mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
97b41b7c5f
commit
567fec6275
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010109 Oracle XSQL servlet and xml-stylesheet allow executing java on the web server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=97906670012796&w=2"
|
||||
"name": "oracle-xsql-execute-code(5905)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5905"
|
||||
},
|
||||
{
|
||||
"name": "20010123 Patch for Potential Vulnerability in Oracle XSQL Servlet",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=98027700625521&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "oracle-xsql-execute-code(5905)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5905"
|
||||
"name": "20010109 Oracle XSQL servlet and xml-stylesheet allow executing java on the web server",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=97906670012796&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010115 Stack Overflow in MSHTML.DLL",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=97958685100219&w=2"
|
||||
},
|
||||
{
|
||||
"name": "2202",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2202"
|
||||
},
|
||||
{
|
||||
"name": "20010115 Stack Overflow in MSHTML.DLL",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=97958685100219&w=2"
|
||||
},
|
||||
{
|
||||
"name": "ie-mshtml-dos(5938)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "3781",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/3781"
|
||||
},
|
||||
{
|
||||
"name": "analogx-simpleserver-aux-dos(6395)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6395"
|
||||
},
|
||||
{
|
||||
"name": "20010417 Advisory for SimpleServer:WWW (analogX)",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "2608",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2608"
|
||||
},
|
||||
{
|
||||
"name" : "analogx-simpleserver-aux-dos(6395)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6395"
|
||||
},
|
||||
{
|
||||
"name" : "3781",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/3781"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2001-0655",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20011114 Multiple Vulnerabilities in Access Control List Implementation for Cisco 12000 Series Internet Router",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/warp/public/707/GSR-ACL-pub.shtml"
|
||||
},
|
||||
{
|
||||
"name": "M-018",
|
||||
"refsource": "CIAC",
|
||||
"url": "http://www.ciac.org/ciac/bulletins/m-018.shtml"
|
||||
},
|
||||
{
|
||||
"name": "20011114 Multiple Vulnerabilities in Access Control List Implementation for Cisco 12000 Series Internet Router",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/warp/public/707/GSR-ACL-pub.shtml"
|
||||
},
|
||||
{
|
||||
"name": "cisco-input-acl-configured(7554)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "FreeBSD-SA-02:14",
|
||||
"refsource" : "FREEBSD",
|
||||
"url" : "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:14.pam-pgsql.asc"
|
||||
},
|
||||
{
|
||||
"name": "3319",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/3319"
|
||||
},
|
||||
{
|
||||
"name": "FreeBSD-SA-02:14",
|
||||
"refsource": "FREEBSD",
|
||||
"url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:14.pam-pgsql.asc"
|
||||
},
|
||||
{
|
||||
"name": "postgresql-pam-authentication-module(7110)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060428 WinISO/UltraISO/MagicISO/PowerISO Directory Traversal Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/432359/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://secway.org/advisory/AD20060428.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secway.org/advisory/AD20060428.txt"
|
||||
},
|
||||
{
|
||||
"name" : "17725",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/17725"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1568",
|
||||
"refsource": "VUPEN",
|
||||
@ -77,20 +62,35 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016007"
|
||||
},
|
||||
{
|
||||
"name": "iso-dotdot-directory-traversal(26140)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26140"
|
||||
},
|
||||
{
|
||||
"name": "19864",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19864"
|
||||
},
|
||||
{
|
||||
"name": "17725",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17725"
|
||||
},
|
||||
{
|
||||
"name": "815",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/815"
|
||||
},
|
||||
{
|
||||
"name" : "iso-dotdot-directory-traversal(26140)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26140"
|
||||
"name": "http://secway.org/advisory/AD20060428.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secway.org/advisory/AD20060428.txt"
|
||||
},
|
||||
{
|
||||
"name": "20060428 WinISO/UltraISO/MagicISO/PowerISO Directory Traversal Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/432359/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "2005commentsscript-kommentar-xss(26318)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26318"
|
||||
},
|
||||
{
|
||||
"name": "http://d4igoro.blogspot.com/2006/05/c2005-comments-script-xss.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://d4igoro.blogspot.com/2006/05/c2005-comments-script-xss.html"
|
||||
},
|
||||
{
|
||||
"name" : "17895",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/17895"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1706",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1706"
|
||||
},
|
||||
{
|
||||
"name": "19996",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19996"
|
||||
},
|
||||
{
|
||||
"name" : "2005commentsscript-kommentar-xss(26318)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26318"
|
||||
"name": "ADV-2006-1706",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1706"
|
||||
},
|
||||
{
|
||||
"name": "17895",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17895"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080610 Multiple Vendor FreeType2 Multiple Heap Overflow Vulnerabilities",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717"
|
||||
"name": "1020240",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1020240"
|
||||
},
|
||||
{
|
||||
"name": "20080814 rPSA-2008-0255-1 freetype",
|
||||
@ -63,174 +63,24 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/support/player/doc/releasenotes_player.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/support/player/doc/releasenotes_player.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/support/server/doc/releasenotes_server.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/support/server/doc/releasenotes_server.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
|
||||
"name": "GLSA-201209-25",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3129",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3129"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3026",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3026"
|
||||
},
|
||||
{
|
||||
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"
|
||||
},
|
||||
{
|
||||
"name" : "https://issues.rpath.com/browse/RPL-2608",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://issues.rpath.com/browse/RPL-2608"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3438",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3438"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2008-09-09",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2008-09-12",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2009-02-12",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-5425",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-5430",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200806-10",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200806-10.xml"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201209-25",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201209-25.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2008:121",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0556",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0556.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0558",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0558.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2009:0329",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0329.html"
|
||||
},
|
||||
{
|
||||
"name" : "239006",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2008:014",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-643-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-643-1"
|
||||
},
|
||||
{
|
||||
"name" : "29637",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29637"
|
||||
},
|
||||
{
|
||||
"name" : "29639",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29639"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11188",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188"
|
||||
},
|
||||
{
|
||||
"name" : "35204",
|
||||
"name": "33937",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/35204"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-1794",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/1794"
|
||||
"url": "http://secunia.com/advisories/33937"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-1876",
|
||||
@ -238,19 +88,14 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1876/references"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2423",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2423"
|
||||
"name": "30721",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30721"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2466",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2466"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2558",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2558"
|
||||
"name": "MDVSA-2008:121",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2525",
|
||||
@ -258,49 +103,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2525"
|
||||
},
|
||||
{
|
||||
"name" : "1020240",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1020240"
|
||||
},
|
||||
{
|
||||
"name" : "30600",
|
||||
"name": "31712",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30600"
|
||||
},
|
||||
{
|
||||
"name" : "30740",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30740"
|
||||
},
|
||||
{
|
||||
"name" : "30766",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30766"
|
||||
},
|
||||
{
|
||||
"name" : "30721",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30721"
|
||||
},
|
||||
{
|
||||
"name" : "30821",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30821"
|
||||
},
|
||||
{
|
||||
"name" : "30819",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30819"
|
||||
},
|
||||
{
|
||||
"name" : "30967",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30967"
|
||||
},
|
||||
{
|
||||
"name" : "31707",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31707"
|
||||
"url": "http://secunia.com/advisories/31712"
|
||||
},
|
||||
{
|
||||
"name": "31709",
|
||||
@ -308,34 +113,34 @@
|
||||
"url": "http://secunia.com/advisories/31709"
|
||||
},
|
||||
{
|
||||
"name" : "31711",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31711"
|
||||
"name": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780",
|
||||
"refsource": "MISC",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"
|
||||
},
|
||||
{
|
||||
"name" : "31712",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31712"
|
||||
"name": "http://www.vmware.com/support/server/doc/releasenotes_server.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/support/server/doc/releasenotes_server.html"
|
||||
},
|
||||
{
|
||||
"name" : "31856",
|
||||
"name": "30740",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31856"
|
||||
"url": "http://secunia.com/advisories/30740"
|
||||
},
|
||||
{
|
||||
"name" : "31900",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31900"
|
||||
"name": "http://support.apple.com/kb/HT3438",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3438"
|
||||
},
|
||||
{
|
||||
"name" : "31823",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31823"
|
||||
"name": "GLSA-200806-10",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200806-10.xml"
|
||||
},
|
||||
{
|
||||
"name" : "31577",
|
||||
"name": "30766",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31577"
|
||||
"url": "http://secunia.com/advisories/30766"
|
||||
},
|
||||
{
|
||||
"name": "31479",
|
||||
@ -343,9 +148,204 @@
|
||||
"url": "http://secunia.com/advisories/31479"
|
||||
},
|
||||
{
|
||||
"name" : "33937",
|
||||
"name": "APPLE-SA-2009-02-12",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2423",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2423"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
|
||||
},
|
||||
{
|
||||
"name": "30967",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33937"
|
||||
"url": "http://secunia.com/advisories/30967"
|
||||
},
|
||||
{
|
||||
"name": "239006",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.rpath.com/browse/RPL-2608",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-2608"
|
||||
},
|
||||
{
|
||||
"name": "30821",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30821"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3026",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3026"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3129",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3129"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/support/player/doc/releasenotes_player.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/support/player/doc/releasenotes_player.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-5425",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11188",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188"
|
||||
},
|
||||
{
|
||||
"name": "20080610 Multiple Vendor FreeType2 Multiple Heap Overflow Vulnerabilities",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717"
|
||||
},
|
||||
{
|
||||
"name": "31856",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31856"
|
||||
},
|
||||
{
|
||||
"name": "29639",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29639"
|
||||
},
|
||||
{
|
||||
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "31711",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31711"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0556",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2008:014",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2008-09-12",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-1794",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1794"
|
||||
},
|
||||
{
|
||||
"name": "31823",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31823"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2558",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2558"
|
||||
},
|
||||
{
|
||||
"name": "30600",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30600"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
|
||||
},
|
||||
{
|
||||
"name": "31900",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31900"
|
||||
},
|
||||
{
|
||||
"name": "30819",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30819"
|
||||
},
|
||||
{
|
||||
"name": "31707",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31707"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2008-09-09",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2009:0329",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-643-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-643-1"
|
||||
},
|
||||
{
|
||||
"name": "35204",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35204"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0558",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html"
|
||||
},
|
||||
{
|
||||
"name": "31577",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31577"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2466",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2466"
|
||||
},
|
||||
{
|
||||
"name": "29637",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29637"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2008-5110",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505791",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505791"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20081117 CVE Request (syslog-ng)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/11/17/3"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200907-10",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200907-10.xml"
|
||||
"name": "SSRT100018",
|
||||
"refsource": "HP",
|
||||
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMA02554",
|
||||
@ -73,9 +63,9 @@
|
||||
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT100018",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
|
||||
"name": "GLSA-200907-10",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200907-10.xml"
|
||||
},
|
||||
{
|
||||
"name": "35748",
|
||||
@ -91,6 +81,16 @@
|
||||
"name": "ADV-2010-1796",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1796"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20081117 CVE Request (syslog-ng)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/11/17/3"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505791",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505791"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5942"
|
||||
},
|
||||
{
|
||||
"name": "kroax-kroax-sql-injection(43462)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43462"
|
||||
},
|
||||
{
|
||||
"name": "29976",
|
||||
"refsource": "BID",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "4639",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4639"
|
||||
},
|
||||
{
|
||||
"name" : "kroax-kroax-sql-injection(43462)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43462"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/linux/963/"
|
||||
},
|
||||
{
|
||||
"name": "34294",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34294"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/support/kb/view/923/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "1021461",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021461"
|
||||
},
|
||||
{
|
||||
"name" : "34294",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/34294"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/496727/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "32009",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32009"
|
||||
},
|
||||
{
|
||||
"name": "http://drupal.org/node/312968",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,11 +72,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31384"
|
||||
},
|
||||
{
|
||||
"name" : "32009",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32009"
|
||||
},
|
||||
{
|
||||
"name": "ajaxchecklist-save-sql-injection(45410)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2011-2003",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS11-077",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-077"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:13103",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13103"
|
||||
},
|
||||
{
|
||||
"name": "1026165",
|
||||
"refsource": "SECTRACK",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "8473",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/8473"
|
||||
},
|
||||
{
|
||||
"name": "MS11-077",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-077"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:13103",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13103"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-2125",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "73015",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/73015"
|
||||
},
|
||||
{
|
||||
"name": "48308",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48308"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,16 +72,6 @@
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
|
||||
},
|
||||
{
|
||||
"name" : "48308",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/48308"
|
||||
},
|
||||
{
|
||||
"name" : "73015",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/73015"
|
||||
},
|
||||
{
|
||||
"name": "shockwave-player-dirapix-bo(68049)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-2130",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,30 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:1144",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1144.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2011:033",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2011:0894",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2011:0897",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html"
|
||||
"name": "48308",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48308"
|
||||
},
|
||||
{
|
||||
"name": "TA11-222A",
|
||||
@ -87,15 +72,30 @@
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14194"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2011:0894",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:1144",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-1144.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16210",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16210"
|
||||
},
|
||||
{
|
||||
"name" : "48308",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48308"
|
||||
"name": "openSUSE-SU-2011:0897",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-2698",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2011-10.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2011-10.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=723215",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723215"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110719 CVE Request -- Wireshark: Infinite loop in the ANSI A Interface (IS-634/IOS) dissector",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/5"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110720 Re: CVE Request -- Wireshark: Infinite loop in the ANSI A Interface (IS-634/IOS) dissector",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/07/20/2"
|
||||
"name": "RHSA-2013:0125",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0125.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=37930",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=37930"
|
||||
"name": "45574",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/45574"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2011-10.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2011-10.html"
|
||||
"name": "49071",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/49071"
|
||||
},
|
||||
{
|
||||
"name": "48947",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48947"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-9638",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063586.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2011-11.html",
|
||||
@ -83,14 +103,9 @@
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6044"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=723215",
|
||||
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=37930",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=723215"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2011-9638",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063586.html"
|
||||
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=37930"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-9640",
|
||||
@ -98,19 +113,14 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063591.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0125",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0125.html"
|
||||
"name": "[oss-security] 20110720 Re: CVE Request -- Wireshark: Infinite loop in the ANSI A Interface (IS-634/IOS) dissector",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/2"
|
||||
},
|
||||
{
|
||||
"name" : "49071",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/49071"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:14610",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14610"
|
||||
"name": "wireshark-ansiamap-dos(69074)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69074"
|
||||
},
|
||||
{
|
||||
"name": "45086",
|
||||
@ -118,19 +128,9 @@
|
||||
"url": "http://secunia.com/advisories/45086"
|
||||
},
|
||||
{
|
||||
"name" : "45574",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/45574"
|
||||
},
|
||||
{
|
||||
"name" : "48947",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48947"
|
||||
},
|
||||
{
|
||||
"name" : "wireshark-ansiamap-dos(69074)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69074"
|
||||
"name": "oval:org.mitre.oval:def:14610",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14610"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.tibco.com/multimedia/spotfire_advisory_20110831_tcm8-14230.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.tibco.com/multimedia/spotfire_advisory_20110831_tcm8-14230.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://www.tibco.com/services/support/advisories/default.jsp",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "45864",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/45864"
|
||||
},
|
||||
{
|
||||
"name": "http://www.tibco.com/multimedia/spotfire_advisory_20110831_tcm8-14230.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.tibco.com/multimedia/spotfire_advisory_20110831_tcm8-14230.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-0209",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20130121 Re: CVE request for Movable Type",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2013/01/22/3"
|
||||
},
|
||||
{
|
||||
"name": "http://www.sec-1.com/blog/?p=402",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.sec-1.com/blog/?p=402"
|
||||
},
|
||||
{
|
||||
"name": "http://www.movabletype.org/2013/01/movable_type_438_patch.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.movabletype.org/2013/01/movable_type_438_patch.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.sec-1.com/blog/wp-content/uploads/2013/01/movabletype_upgrade_exec.rb_.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.sec-1.com/blog/wp-content/uploads/2013/01/movabletype_upgrade_exec.rb_.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.movabletype.org/2013/01/movable_type_438_patch.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.movabletype.org/2013/01/movable_type_438_patch.html"
|
||||
"name": "[oss-security] 20130121 Re: CVE request for Movable Type",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2013/01/22/3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-0255",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,44 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.postgresql.org/docs/8.3/static/release-8-3-23.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.postgresql.org/docs/8.3/static/release-8-3-23.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.postgresql.org/docs/8.4/static/release-8-4-16.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.postgresql.org/docs/8.4/static/release-8-4-16.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.postgresql.org/docs/9.0/static/release-9-0-12.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.postgresql.org/docs/9.0/static/release-9-0-12.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.postgresql.org/docs/9.1/static/release-9-1-8.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.postgresql.org/docs/9.1/static/release-9-1-8.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.postgresql.org/docs/9.2/static/release-9-2-3.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.postgresql.org/docs/9.2/static/release-9-2-3.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=907892",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=907892"
|
||||
},
|
||||
{
|
||||
"name" : "https://blogs.oracle.com/sunsecurity/entry/cve_2013_0255_array_index",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://blogs.oracle.com/sunsecurity/entry/cve_2013_0255_array_index"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
"name": "FEDORA-2013-2123",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098586.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2630",
|
||||
@ -98,19 +63,9 @@
|
||||
"url": "http://www.debian.org/security/2013/dsa-2630"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2013-2123",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098586.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:142",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1475",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1475.html"
|
||||
"name": "openSUSE-SU-2013:0319",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00060.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0318",
|
||||
@ -118,44 +73,89 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00059.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0319",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-02/msg00060.html"
|
||||
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-16.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-16.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1717-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1717-1"
|
||||
"name": "MDVSA-2013:142",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142"
|
||||
},
|
||||
{
|
||||
"name" : "57844",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/57844"
|
||||
"name": "postgresql-enumrecv-dos(81917)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81917"
|
||||
},
|
||||
{
|
||||
"name" : "89935",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/89935"
|
||||
},
|
||||
{
|
||||
"name" : "1028092",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1028092"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=907892",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907892"
|
||||
},
|
||||
{
|
||||
"name": "51923",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51923"
|
||||
},
|
||||
{
|
||||
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-8.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-8.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "57844",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/57844"
|
||||
},
|
||||
{
|
||||
"name": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_0255_array_index",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_0255_array_index"
|
||||
},
|
||||
{
|
||||
"name": "USN-1717-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1717-1"
|
||||
},
|
||||
{
|
||||
"name": "1028092",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1028092"
|
||||
},
|
||||
{
|
||||
"name": "http://www.postgresql.org/docs/8.3/static/release-8-3-23.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.postgresql.org/docs/8.3/static/release-8-3-23.html"
|
||||
},
|
||||
{
|
||||
"name": "89935",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/89935"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1475",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1475.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.postgresql.org/docs/9.2/static/release-9-2-3.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.postgresql.org/docs/9.2/static/release-9-2-3.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-12.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-12.html"
|
||||
},
|
||||
{
|
||||
"name": "52819",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/52819"
|
||||
},
|
||||
{
|
||||
"name" : "postgresql-enumrecv-dos(81917)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/81917"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-0558",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21640830"
|
||||
},
|
||||
{
|
||||
"name": "IC90483",
|
||||
"refsource": "AIXAPAR",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "sterling-b2b-cve20130558-infodisc(83006)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83006"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21640830"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-1231",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-1251",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016"
|
||||
},
|
||||
{
|
||||
"name" : "TA13-043B",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16408",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16408"
|
||||
},
|
||||
{
|
||||
"name": "TA13-043B",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-1291",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS13-036",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-036"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16504",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16504"
|
||||
},
|
||||
{
|
||||
"name": "MS13-036",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-036"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-1296",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS13-029",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-029"
|
||||
},
|
||||
{
|
||||
"name": "TA13-100A",
|
||||
"refsource": "CERT",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "oval:org.mitre.oval:def:16598",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16598"
|
||||
},
|
||||
{
|
||||
"name": "MS13-029",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-029"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-1901",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,70 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.postgresql.org/about/news/1456/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.postgresql.org/about/news/1456/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.postgresql.org/docs/current/static/release-9-1-9.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.postgresql.org/docs/current/static/release-9-1-9.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.postgresql.org/docs/current/static/release-9-2-4.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.postgresql.org/docs/current/static/release-9-2-4.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5880",
|
||||
"name": "http://www.postgresql.org/about/news/1456/",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5880"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5892",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5892"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2013-09-12-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2013-09-17-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2658",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2013/dsa-2658"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2013-5000",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2013-6148",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:142",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0633",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0627",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html"
|
||||
"url": "http://www.postgresql.org/about/news/1456/"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0628",
|
||||
@ -127,10 +72,65 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:142",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5892",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5892"
|
||||
},
|
||||
{
|
||||
"name": "USN-1789-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1789-1"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2013-09-12-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2013-6148",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2013-09-17-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.postgresql.org/docs/current/static/release-9-1-9.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.postgresql.org/docs/current/static/release-9-1-9.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0633",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2658",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2658"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0627",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2013-5000",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5880",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5880"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-4425",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "99518",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/99518"
|
||||
},
|
||||
{
|
||||
"name": "20131106 CVE-2013-4425: Private key disclosure, Osirix (lite, 64bit and FDA cleader version) (Medical Application)",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/63566"
|
||||
},
|
||||
{
|
||||
"name" : "99518",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/99518"
|
||||
},
|
||||
{
|
||||
"name": "osirix-cve20134425-info-disc(88606)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-4564",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "56276",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/56276"
|
||||
},
|
||||
{
|
||||
"name": "[Swan-announce] 20131211 Libreswan 3.7 released",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.libreswan.org/pipermail/swan-announce/2013/000007.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2013-23315",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124928.html"
|
||||
},
|
||||
{
|
||||
"name": "https://libreswan.org/security/CVE-2013-4564/CVE-2013-4564.txt.asc",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,16 +81,6 @@
|
||||
"name": "FEDORA-2013-23299",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124911.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2013-23315",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124928.html"
|
||||
},
|
||||
{
|
||||
"name" : "56276",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/56276"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-007/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-007/"
|
||||
"name": "typo3-metafeedit-unspecified-sql-injection(84661)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84661"
|
||||
},
|
||||
{
|
||||
"name": "93806",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://osvdb.org/93806"
|
||||
},
|
||||
{
|
||||
"name" : "typo3-metafeedit-unspecified-sql-injection(84661)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/84661"
|
||||
"name": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-007/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-007/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-5411",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ibm-sterling-cve20135411-link-inj(87360)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87360"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "IC96059",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC96059"
|
||||
},
|
||||
{
|
||||
"name" : "ibm-sterling-cve20135411-link-inj(87360)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/87360"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-5505",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31008",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31008"
|
||||
"name": "54626",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/54626"
|
||||
},
|
||||
{
|
||||
"name": "20130927 Cisco Identity Services Engine Administration Interface Cross-Site Scripting Vulnerability",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5505"
|
||||
},
|
||||
{
|
||||
"name" : "62693",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/62693"
|
||||
"name": "cisco-ise-cve20135505-xss(87530)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87530"
|
||||
},
|
||||
{
|
||||
"name": "97875",
|
||||
@ -78,14 +78,14 @@
|
||||
"url": "http://www.securitytracker.com/id/1029111"
|
||||
},
|
||||
{
|
||||
"name" : "54626",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/54626"
|
||||
"name": "62693",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/62693"
|
||||
},
|
||||
{
|
||||
"name" : "cisco-ise-cve20135505-xss(87530)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/87530"
|
||||
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31008",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31008"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.455673",
|
||||
"ID": "CVE-2017-1000226",
|
||||
"REQUESTER": "tom@dxw.com",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Stop User Enumeration",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.3.8"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Fullworks"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Incorrect Access Control"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-11-22",
|
||||
"ID": "CVE-2017-1000405",
|
||||
"REQUESTER": "contact@bindecy.com",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Linux Kernel",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.6.38 through 4.14"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Linux Kernel"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "memory overwrite"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -55,9 +55,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "43199",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/43199/"
|
||||
"name": "102032",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102032"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:0180",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:0180"
|
||||
},
|
||||
{
|
||||
"name": "https://medium.com/bindecy/huge-dirty-cow-cve-2017-1000405-110eca132de0",
|
||||
@ -69,20 +74,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2018-02-01"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:0180",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:0180"
|
||||
},
|
||||
{
|
||||
"name" : "102032",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/102032"
|
||||
},
|
||||
{
|
||||
"name": "1040020",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040020"
|
||||
},
|
||||
{
|
||||
"name": "43199",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/43199/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-278-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-278-01"
|
||||
},
|
||||
{
|
||||
"name": "101174",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101174"
|
||||
},
|
||||
{
|
||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-278-01",
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-278-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,14 +56,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html"
|
||||
"name": "1039581",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039581"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.krackattacks.com/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.krackattacks.com/"
|
||||
"name": "101274",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101274"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2017:2745",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3999",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3999"
|
||||
},
|
||||
{
|
||||
"name": "1039578",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039578"
|
||||
},
|
||||
{
|
||||
"name": "https://access.redhat.com/security/vulnerabilities/kracks",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://access.redhat.com/security/vulnerabilities/kracks"
|
||||
},
|
||||
{
|
||||
"name": "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
|
||||
"refsource": "CISCO",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa"
|
||||
},
|
||||
{
|
||||
"name": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt",
|
||||
@ -76,9 +106,19 @@
|
||||
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt"
|
||||
},
|
||||
{
|
||||
"name" : "https://access.redhat.com/security/vulnerabilities/kracks",
|
||||
"name": "1039577",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039577"
|
||||
},
|
||||
{
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://access.redhat.com/security/vulnerabilities/kracks"
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2017:2755",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2017-11-01",
|
||||
@ -86,14 +126,49 @@
|
||||
"url": "https://source.android.com/security/bulletin/2017-11-01"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
||||
"name": "GLSA-201711-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201711-03"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us"
|
||||
"name": "FreeBSD-SA-17:07",
|
||||
"refsource": "FREEBSD",
|
||||
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc"
|
||||
},
|
||||
{
|
||||
"name": "https://www.krackattacks.com/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.krackattacks.com/"
|
||||
},
|
||||
{
|
||||
"name": "1039573",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039573"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2017:2752",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name": "1039576",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039576"
|
||||
},
|
||||
{
|
||||
"name": "1039585",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039585"
|
||||
},
|
||||
{
|
||||
"name": "VU#228519",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/228519"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf",
|
||||
@ -105,85 +180,10 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert.vde.com/en-us/advisories/vde-2017-005"
|
||||
},
|
||||
{
|
||||
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3999",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2017/dsa-3999"
|
||||
},
|
||||
{
|
||||
"name" : "FreeBSD-SA-17:07",
|
||||
"refsource" : "FREEBSD",
|
||||
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201711-03",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201711-03"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2017:2745",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2017:2752",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2017:2755",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-3455-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3455-1"
|
||||
},
|
||||
{
|
||||
"name" : "VU#228519",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/228519"
|
||||
},
|
||||
{
|
||||
"name" : "101274",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/101274"
|
||||
},
|
||||
{
|
||||
"name" : "1039573",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039573"
|
||||
},
|
||||
{
|
||||
"name" : "1039576",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039576"
|
||||
},
|
||||
{
|
||||
"name" : "1039577",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039577"
|
||||
},
|
||||
{
|
||||
"name" : "1039578",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039578"
|
||||
},
|
||||
{
|
||||
"name" : "1039581",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039581"
|
||||
},
|
||||
{
|
||||
"name" : "1039585",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039585"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/torvalds/linux/commit/bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/torvalds/linux/commit/bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@microfocus.com",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"ID": "CVE-2017-13985",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -62,15 +62,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10204",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10204"
|
||||
},
|
||||
{
|
||||
"name": "99559",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99559"
|
||||
},
|
||||
{
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10204",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10204"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4512",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4603",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.vmware.com/security/advisories/VMSA-2017-0013.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.vmware.com/security/advisories/VMSA-2017-0013.html"
|
||||
},
|
||||
{
|
||||
"name": "100012",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/100012"
|
||||
},
|
||||
{
|
||||
"name": "https://www.vmware.com/security/advisories/VMSA-2017-0013.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.vmware.com/security/advisories/VMSA-2017-0013.html"
|
||||
},
|
||||
{
|
||||
"name": "1039013",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/rakjong/vuln/blob/master/wordpress_wp-live-chat-support_XSS.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/rakjong/vuln/blob/master/wordpress_wp-live-chat-support_XSS.pdf"
|
||||
},
|
||||
{
|
||||
"name": "https://wordpress.org/plugins/wp-live-chat-support/#developers",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wordpress.org/plugins/wp-live-chat-support/#developers"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/rakjong/vuln/blob/master/wordpress_wp-live-chat-support_XSS.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/rakjong/vuln/blob/master/wordpress_wp-live-chat-support_XSS.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@microfocus.com",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"DATE_PUBLIC": "2018-11-07T14:30:00.000Z",
|
||||
"ID": "CVE-2018-18590",
|
||||
"STATE": "PUBLIC",
|
||||
|
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "45886",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/45886/"
|
||||
},
|
||||
{
|
||||
"name" : "45915",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/45915/"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd",
|
||||
"name": "https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd",
|
||||
"refsource": "MISC",
|
||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1712",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1712"
|
||||
"url": "https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd"
|
||||
},
|
||||
{
|
||||
"name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.19",
|
||||
@ -78,40 +63,55 @@
|
||||
"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.19"
|
||||
},
|
||||
{
|
||||
"name" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.2",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.2"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3832-1",
|
||||
"name": "USN-3836-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3832-1/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3833-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3833-1/"
|
||||
"url": "https://usn.ubuntu.com/3836-2/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3835-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3835-1/"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1712",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1712"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd",
|
||||
"refsource": "MISC",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd"
|
||||
},
|
||||
{
|
||||
"name": "USN-3833-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3833-1/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3832-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3832-1/"
|
||||
},
|
||||
{
|
||||
"name": "45915",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45915/"
|
||||
},
|
||||
{
|
||||
"name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.2",
|
||||
"refsource": "MISC",
|
||||
"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.2"
|
||||
},
|
||||
{
|
||||
"name": "45886",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45886/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3836-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3836-1/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3836-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3836-2/"
|
||||
},
|
||||
{
|
||||
"name": "105941",
|
||||
"refsource": "BID",
|
||||
|
@ -59,15 +59,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[dev] 20180711 CVE-2018-1334 Apache Spark local privilege escalation vulnerability",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.apache.org/thread.html/4d6d210e319a501b740293daaeeeadb51927111fb8261a3e4cd60060@%3Cdev.spark.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"name": "https://spark.apache.org/security.html#CVE-2018-1334",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://spark.apache.org/security.html#CVE-2018-1334"
|
||||
},
|
||||
{
|
||||
"name": "[dev] 20180711 CVE-2018-1334 Apache Spark local privilege escalation vulnerability",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.apache.org/thread.html/4d6d210e319a501b740293daaeeeadb51927111fb8261a3e4cd60060@%3Cdev.spark.apache.org%3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user