mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3b6e0023b4
commit
5a9b6d89b3
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20001213 Re: Insecure input validation in simplestmail.cgi",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-12/0168.html"
|
||||
},
|
||||
{
|
||||
"name": "2106",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2106"
|
||||
},
|
||||
{
|
||||
"name": "20001213 Re: Insecure input validation in simplestmail.cgi",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0168.html"
|
||||
},
|
||||
{
|
||||
"name": "http-cgi-simplestguest(5743)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20001211 [pkc] remote heap buffer overflow in oops",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-12/0127.html"
|
||||
"name": "2099",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2099"
|
||||
},
|
||||
{
|
||||
"name": "FreeBSD-SA-00:79",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://archives.neohapsis.com/archives/freebsd/2000-12/0418.html"
|
||||
},
|
||||
{
|
||||
"name" : "2099",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/2099"
|
||||
"name": "20001211 [pkc] remote heap buffer overflow in oops",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0127.html"
|
||||
},
|
||||
{
|
||||
"name": "oops-ftputils-bo(5725)",
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20001126 [MSY] S(ecure)Locate heap corruption vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-11/0356.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-005-1",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2000/20001217a"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2000:085",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.linux-mandrake.com/en/security/2000/MDKSA-2000-085.php3"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2000:128",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2000-128.html"
|
||||
},
|
||||
{
|
||||
"name" : "CLA-2001:369",
|
||||
"refsource" : "CONECTIVA",
|
||||
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000369"
|
||||
},
|
||||
{
|
||||
"name" : "TLSA2001002-1",
|
||||
"refsource" : "TURBO",
|
||||
"url" : "http://www.turbolinux.com/pipermail/tl-security-announce/2001-February/000144.html"
|
||||
},
|
||||
{
|
||||
"name": "slocate-heap-execute-code(5594)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5594"
|
||||
},
|
||||
{
|
||||
"name": "TLSA2001002-1",
|
||||
"refsource": "TURBO",
|
||||
"url": "http://www.turbolinux.com/pipermail/tl-security-announce/2001-February/000144.html"
|
||||
},
|
||||
{
|
||||
"name": "20001126 [MSY] S(ecure)Locate heap corruption vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0356.html"
|
||||
},
|
||||
{
|
||||
"name": "2004",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2004"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2000:128",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2000-128.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-005-1",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2000/20001217a"
|
||||
},
|
||||
{
|
||||
"name": "CLA-2001:369",
|
||||
"refsource": "CONECTIVA",
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000369"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010117 [pkc] remote heap overflow in tinyproxy",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=97975486527750&w=2"
|
||||
"name": "tinyproxy-remote-bo(5954)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5954"
|
||||
},
|
||||
{
|
||||
"name": "DSA-018",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/2217"
|
||||
},
|
||||
{
|
||||
"name" : "tinyproxy-remote-bo(5954)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5954"
|
||||
"name": "20010117 [pkc] remote heap overflow in tinyproxy",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=97975486527750&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20001127 Nokia firewalls",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=97535202912588&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20001205 Nokia firewalls - Response from Nokia",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=97603879517777&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "nokia-ip440-bo(5640)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5640"
|
||||
},
|
||||
{
|
||||
"name": "2054",
|
||||
"refsource": "BID",
|
||||
@ -76,6 +61,21 @@
|
||||
"name": "6020",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/6020"
|
||||
},
|
||||
{
|
||||
"name": "20001127 Nokia firewalls",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=97535202912588&w=2"
|
||||
},
|
||||
{
|
||||
"name": "nokia-ip440-bo(5640)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5640"
|
||||
},
|
||||
{
|
||||
"name": "20001205 Nokia firewalls - Response from Nokia",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=97603879517777&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "speedxess-hase-default-password(7655)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/7655.php"
|
||||
},
|
||||
{
|
||||
"name": "20011203 SpeedXess HASE-120 router default password",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "3617",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/3617"
|
||||
},
|
||||
{
|
||||
"name" : "speedxess-hase-default-password(7655)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/7655.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060420 PHPSurveyor <= 0.995 'save.php/surveyid' remote cmmnds xctn",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/431508/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://retrogod.altervista.org/phpsurveyor_0995_xpl.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://retrogod.altervista.org/phpsurveyor_0995_xpl.html"
|
||||
},
|
||||
{
|
||||
"name": "17633",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17633"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1451",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1451"
|
||||
},
|
||||
{
|
||||
"name" : "24787",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/24787"
|
||||
},
|
||||
{
|
||||
"name" : "1015970",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015970"
|
||||
"name": "20060420 PHPSurveyor <= 0.995 'save.php/surveyid' remote cmmnds xctn",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/431508/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "19761",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19761"
|
||||
},
|
||||
{
|
||||
"name": "1015970",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015970"
|
||||
},
|
||||
{
|
||||
"name": "phpsurveyor-surveyid-shell-execution(25970)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25970"
|
||||
},
|
||||
{
|
||||
"name": "http://retrogod.altervista.org/phpsurveyor_0995_xpl.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://retrogod.altervista.org/phpsurveyor_0995_xpl.html"
|
||||
},
|
||||
{
|
||||
"name": "24787",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/24787"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1451",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1451"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060507 Limbo CMS (option=weblinks) SQL injection exploit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/433221/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "1751",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/1751"
|
||||
},
|
||||
{
|
||||
"name" : "http://forum.limboforge.org/index.php?topic=6.0",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://forum.limboforge.org/index.php?topic=6.0"
|
||||
"name": "limbocms-index-sql-injection(26366)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26366"
|
||||
},
|
||||
{
|
||||
"name": "19891",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19891"
|
||||
},
|
||||
{
|
||||
"name": "1751",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/1751"
|
||||
},
|
||||
{
|
||||
"name": "20060507 Limbo CMS (option=weblinks) SQL injection exploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/433221/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "893",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/893"
|
||||
},
|
||||
{
|
||||
"name" : "limbocms-index-sql-injection(26366)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26366"
|
||||
"name": "http://forum.limboforge.org/index.php?topic=6.0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://forum.limboforge.org/index.php?topic=6.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2006-2388",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060711 ZDI-06-022: Microsoft Office Excel File Rebuilding Code Execution Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/439786/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-06-022.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-06-022.html"
|
||||
},
|
||||
{
|
||||
"name": "MS06-037",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037"
|
||||
},
|
||||
{
|
||||
"name": "1016472",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016472"
|
||||
},
|
||||
{
|
||||
"name": "18938",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18938"
|
||||
},
|
||||
{
|
||||
"name": "20060711 ZDI-06-022: Microsoft Office Excel File Rebuilding Code Execution Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/439786/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2755",
|
||||
"refsource": "VUPEN",
|
||||
@ -83,9 +83,9 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A234"
|
||||
},
|
||||
{
|
||||
"name" : "1016472",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016472"
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-06-022.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-022.html"
|
||||
},
|
||||
{
|
||||
"name": "excel-cell-rebuilding-code-execution(27604)",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060523 Assetman <= 2.4a XSS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/435139/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "18131",
|
||||
"refsource": "BID",
|
||||
@ -67,6 +62,16 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2023"
|
||||
},
|
||||
{
|
||||
"name": "20060523 Assetman <= 2.4a XSS",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/435139/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "assetman-multiple-xss(26702)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26702"
|
||||
},
|
||||
{
|
||||
"name": "20285",
|
||||
"refsource": "SECUNIA",
|
||||
@ -76,11 +81,6 @@
|
||||
"name": "979",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/979"
|
||||
},
|
||||
{
|
||||
"name" : "assetman-multiple-xss(26702)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26702"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,40 +57,40 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/435212/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "18168",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18168"
|
||||
},
|
||||
{
|
||||
"name": "http://www.eazel.es/media/advisory003-D-Link-DSA-3100-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.eazel.es/media/advisory003-D-Link-DSA-3100-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name" : "18168",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18168"
|
||||
"name": "dlink-airspot-uname-xss(26759)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26759"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2028",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2028"
|
||||
},
|
||||
{
|
||||
"name" : "1016173",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016173"
|
||||
},
|
||||
{
|
||||
"name": "20343",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20343"
|
||||
},
|
||||
{
|
||||
"name": "1016173",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016173"
|
||||
},
|
||||
{
|
||||
"name": "980",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/980"
|
||||
},
|
||||
{
|
||||
"name" : "dlink-airspot-uname-xss(26759)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26759"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.amule.org/wiki/index.php/Changelog_2.1.2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.amule.org/wiki/index.php/Changelog_2.1.2"
|
||||
},
|
||||
{
|
||||
"name": "18145",
|
||||
"refsource": "BID",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "20351",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20351"
|
||||
},
|
||||
{
|
||||
"name": "http://www.amule.org/wiki/index.php/Changelog_2.1.2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.amule.org/wiki/index.php/Changelog_2.1.2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2008-5474",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7294",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7294"
|
||||
"name": "4779",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4779"
|
||||
},
|
||||
{
|
||||
"name": "32538",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32538"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-3300",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/3300"
|
||||
},
|
||||
{
|
||||
"name": "32910",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32910"
|
||||
},
|
||||
{
|
||||
"name" : "4779",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4779"
|
||||
},
|
||||
{
|
||||
"name": "litolite-cate-sql-injection(46923)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46923"
|
||||
},
|
||||
{
|
||||
"name": "7294",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7294"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-3300",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3300"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7344",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7344"
|
||||
},
|
||||
{
|
||||
"name": "32646",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32646"
|
||||
},
|
||||
{
|
||||
"name": "7344",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7344"
|
||||
},
|
||||
{
|
||||
"name": "32982",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-2091",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-14.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-14.html"
|
||||
"name": "coldfusion-unspec-dos(68028)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68028"
|
||||
},
|
||||
{
|
||||
"name": "73050",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://osvdb.org/73050"
|
||||
},
|
||||
{
|
||||
"name" : "coldfusion-unspec-dos(68028)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68028"
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb11-14.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb11-14.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-2099",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-16.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA11-166A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
|
||||
},
|
||||
{
|
||||
"name" : "48246",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/48246"
|
||||
},
|
||||
{
|
||||
"name" : "73061",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/73061"
|
||||
"name": "reader-acrobat-ce(68013)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68013"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:13684",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13684"
|
||||
},
|
||||
{
|
||||
"name": "48246",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48246"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb11-16.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
|
||||
},
|
||||
{
|
||||
"name": "73061",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/73061"
|
||||
},
|
||||
{
|
||||
"name": "TA11-166A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
|
||||
},
|
||||
{
|
||||
"name": "1025658",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1025658"
|
||||
},
|
||||
{
|
||||
"name" : "reader-acrobat-ce(68013)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68013"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2011-2230",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
|
||||
},
|
||||
{
|
||||
"name": "TA11-201A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-2520",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "FEDORA-2011-9652",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063314.html"
|
||||
},
|
||||
{
|
||||
"name": "systemconfigfirewall-priv-escalation(68734)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68734"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110718 CVE-2011-2520: flaw in system-config-firewall's usage of pickle allows privilege escalation",
|
||||
"refsource": "MLIST",
|
||||
@ -62,11 +72,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=717985"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2011-9652",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063314.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0953",
|
||||
"refsource": "REDHAT",
|
||||
@ -86,11 +91,6 @@
|
||||
"name": "45294",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/45294"
|
||||
},
|
||||
{
|
||||
"name" : "systemconfigfirewall-priv-escalation(68734)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68734"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-2940",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,41 +57,41 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/08/19/6"
|
||||
},
|
||||
{
|
||||
"name": "1025959",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1025959"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110819 Re: CVE request: stunnel 4.4x heap overflow flaw",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/08/19/18"
|
||||
},
|
||||
{
|
||||
"name" : "[stunnel-announce] 20110818 stunnel 4.42 released",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.stunnel.org/pipermail/stunnel-announce/2011-August/000059.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://stunnel.org/?page=sdf_ChangeLog",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://stunnel.org/?page=sdf_ChangeLog"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=732068",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732068"
|
||||
},
|
||||
{
|
||||
"name": "http://stunnel.org/?page=sdf_ChangeLog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://stunnel.org/?page=sdf_ChangeLog"
|
||||
},
|
||||
{
|
||||
"name": "49254",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/49254"
|
||||
},
|
||||
{
|
||||
"name": "[stunnel-announce] 20110818 stunnel 4.42 released",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.stunnel.org/pipermail/stunnel-announce/2011-August/000059.html"
|
||||
},
|
||||
{
|
||||
"name": "74600",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/74600"
|
||||
},
|
||||
{
|
||||
"name" : "1025959",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1025959"
|
||||
},
|
||||
{
|
||||
"name": "45705",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-3194",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,94 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20120822 CVE request: libqt4: two memory issues",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/08/22/6"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20120824 Re: CVE request: libqt4: two memory issues",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/08/24/8"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=637275",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=637275"
|
||||
},
|
||||
{
|
||||
"name" : "https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2011-12145",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201206-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201206-02.xml"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:1323",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2011-1323.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:1328",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2011-1328.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2011:1113",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "https://hermes.opensuse.org/messages/12056605"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2011:1119",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2011:1120",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html"
|
||||
"name": "46371",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/46371"
|
||||
},
|
||||
{
|
||||
"name": "USN-1504-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1504-1"
|
||||
},
|
||||
{
|
||||
"name" : "49724",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/49724"
|
||||
},
|
||||
{
|
||||
"name" : "75653",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/75653"
|
||||
},
|
||||
{
|
||||
"name" : "46128",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/46128"
|
||||
},
|
||||
{
|
||||
"name": "46140",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/46140"
|
||||
},
|
||||
{
|
||||
"name" : "46187",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/46187"
|
||||
"name": "[oss-security] 20120824 Re: CVE request: libqt4: two memory issues",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/08/24/8"
|
||||
},
|
||||
{
|
||||
"name" : "46371",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/46371"
|
||||
"name": "GLSA-201206-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201206-02.xml"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2011:1119",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "46410",
|
||||
@ -148,9 +88,29 @@
|
||||
"url": "http://secunia.com/advisories/46410"
|
||||
},
|
||||
{
|
||||
"name" : "49383",
|
||||
"name": "qt-grayscale-bo(69975)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69975"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120822 CVE request: libqt4: two memory issues",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/6"
|
||||
},
|
||||
{
|
||||
"name": "https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465"
|
||||
},
|
||||
{
|
||||
"name": "46128",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/49383"
|
||||
"url": "http://secunia.com/advisories/46128"
|
||||
},
|
||||
{
|
||||
"name": "46187",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/46187"
|
||||
},
|
||||
{
|
||||
"name": "49895",
|
||||
@ -158,9 +118,49 @@
|
||||
"url": "http://secunia.com/advisories/49895"
|
||||
},
|
||||
{
|
||||
"name" : "qt-grayscale-bo(69975)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69975"
|
||||
"name": "https://bugzilla.novell.com/show_bug.cgi?id=637275",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.novell.com/show_bug.cgi?id=637275"
|
||||
},
|
||||
{
|
||||
"name": "49383",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/49383"
|
||||
},
|
||||
{
|
||||
"name": "49724",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/49724"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-12145",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:1323",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2011-1323.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2011:1113",
|
||||
"refsource": "SUSE",
|
||||
"url": "https://hermes.opensuse.org/messages/12056605"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:1328",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2011-1328.html"
|
||||
},
|
||||
{
|
||||
"name": "75653",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/75653"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2011:1120",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2011-3539",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,16 +57,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
|
||||
},
|
||||
{
|
||||
"name" : "50270",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/50270"
|
||||
},
|
||||
{
|
||||
"name": "76473",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/76473"
|
||||
},
|
||||
{
|
||||
"name": "50270",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/50270"
|
||||
},
|
||||
{
|
||||
"name": "orasun-sol-zones-unspecified(70812)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2011-3567",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-0080",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2013-0788",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,110 +52,110 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-30.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-30.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=635852",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=635852"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=771942",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=771942"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=784730",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=784730"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=813442",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=813442"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=827870",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=827870"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=834240",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=834240"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=839621",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=839621"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=840263",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=840263"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=840353",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=840353"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=852923",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=852923"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2699",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2013/dsa-2699"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0696",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0696.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0697",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0697.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0630",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0645",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0631",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0850",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0875",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-1791-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1791-1"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2699",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2699"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=840353",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=840353"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=784730",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=784730"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0630",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=813442",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=813442"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=839621",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=839621"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-30.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-30.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=827870",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=827870"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0696",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0696.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16629",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16629"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0631",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=771942",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=771942"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=852923",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=852923"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0697",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0697.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=840263",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=840263"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0645",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0875",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2013-0905",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_4.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=168982",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=168982"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16495",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16495"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=168982",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=168982"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2013-0974",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5642"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2013-01-28-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "89658",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/89658"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2013-01-28-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@ubuntu.com",
|
||||
"ID": "CVE-2013-1067",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,55 +52,55 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2013-5280",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2013-5286",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:157",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:157"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:158",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:158"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0748",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0748.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0746",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0904",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:158",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:158"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2013-5286",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0967",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0746",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2013-5280",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81"
|
||||
},
|
||||
{
|
||||
"name": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0748",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0748.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.digitalsec.net/stuff/explt+advs/DS3.AuthServer.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.digitalsec.net/stuff/explt+advs/DS3.AuthServer.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/121862/DS3-Authentication-Server-Command-Execution.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-4507",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-5427",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2014-2435",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201409-04",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201409-04.xml"
|
||||
},
|
||||
{
|
||||
"name": "66853",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/66853"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201409-04",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201409-04.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2014-2639",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0026",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0026"
|
||||
},
|
||||
{
|
||||
"name": "96032",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96032"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0026",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0026"
|
||||
},
|
||||
{
|
||||
"name": "1038017",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"DATE_PUBLIC": "2017-09-05T00:00:00",
|
||||
"ID": "CVE-2017-0775",
|
||||
"STATE": "PUBLIC"
|
||||
@ -77,15 +77,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2017-09-01",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2017-09-01"
|
||||
},
|
||||
{
|
||||
"name": "100649",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/100649"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2017-09-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-09-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://hackerone.com/reports/169680",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://hackerone.com/reports/169680"
|
||||
},
|
||||
{
|
||||
"name": "https://nextcloud.com/security/advisory/?id=nc-sa-2017-002",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://nextcloud.com/security/advisory/?id=nc-sa-2017-002"
|
||||
},
|
||||
{
|
||||
"name": "https://hackerone.com/reports/169680",
|
||||
"refsource": "MISC",
|
||||
"url": "https://hackerone.com/reports/169680"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-12-29",
|
||||
"ID": "CVE-2017-1000484",
|
||||
"REQUESTER": "security@plone.org",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Plone",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.5-5.1rc1"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Plone Foundation"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Open Redirection"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-16425",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -67,15 +67,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3615-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3615-1/"
|
||||
},
|
||||
{
|
||||
"name": "76000",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "https://secuniaresearch.flexerasoftware.com/advisories/76000/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3615-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3615-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4035",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4165",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4179",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-5415",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
Loading…
x
Reference in New Issue
Block a user