409"
|
||||
},
|
||||
{
|
||||
"name": "20060602 [DRUPAL-SA-2006-006] Drupal 4.6.7 / 4.7.1 fixes arbitrary file execution issue",
|
||||
@ -63,14 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/435794/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://drupal.org/node/65409",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://drupal.org/node/65409"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1125",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1125"
|
||||
"name": "20140",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20140"
|
||||
},
|
||||
{
|
||||
"name": "18245",
|
||||
@ -83,9 +78,14 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1975"
|
||||
},
|
||||
{
|
||||
"name" : "20140",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20140"
|
||||
"name": "DSA-1125",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1125"
|
||||
},
|
||||
{
|
||||
"name": "1821",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/1821"
|
||||
},
|
||||
{
|
||||
"name": "21244",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060530 pppBlog <= 0.3.8 administrative credentials/system disclosure",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/435406/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://retrogod.altervista.org/pppblog_038_xpl.html",
|
||||
"refsource": "MISC",
|
||||
@ -67,6 +62,26 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18189"
|
||||
},
|
||||
{
|
||||
"name": "20375",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20375"
|
||||
},
|
||||
{
|
||||
"name": "pppblog-randompic-directory-traversal(26969)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26969"
|
||||
},
|
||||
{
|
||||
"name": "20060530 pppBlog <= 0.3.8 administrative credentials/system disclosure",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/435406/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1015",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1015"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2085",
|
||||
"refsource": "VUPEN",
|
||||
@ -76,21 +91,6 @@
|
||||
"name": "1016198",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016198"
|
||||
},
|
||||
{
|
||||
"name" : "20375",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20375"
|
||||
},
|
||||
{
|
||||
"name" : "1015",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1015"
|
||||
},
|
||||
{
|
||||
"name" : "pppblog-randompic-directory-traversal(26969)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26969"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060603 LifeType <=1.0.4 'articleId' SQL injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/435874/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.lifetype.net/blog.php/lifetype_development_journal/2006/06/04/important_security_upgrade_lifetype_1.0.5_released",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.lifetype.net/blog.php/lifetype_development_journal/2006/06/04/important_security_upgrade_lifetype_1.0.5_released"
|
||||
},
|
||||
{
|
||||
"name": "18264",
|
||||
"refsource": "BID",
|
||||
@ -73,9 +63,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2120"
|
||||
},
|
||||
{
|
||||
"name" : "20460",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20460"
|
||||
"name": "lifetype-articleid-sql-injection(26916)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26916"
|
||||
},
|
||||
{
|
||||
"name": "1046",
|
||||
@ -83,9 +73,19 @@
|
||||
"url": "http://securityreason.com/securityalert/1046"
|
||||
},
|
||||
{
|
||||
"name" : "lifetype-articleid-sql-injection(26916)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26916"
|
||||
"name": "20060603 LifeType <=1.0.4 'articleId' SQL injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/435874/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20460",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20460"
|
||||
},
|
||||
{
|
||||
"name": "http://www.lifetype.net/blog.php/lifetype_development_journal/2006/06/04/important_security_upgrade_lifetype_1.0.5_released",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.lifetype.net/blog.php/lifetype_development_journal/2006/06/04/important_security_upgrade_lifetype_1.0.5_released"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://downloads.securityfocus.com/vulnerabilities/exploits/21641.c",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://downloads.securityfocus.com/vulnerabilities/exploits/21641.c"
|
||||
},
|
||||
{
|
||||
"name": "21641",
|
||||
"refsource": "BID",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "23338",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23338"
|
||||
},
|
||||
{
|
||||
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/21641.c",
|
||||
"refsource": "MISC",
|
||||
"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/21641.c"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2011-2348",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=85177",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=85177"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2011/06/stable-channel-update_28.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2011/06/stable-channel-update_28.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:14324",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14324"
|
||||
"name": "45097",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/45097"
|
||||
},
|
||||
{
|
||||
"name": "1025730",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://www.securitytracker.com/id?1025730"
|
||||
},
|
||||
{
|
||||
"name" : "45097",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/45097"
|
||||
"name": "http://code.google.com/p/chromium/issues/detail?id=85177",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=85177"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14324",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14324"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=111575"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14434",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14434"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html"
|
||||
},
|
||||
{
|
||||
"name": "48016",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2011-3225",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5002",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5002"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-10-12-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "50085",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/50085"
|
||||
},
|
||||
{
|
||||
"name": "76376",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/76376"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5002",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5002"
|
||||
},
|
||||
{
|
||||
"name": "50085",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/50085"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2011-3406",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS11-095",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-095"
|
||||
},
|
||||
{
|
||||
"name": "TA11-347A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-347A.html"
|
||||
},
|
||||
{
|
||||
"name": "MS11-095",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-095"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14037",
|
||||
"refsource": "OVAL",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-3604",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,16 +57,16 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/10/06/3"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.litech.org/radvd/CHANGES",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.litech.org/radvd/CHANGES"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2323",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2011/dsa-2323"
|
||||
},
|
||||
{
|
||||
"name": "http://www.litech.org/radvd/CHANGES",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.litech.org/radvd/CHANGES"
|
||||
},
|
||||
{
|
||||
"name": "USN-1257-1",
|
||||
"refsource": "UBUNTU",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2011-4035",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "schneider-unspec-xss(71503)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71503"
|
||||
},
|
||||
{
|
||||
"name": "http://www.scada.schneider-electric.com/sites/scada/en/login/historian-vulnerability.page",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.scada.schneider-electric.com/sites/scada/en/login/historian-vulnerability.page"
|
||||
},
|
||||
{
|
||||
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-307-01.pdf",
|
||||
"refsource": "MISC",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "http://www.citect.com/index.php?option=com_content&view=article&id=1656&Itemid=1695",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.citect.com/index.php?option=com_content&view=article&id=1656&Itemid=1695"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.scada.schneider-electric.com/sites/scada/en/login/historian-vulnerability.page",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.scada.schneider-electric.com/sites/scada/en/login/historian-vulnerability.page"
|
||||
},
|
||||
{
|
||||
"name" : "schneider-unspec-xss(71503)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71503"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2011-4047",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.kace.com/support/kb/index.php?action=artikel&id=1120&artlang=en",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kace.com/support/kb/index.php?action=artikel&id=1120&artlang=en"
|
||||
},
|
||||
{
|
||||
"name": "VU#589089",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/589089"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kace.com/support/kb/index.php?action=artikel&id=1120&artlang=en",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kace.com/support/kb/index.php?action=artikel&id=1120&artlang=en"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html"
|
||||
"name": "https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py"
|
||||
},
|
||||
{
|
||||
"name" : "18296",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/18296"
|
||||
"name": "HPSBMU02786",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
|
||||
},
|
||||
{
|
||||
"name" : "18305",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/18305"
|
||||
"name": "1026473",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1026473"
|
||||
},
|
||||
{
|
||||
"name": "47404",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/47404"
|
||||
},
|
||||
{
|
||||
"name": "HPSBOV02763",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.nruns.com/_downloads/advisory28122011.pdf",
|
||||
@ -73,14 +83,69 @@
|
||||
"url": "http://www.nruns.com/_downloads/advisory28122011.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ocert.org/advisories/ocert-2011-003.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.ocert.org/advisories/ocert-2011-003.html"
|
||||
"name": "php-hash-dos(72021)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72021"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py"
|
||||
"name": "18296",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/18296"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2399",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2399"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:0411",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:197",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:197"
|
||||
},
|
||||
{
|
||||
"name": "18305",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/18305"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2012:0426",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name": "SSRT100826",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
|
||||
},
|
||||
{
|
||||
"name": "48668",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48668"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:0019",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2012-0019.html"
|
||||
},
|
||||
{
|
||||
"name": "51193",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/51193"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html"
|
||||
},
|
||||
{
|
||||
"name": "VU#903934",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/903934"
|
||||
},
|
||||
{
|
||||
"name": "http://svn.php.net/viewvc?view=revision&revision=321003",
|
||||
@ -93,44 +158,9 @@
|
||||
"url": "http://svn.php.net/viewvc?view=revision&revision=321040"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5281",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5281"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2012-05-09-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2399",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2399"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02741",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=132871655717248&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMU02786",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT100877",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBOV02763",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
|
||||
"name": "RHSA-2012:0071",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-0071.html"
|
||||
},
|
||||
{
|
||||
"name": "SSRT100728",
|
||||
@ -138,14 +168,24 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=132871655717248&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT100826",
|
||||
"name": "SSRT100877",
|
||||
"refsource": "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=133469208622507&w=2"
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2011:197",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:197"
|
||||
"name": "20111228 n.runs-SA-2011.004 - web programming languages and platforms - DoS through hash table",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5281",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5281"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02741",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=132871655717248&w=2"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:150",
|
||||
@ -153,54 +193,14 @@
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:0019",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2012-0019.html"
|
||||
"name": "APPLE-SA-2012-05-09-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:0071",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0071.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2012:0426",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2012:0411",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#903934",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/903934"
|
||||
},
|
||||
{
|
||||
"name" : "51193",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/51193"
|
||||
},
|
||||
{
|
||||
"name" : "1026473",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1026473"
|
||||
},
|
||||
{
|
||||
"name" : "48668",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48668"
|
||||
},
|
||||
{
|
||||
"name" : "47404",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/47404"
|
||||
},
|
||||
{
|
||||
"name" : "php-hash-dos(72021)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72021"
|
||||
"name": "http://www.ocert.org/advisories/ocert-2011-003.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.ocert.org/advisories/ocert-2011-003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2013-0139",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-0467",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21625573",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21625573"
|
||||
},
|
||||
{
|
||||
"name": "iehs-source-disclosure(81102)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81102"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21625573",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21625573"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2013-0920",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_26.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=177410",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=177410"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16552",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16552"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=177410",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=177410"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-1300",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:17353",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17353"
|
||||
},
|
||||
{
|
||||
"name": "33213",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/33213"
|
||||
},
|
||||
{
|
||||
"name" : "MS13-053",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053"
|
||||
},
|
||||
{
|
||||
"name": "TA13-190A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-190A"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:17353",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17353"
|
||||
"name": "MS13-053",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2013-1432",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "55082",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/55082"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201309-24",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130626 Xen Security Advisory 58 (CVE-2013-1432) - Page reference counting error due to XSA-45/CVE-2013-1918 fixes",
|
||||
"refsource": "MLIST",
|
||||
@ -62,25 +72,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.citrix.com/article/CTX138134"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3006",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-3006"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201309-24",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201309-24.xml"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0446",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
|
||||
},
|
||||
{
|
||||
"name" : "55082",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/55082"
|
||||
"name": "DSA-3006",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-3006"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-1987",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20130523 Fwd: [ANNOUNCE] X.Org Security Advisory: Protocol handling issues in X Window System client libraries",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/05/23/3"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2677",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2013/dsa-2677"
|
||||
"name": "USN-1863-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1863-1"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2013-9052",
|
||||
@ -77,15 +67,25 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1863-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1863-1"
|
||||
},
|
||||
{
|
||||
"name": "60132",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/60132"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2677",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2677"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130523 Fwd: [ANNOUNCE] X.Org Security Advisory: Protocol handling issues in X Window System client libraries",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/05/23/3"
|
||||
},
|
||||
{
|
||||
"name": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20130807 PHPFox v3.6.0 (build3) Multiple SQL Injection vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-08/0048.html"
|
||||
},
|
||||
{
|
||||
"name" : "27430",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/27430"
|
||||
},
|
||||
{
|
||||
"name": "61660",
|
||||
"refsource": "BID",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "96028",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/96028"
|
||||
},
|
||||
{
|
||||
"name": "27430",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/27430"
|
||||
},
|
||||
{
|
||||
"name": "20130807 PHPFox v3.6.0 (build3) Multiple SQL Injection vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0048.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-013",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-013"
|
||||
},
|
||||
{
|
||||
"name": "61654",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/61654"
|
||||
},
|
||||
{
|
||||
"name" : "95958",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/95958"
|
||||
},
|
||||
{
|
||||
"name": "typo3-realurlmanagement-unspecified-xss(86237)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86237"
|
||||
},
|
||||
{
|
||||
"name": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-013",
|
||||
"refsource": "MISC",
|
||||
"url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-013"
|
||||
},
|
||||
{
|
||||
"name": "95958",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/95958"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.glpi-project.org/spip.php?page=annonce&id_breve=308",
|
||||
"name": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www.glpi-project.org/spip.php?page=annonce&id_breve=308"
|
||||
"url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php"
|
||||
},
|
||||
{
|
||||
"name": "https://forge.indepnet.net/issues/4480",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "https://forge.indepnet.net/projects/glpi/repository/revisions/21753"
|
||||
},
|
||||
{
|
||||
"name" : "https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php",
|
||||
"name": "https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.glpi-project.org/spip.php?page=annonce&id_breve=308",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php"
|
||||
"url": "http://www.glpi-project.org/spip.php?page=annonce&id_breve=308"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-2809",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,6 +57,11 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037"
|
||||
},
|
||||
{
|
||||
"name": "59775",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59775"
|
||||
},
|
||||
{
|
||||
"name": "68389",
|
||||
"refsource": "BID",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "1030532",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030532"
|
||||
},
|
||||
{
|
||||
"name" : "59775",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59775"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20140411 Re: pam_cifscreds stack overflow",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2014/q2/96"
|
||||
},
|
||||
{
|
||||
"name": "[samba-technical] 20140711 ANNOUNCE: cifs-utils release 6.4 ready for download",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.samba.org/archive/samba-technical/2014-July/101132.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://advisories.mageia.org/MGASA-2014-0242.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://advisories.mageia.org/MGASA-2014-0242.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.mageia.org/show_bug.cgi?id=13386",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.mageia.org/show_bug.cgi?id=13386"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=870168",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=870168"
|
||||
"name": "MDVSA-2015:114",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:114"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1086224",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1086224"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.novell.com/show_bug.cgi?id=870168",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.novell.com/show_bug.cgi?id=870168"
|
||||
},
|
||||
{
|
||||
"name": "http://advisories.mageia.org/MGASA-2014-0242.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://advisories.mageia.org/MGASA-2014-0242.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140411 Re: pam_cifscreds stack overflow",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q2/96"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201612-08",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201612-08"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2015:114",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:114"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-2926",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0164",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0164"
|
||||
},
|
||||
{
|
||||
"name": "97448",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97448"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0164",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0164"
|
||||
},
|
||||
{
|
||||
"name": "1038235",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0541",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -70,6 +70,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2017-04-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-04-01"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/JiounDai/CVE-2017-0541",
|
||||
"refsource": "MISC",
|
||||
@ -80,11 +85,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform/external/sonivox/+/56d153259cc3e16a6a0014199a2317dde333c978"
|
||||
},
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2017-04-01",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2017-04-01"
|
||||
},
|
||||
{
|
||||
"name": "97330",
|
||||
"refsource": "BID",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"DATE_PUBLIC": "2017-09-05T00:00:00",
|
||||
"ID": "CVE-2017-0772",
|
||||
"STATE": "PUBLIC"
|
||||
@ -68,15 +68,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2017-09-01",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2017-09-01"
|
||||
},
|
||||
{
|
||||
"name": "100649",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/100649"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2017-09-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-09-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.461002",
|
||||
"ID": "CVE-2017-1000232",
|
||||
"REQUESTER": "stephan.zeisberg@splone.com",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "ldns",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.7.0"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "NLnet Labs"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Double Free"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-12-01",
|
||||
"ID": "CVE-2017-1000503",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.81 through 2.94 (inclusive); 2.89.1"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Race condition"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -60,14 +60,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://camel.apache.org/security-advisories.data/CVE-2017-12633.txt.asc",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://camel.apache.org/security-advisories.data/CVE-2017-12633.txt.asc"
|
||||
},
|
||||
{
|
||||
"name" : "https://issues.apache.org/jira/browse/CAMEL-11923",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://issues.apache.org/jira/browse/CAMEL-11923"
|
||||
"name": "101874",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101874"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:0319",
|
||||
@ -75,9 +70,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:0319"
|
||||
},
|
||||
{
|
||||
"name" : "101874",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/101874"
|
||||
"name": "https://issues.apache.org/jira/browse/CAMEL-11923",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.apache.org/jira/browse/CAMEL-11923"
|
||||
},
|
||||
{
|
||||
"name": "http://camel.apache.org/security-advisories.data/CVE-2017-12633.txt.asc",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://camel.apache.org/security-advisories.data/CVE-2017-12633.txt.asc"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryztyzt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryztyzt"
|
||||
},
|
||||
{
|
||||
"name": "https://nodesecurity.io/advisories/354",
|
||||
"refsource": "MISC",
|
||||
"url": "https://nodesecurity.io/advisories/354"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryztyzt",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryztyzt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sspa",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sspa"
|
||||
},
|
||||
{
|
||||
"name": "https://nodesecurity.io/advisories/463",
|
||||
"refsource": "MISC",
|
||||
"url": "https://nodesecurity.io/advisories/463"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sspa",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sspa"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1039791",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039791"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "101820",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101820"
|
||||
},
|
||||
{
|
||||
"name" : "1039791",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4159",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4369",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4452",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4618",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -54,9 +54,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2018-07-01",
|
||||
"name": "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2018-07-01"
|
||||
"url": "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin"
|
||||
},
|
||||
{
|
||||
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qca-wifi-host-cmn/commit/?id=61f4a467177afc23bdc1944ec61e52bed156c104",
|
||||
@ -64,9 +64,9 @@
|
||||
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qca-wifi-host-cmn/commit/?id=61f4a467177afc23bdc1944ec61e52bed156c104"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin",
|
||||
"name": "https://source.android.com/security/bulletin/2018-07-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin"
|
||||
"url": "https://source.android.com/security/bulletin/2018-07-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user