mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
595ce4568e
commit
67bea184e8
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20010313 More Icecast remote vulnerabilities",
|
"name": "RHSA-2002:063",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=98455723123298&w=2"
|
"url": "http://www.redhat.com/support/errata/RHSA-2002-063.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-089",
|
"name": "DSA-089",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.debian.org/security/2001/dsa-089"
|
"url": "http://www.debian.org/security/2001/dsa-089"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2002:063",
|
"name": "20010313 More Icecast remote vulnerabilities",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2002-063.html"
|
"url": "http://marc.info/?l=bugtraq&m=98455723123298&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=412751",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=412751"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-1560",
|
"name": "ADV-2006-1560",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "phex-request-dos(26124)",
|
"name": "phex-request-dos(26124)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26124"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26124"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://sourceforge.net/project/shownotes.php?release_id=412751",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=412751"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2006-2381",
|
"ID": "CVE-2006-2381",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "20115",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/20115"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1779",
|
"name": "1779",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -62,6 +67,11 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/17977"
|
"url": "http://www.securityfocus.com/bid/17977"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "phpbluedragon-finduser-file-include(26455)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26455"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-1789",
|
"name": "ADV-2006-1789",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -71,16 +81,6 @@
|
|||||||
"name": "25533",
|
"name": "25533",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/25533"
|
"url": "http://www.osvdb.org/25533"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20115",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/20115"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "phpbluedragon-finduser-file-include(26455)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26455"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,55 +52,55 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060624 Mailenable SMTP Service DoS",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/438374/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.divisionbyzero.be/?p=173",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.divisionbyzero.be/?p=173"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.divisionbyzero.be/?p=174",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.divisionbyzero.be/?p=174"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.mailenable.com/hotfix/mesmtpc.zip",
|
"name": "http://www.mailenable.com/hotfix/mesmtpc.zip",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.mailenable.com/hotfix/mesmtpc.zip"
|
"url": "http://www.mailenable.com/hotfix/mesmtpc.zip"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "18630",
|
"name": "mailenable-smtp-helo-dos(27387)",
|
||||||
"refsource" : "BID",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/bid/18630"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27387"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-2520",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/2520"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "26791",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/26791"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1016376",
|
"name": "1016376",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1016376"
|
"url": "http://securitytracker.com/id?1016376"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-2520",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/2520"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20790",
|
"name": "20790",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/20790"
|
"url": "http://secunia.com/advisories/20790"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "mailenable-smtp-helo-dos(27387)",
|
"name": "26791",
|
||||||
"refsource" : "XF",
|
"refsource": "OSVDB",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27387"
|
"url": "http://www.osvdb.org/26791"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.divisionbyzero.be/?p=174",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.divisionbyzero.be/?p=174"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18630",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/18630"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.divisionbyzero.be/?p=173",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.divisionbyzero.be/?p=173"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060624 Mailenable SMTP Service DoS",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/438374/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://pridels0.blogspot.com/2006/06/phpqladmin-vuln.html",
|
"name": "20788",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://pridels0.blogspot.com/2006/06/phpqladmin-vuln.html"
|
"url": "http://secunia.com/advisories/20788"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18658",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/18658"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-2532",
|
"name": "ADV-2006-2532",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/2532"
|
"url": "http://www.vupen.com/english/advisories/2006/2532"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20788",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/20788"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "phpqladmin-useradd-unitadd-xss(27364)",
|
"name": "phpqladmin-useradd-unitadd-xss(27364)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27364"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27364"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18658",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/18658"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://pridels0.blogspot.com/2006/06/phpqladmin-vuln.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://pridels0.blogspot.com/2006/06/phpqladmin-vuln.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,20 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060714 EEYE: McAfee ePolicy Orchestrator Remote Compromise",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/440077/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.eeye.com/html/research/advisories/AD20060713.html",
|
"name": "http://www.eeye.com/html/research/advisories/AD20060713.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.eeye.com/html/research/advisories/AD20060713.html"
|
"url": "http://www.eeye.com/html/research/advisories/AD20060713.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "18979",
|
"name": "epolicy-epo-directory-traversal(27738)",
|
||||||
"refsource" : "BID",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/bid/18979"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27738"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21037",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21037"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-2796",
|
"name": "ADV-2006-2796",
|
||||||
@ -77,20 +77,20 @@
|
|||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/27158"
|
"url": "http://www.osvdb.org/27158"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "18979",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/18979"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060714 EEYE: McAfee ePolicy Orchestrator Remote Compromise",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/440077/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1016501",
|
"name": "1016501",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1016501"
|
"url": "http://securitytracker.com/id?1016501"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21037",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21037"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "epolicy-epo-directory-traversal(27738)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27738"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20061122 Lack of environment sanitization in the FreeBSD, OpenBSD, NetBSD dynamic loaders.",
|
"name": "[3.9] 016: SECURITY FIX: November 19, 2006",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "OPENBSD",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/452371/100/0/threaded"
|
"url": "http://www.openbsd.org/errata39.html#ldso"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20061123 Re: Lack of environment sanitization in the FreeBSD, OpenBSD, NetBSD dynamic loaders.",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/452428/100/0/threaded"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.matasano.com/log/592/finger-79tcp-mcdonald-dowd-and-schuh-challenge-part-2/",
|
"name": "http://www.matasano.com/log/592/finger-79tcp-mcdonald-dowd-and-schuh-challenge-part-2/",
|
||||||
@ -68,30 +63,35 @@
|
|||||||
"url": "http://www.matasano.com/log/592/finger-79tcp-mcdonald-dowd-and-schuh-challenge-part-2/"
|
"url": "http://www.matasano.com/log/592/finger-79tcp-mcdonald-dowd-and-schuh-challenge-part-2/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[3.9] 016: SECURITY FIX: November 19, 2006",
|
"name": "20061123 Re: Lack of environment sanitization in the FreeBSD, OpenBSD, NetBSD dynamic loaders.",
|
||||||
"refsource" : "OPENBSD",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.openbsd.org/errata39.html#ldso"
|
"url": "http://www.securityfocus.com/archive/1/452428/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[4.0] 005: SECURITY FIX: November 19, 2006",
|
"name": "22993",
|
||||||
"refsource" : "OPENBSD",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.openbsd.org/errata.html#ldso"
|
"url": "http://secunia.com/advisories/22993"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "21188",
|
"name": "21188",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/21188"
|
"url": "http://www.securityfocus.com/bid/21188"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[4.0] 005: SECURITY FIX: November 19, 2006",
|
||||||
|
"refsource": "OPENBSD",
|
||||||
|
"url": "http://www.openbsd.org/errata.html#ldso"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20061122 Lack of environment sanitization in the FreeBSD, OpenBSD, NetBSD dynamic loaders.",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/452371/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1017253",
|
"name": "1017253",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1017253"
|
"url": "http://securitytracker.com/id?1017253"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "22993",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/22993"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openbsd-elf-privilege-escalation(30441)",
|
"name": "openbsd-elf-privilege-escalation(30441)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20061124 Cross site scripting & fullpath disclosure",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/452555/100/100/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "21278",
|
"name": "21278",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/21278"
|
"url": "http://www.securityfocus.com/bid/21278"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1967",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/1967"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "simple-php-spindex-xss(30490)",
|
"name": "simple-php-spindex-xss(30490)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30490"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30490"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20061124 Cross site scripting & fullpath disclosure",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/452555/100/100/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1967",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/1967"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20061124 Wolflab Burning Board Lite 1.0.2 two sql injections",
|
"name": "21265",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/452561/100/0/threaded"
|
"url": "http://www.securityfocus.com/bid/21265"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://retrogod.altervista.org/wbblite_102_sql.html",
|
"name": "http://retrogod.altervista.org/wbblite_102_sql.html",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://retrogod.altervista.org/wbblite_102_sql.html"
|
"url": "http://retrogod.altervista.org/wbblite_102_sql.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "21265",
|
"name": "20061124 Wolflab Burning Board Lite 1.0.2 two sql injections",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/21265"
|
"url": "http://www.securityfocus.com/archive/1/452561/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=%23400582",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=%23400582"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "2786",
|
"name": "2786",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "22880",
|
"name": "22880",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/22880"
|
"url": "http://secunia.com/advisories/22880"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=%23400582",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=%23400582"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20061023 http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/449501/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html",
|
"name": "http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html"
|
"url": "http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "22396",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/22396"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "2382",
|
"name": "2382",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
@ -76,6 +66,16 @@
|
|||||||
"name": "oracle-notification-msg-xss(30107)",
|
"name": "oracle-notification-msg-xss(30107)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30107"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30107"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22396",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/22396"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20061023 http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/449501/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2011-0193",
|
"ID": "CVE-2011-0193",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT4581",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT4581"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2011-03-21-1",
|
"name": "APPLE-SA-2011-03-21-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
|
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT4581",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT4581"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "hp-security-alert@hp.com",
|
||||||
"ID": "CVE-2011-0277",
|
"ID": "CVE-2011-0277",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "HPSBMA02629",
|
"name": "1025032",
|
||||||
"refsource" : "HP",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02711131"
|
"url": "http://www.securitytracker.com/id?1025032"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT100381",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02711131"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "46258",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/46258"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "70836",
|
"name": "70836",
|
||||||
@ -73,9 +63,19 @@
|
|||||||
"url": "http://osvdb.org/70836"
|
"url": "http://osvdb.org/70836"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1025032",
|
"name": "46258",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securitytracker.com/id?1025032"
|
"url": "http://www.securityfocus.com/bid/46258"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT100381",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02711131"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBMA02629",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02711131"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "43058",
|
"name": "43058",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2011-0798",
|
"ID": "CVE-2011-0798",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "71352",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/71352"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20110329 XSS Vulnerability in Tracks 1.7.2",
|
"name": "20110329 XSS Vulnerability in Tracks 1.7.2",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -63,29 +68,24 @@
|
|||||||
"url": "http://www.mavitunasecurity.com/XSS-vulnerability-in-Tracks/"
|
"url": "http://www.mavitunasecurity.com/XSS-vulnerability-in-Tracks/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.getontracks.org/downloads/comments/tracks-173",
|
"name": "8196",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.getontracks.org/downloads/comments/tracks-173"
|
"url": "http://securityreason.com/securityalert/8196"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "47078",
|
"name": "47078",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/47078"
|
"url": "http://www.securityfocus.com/bid/47078"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "71352",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/71352"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "43909",
|
"name": "43909",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/43909"
|
"url": "http://secunia.com/advisories/43909"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "8196",
|
"name": "http://www.getontracks.org/downloads/comments/tracks-173",
|
||||||
"refsource" : "SREASON",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://securityreason.com/securityalert/8196"
|
"url": "http://www.getontracks.org/downloads/comments/tracks-173"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "tracks-todoscontroller-xss(66561)",
|
"name": "tracks-todoscontroller-xss(66561)",
|
||||||
|
@ -52,20 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21504279",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21504279"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg24030333",
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg24030333",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg24030333"
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg24030333"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "JR39769",
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg21504279",
|
||||||
"refsource" : "AIXAPAR",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1JR39769"
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg21504279"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "45036",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/45036"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "48516",
|
"name": "48516",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/48516"
|
"url": "http://www.securityfocus.com/bid/48516"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "45036",
|
"name": "JR39769",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "AIXAPAR",
|
||||||
"url" : "http://secunia.com/advisories/45036"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR39769"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2011-3480",
|
"ID": "CVE-2011-3480",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2011-3544",
|
"ID": "CVE-2011-3544",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,89 +53,89 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
|
"name": "oval:org.mitre.oval:def:13947",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "OVAL",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13947"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.ibm.com/developerworks/java/jdk/alerts/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.ibm.com/developerworks/java/jdk/alerts/"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201406-32",
|
"name": "GLSA-201406-32",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
|
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "HPSBUX02730",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=132750579901589&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT100710",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=132750579901589&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBMU02797",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT100867",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "HPSBMU02799",
|
"name": "HPSBMU02799",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2011:1384",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1384.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2013:1455",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2012:0114",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-1263-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1263-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "50218",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/50218"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:13947",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13947"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1026215",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1026215"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "48308",
|
"name": "48308",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/48308"
|
"url": "http://secunia.com/advisories/48308"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBUX02730",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=132750579901589&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2012:0114",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2013:1455",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT100710",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=132750579901589&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2011:1384",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "50218",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/50218"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT100867",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oracle-jre-scripting-unspecified(70849)",
|
"name": "oracle-jre-scripting-unspecified(70849)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70849"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70849"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1026215",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1026215"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-1263-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-1263-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBMU02797",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.ibm.com/developerworks/java/jdk/alerts/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-3589",
|
"ID": "CVE-2011-3589",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -53,35 +53,40 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb",
|
"name": "FEDORA-2011-13633",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://puppet.com/security/cve/cve-2011-3870",
|
"name": "https://puppet.com/security/cve/cve-2011-3870",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://puppet.com/security/cve/cve-2011-3870"
|
"url": "https://puppet.com/security/cve/cve-2011-3870"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-2314",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2011/dsa-2314"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2011-13623",
|
"name": "FEDORA-2011-13623",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "FEDORA-2011-13633",
|
"name": "DSA-2314",
|
||||||
"refsource" : "FEDORA",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html"
|
"url": "http://www.debian.org/security/2011/dsa-2314"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "46458",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/46458"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2011-13636",
|
"name": "FEDORA-2011-13636",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1223-1",
|
"name": "USN-1223-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
@ -91,11 +96,6 @@
|
|||||||
"name": "USN-1223-2",
|
"name": "USN-1223-2",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1223-2"
|
"url": "http://www.ubuntu.com/usn/USN-1223-2"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "46458",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/46458"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2011-4529",
|
"ID": "CVE-2011-4529",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "http://support.automation.siemens.com/WW/view/en/114358",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.automation.siemens.com/WW/view/en/114358"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://aluigi.altervista.org/adv/almsrvx_1-adv.txt",
|
"name": "http://aluigi.altervista.org/adv/almsrvx_1-adv.txt",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://aluigi.altervista.org/adv/almsrvx_1-adv.txt"
|
"url": "http://aluigi.altervista.org/adv/almsrvx_1-adv.txt"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.us-cert.gov/control_systems/pdf/ICSA-11-361-01.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-11-361-01.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://support.automation.siemens.com/WW/llisapi.dll/57252401?func=ll&objId=57252401&objAction=csView&nodeid0=17323948&lang=en&siteid=cseus&aktprim=0&extranet=standard&viewreg=WW&load=content",
|
"name": "http://support.automation.siemens.com/WW/llisapi.dll/57252401?func=ll&objId=57252401&objAction=csView&nodeid0=17323948&lang=en&siteid=cseus&aktprim=0&extranet=standard&viewreg=WW&load=content",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.automation.siemens.com/WW/llisapi.dll/57252401?func=ll&objId=57252401&objAction=csView&nodeid0=17323948&lang=en&siteid=cseus&aktprim=0&extranet=standard&viewreg=WW&load=content"
|
"url": "http://support.automation.siemens.com/WW/llisapi.dll/57252401?func=ll&objId=57252401&objAction=csView&nodeid0=17323948&lang=en&siteid=cseus&aktprim=0&extranet=standard&viewreg=WW&load=content"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://support.automation.siemens.com/WW/view/en/114358",
|
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-361-01.pdf",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url" : "http://support.automation.siemens.com/WW/view/en/114358"
|
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-361-01.pdf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,34 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20130730 MojoPortal XSS",
|
"name": "54297",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-07/0200.html"
|
"url": "http://secunia.com/advisories/54297"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/122608/MojoPortal-2.3.9.7-Cross-Site-Scripting.html",
|
"name": "http://packetstormsecurity.com/files/122608/MojoPortal-2.3.9.7-Cross-Site-Scripting.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/122608/MojoPortal-2.3.9.7-Cross-Site-Scripting.html"
|
"url": "http://packetstormsecurity.com/files/122608/MojoPortal-2.3.9.7-Cross-Site-Scripting.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.mojoportal.com/mojoportal-2398-released",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.mojoportal.com/mojoportal-2398-released"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "61520",
|
"name": "61520",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/61520"
|
"url": "http://www.securityfocus.com/bid/61520"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20130730 MojoPortal XSS",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0200.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "95847",
|
"name": "95847",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/95847"
|
"url": "http://osvdb.org/95847"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "54297",
|
"name": "https://www.mojoportal.com/mojoportal-2398-released",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/54297"
|
"url": "https://www.mojoportal.com/mojoportal-2398-released"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "mojoportal-editpost-xss(86058)",
|
"name": "mojoportal-editpost-xss(86058)",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2013-5542",
|
"ID": "CVE-2013-5542",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "http://hylafax.sourceforge.net/news/5.5.4.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://hylafax.sourceforge.net/news/5.5.4.php"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20130930 CVE-2130-5680, HylaFAX+ heap overflow, unchecked network traffic.",
|
"name": "20130930 CVE-2130-5680, HylaFAX+ heap overflow, unchecked network traffic.",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -62,11 +67,6 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/28683"
|
"url": "http://www.exploit-db.com/exploits/28683"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://hylafax.sourceforge.net/news/5.5.4.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://hylafax.sourceforge.net/news/5.5.4.php"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "62729",
|
"name": "62729",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "97366",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/97366"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.htbridge.com/advisory/HTB23172",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.htbridge.com/advisory/HTB23172"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20130925 Multiple Vulnerabilities in X2CRM",
|
"name": "20130925 Multiple Vulnerabilities in X2CRM",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -61,16 +71,6 @@
|
|||||||
"name": "28557",
|
"name": "28557",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/28557"
|
"url": "http://www.exploit-db.com/exploits/28557"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.htbridge.com/advisory/HTB23172",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.htbridge.com/advisory/HTB23172"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "97366",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/97366"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,34 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[dev] 20140401 CVE-2013-5704, mod_headers and chunked trailer fields",
|
"name": "HPSBUX03512",
|
||||||
"refsource" : "MLIST",
|
"refsource": "HP",
|
||||||
"url" : "http://marc.info/?l=apache-httpd-dev&m=139636309822854&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=144493176821532&w=2"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://martin.swende.se/blog/HTTPChunked.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://martin.swende.se/blog/HTTPChunked.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1610674&r2=1610814&diff_format=h",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1610674&r2=1610814&diff_format=h"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT204659",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT204659"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
|
||||||
@ -88,124 +63,149 @@
|
|||||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://support.apple.com/HT205219",
|
"name": "https://support.apple.com/HT204659",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://support.apple.com/HT205219"
|
"url": "https://support.apple.com/HT204659"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
|
"name": "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES"
|
"url": "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://httpd.apache.org/security/vulnerabilities_24.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://httpd.apache.org/security/vulnerabilities_24.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-04-08-2",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-09-16-4",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201504-03",
|
"name": "GLSA-201504-03",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201504-03"
|
"url": "https://security.gentoo.org/glsa/201504-03"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "HPSBUX03337",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=143403519711434&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBUX03512",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=144493176821532&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT102066",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=143403519711434&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT102254",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=144493176821532&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2014:174",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2014:174"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:0325",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0325.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:0062",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0062.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:0061",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0061.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:2659",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2015:2659"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:2660",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2015:2660"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:2661",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2661.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2015:1249",
|
"name": "RHSA-2015:1249",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1249.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1249.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:0061",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0061.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:0325",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-0325.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2014:174",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:174"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2523-1",
|
"name": "USN-2523-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2523-1"
|
"url": "http://www.ubuntu.com/usn/USN-2523-1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:0062",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT102066",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:2661",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-2661.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT102254",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=144493176821532&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-04-08-2",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1610674&r2=1610814&diff_format=h",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1610674&r2=1610814&diff_format=h"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:2659",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2015:2659"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:2660",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2015:2660"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://martin.swende.se/blog/HTTPChunked.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://martin.swende.se/blog/HTTPChunked.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-09-16-4",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBUX03337",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205219",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205219"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "66550",
|
"name": "66550",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/66550"
|
"url": "http://www.securityfocus.com/bid/66550"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[dev] 20140401 CVE-2013-5704, mod_headers and chunked trailer fields",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://marc.info/?l=apache-httpd-dev&m=139636309822854&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/531527/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/531527/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.htbridge.com/advisory/HTB23205",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.htbridge.com/advisory/HTB23205"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "66312",
|
"name": "66312",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/66312"
|
"url": "http://www.securityfocus.com/bid/66312"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.htbridge.com/advisory/HTB23205",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.htbridge.com/advisory/HTB23205"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2014-2773",
|
"ID": "CVE-2014-2773",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "MS14-035",
|
"name": "1030370",
|
||||||
"refsource" : "MS",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
|
"url": "http://www.securitytracker.com/id/1030370"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "67858",
|
"name": "67858",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/67858"
|
"url": "http://www.securityfocus.com/bid/67858"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1030370",
|
"name": "MS14-035",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MS",
|
||||||
"url" : "http://www.securitytracker.com/id/1030370"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-6693",
|
"ID": "CVE-2014-6693",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
"name": "VU#913025",
|
||||||
"refsource" : "MISC",
|
"refsource": "CERT-VN",
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
"url": "http://www.kb.cert.org/vuls/id/913025"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#913025",
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/913025"
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-6752",
|
"ID": "CVE-2014-6752",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#124193",
|
"name": "VU#124193",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-6889",
|
"ID": "CVE-2014-6889",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "VU#582497",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "VU#427089",
|
"name": "VU#427089",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/427089"
|
"url": "http://www.kb.cert.org/vuls/id/427089"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#582497",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/582497"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
File diff suppressed because it is too large
Load Diff
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2014-7312",
|
"ID": "CVE-2014-7312",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "41659",
|
"name": "96643",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "BID",
|
||||||
"url" : "https://www.exploit-db.com/exploits/41659/"
|
"url": "http://www.securityfocus.com/bid/96643"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0063",
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0063",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0063"
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0063"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "96643",
|
"name": "41659",
|
||||||
"refsource" : "BID",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://www.securityfocus.com/bid/96643"
|
"url": "https://www.exploit-db.com/exploits/41659/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1038002",
|
"name": "1038002",
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "98272",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/98272"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02",
|
"name": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -62,11 +67,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0279"
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0279"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "98272",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/98272"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1038430",
|
"name": "1038430",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2017-0627",
|
"ID": "CVE-2017-0627",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -55,6 +55,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "USN-3674-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "https://usn.ubuntu.com/3674-1/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://source.android.com/security/bulletin/2017-05-01",
|
"name": "https://source.android.com/security/bulletin/2017-05-01",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -65,11 +70,6 @@
|
|||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "https://usn.ubuntu.com/3674-2/"
|
"url": "https://usn.ubuntu.com/3674-2/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "USN-3674-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "https://usn.ubuntu.com/3674-1/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "98205",
|
"name": "98205",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://ftp.gnu.org/gnu/libcdio/libcdio-1.0.0.tar.gz",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://ftp.gnu.org/gnu/libcdio/libcdio-1.0.0.tar.gz"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://savannah.gnu.org/bugs/?52265",
|
"name": "https://savannah.gnu.org/bugs/?52265",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://savannah.gnu.org/bugs/?52265"
|
"url": "https://savannah.gnu.org/bugs/?52265"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2018:3246",
|
"name": "http://ftp.gnu.org/gnu/libcdio/libcdio-1.0.0.tar.gz",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:3246"
|
"url": "http://ftp.gnu.org/gnu/libcdio/libcdio-1.0.0.tar.gz"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "103200",
|
"name": "103200",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/103200"
|
"url": "http://www.securityfocus.com/bid/103200"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2018:3246",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2018:3246"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -79,15 +79,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/123674"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/123674"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22006618",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22006618"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "100129",
|
"name": "100129",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/100129"
|
"url": "http://www.securityfocus.com/bid/100129"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006618",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg22006618"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-1901",
|
"ID": "CVE-2017-1901",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4216",
|
"ID": "CVE-2017-4216",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4359",
|
"ID": "CVE-2017-4359",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -54,24 +54,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1308688",
|
"name": "1037693",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1308688"
|
"url": "http://www.securitytracker.com/id/1037693"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.mozilla.org/security/advisories/mfsa2017-01/",
|
"name": "https://www.mozilla.org/security/advisories/mfsa2017-01/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2017-01/"
|
"url": "https://www.mozilla.org/security/advisories/mfsa2017-01/"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1308688",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1308688"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "95763",
|
"name": "95763",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/95763"
|
"url": "http://www.securityfocus.com/bid/95763"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1037693",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1037693"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://securityadvisories.paloaltonetworks.com/Home/Detail/74",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://securityadvisories.paloaltonetworks.com/Home/Detail/74"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "96371",
|
"name": "96371",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "1037889",
|
"name": "1037889",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1037889"
|
"url": "http://www.securitytracker.com/id/1037889"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://securityadvisories.paloaltonetworks.com/Home/Detail/74",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://securityadvisories.paloaltonetworks.com/Home/Detail/74"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user