mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
05e2b3227c
commit
67feee35b1
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20020502 KPMG-2002017: Snapgear Lite+ Firewall Denial of Service",
|
"name": "4660",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=102035583114759&w=2"
|
"url": "http://www.securityfocus.com/bid/4660"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20020502 [VulnWatch] KPMG-2002017: Snapgear Lite+ Firewall Denial of Service",
|
|
||||||
"refsource" : "VULNWATCH",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0050.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.snapgear.com/releases.html",
|
"name": "http://www.snapgear.com/releases.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.snapgear.com/releases.html"
|
"url": "http://www.snapgear.com/releases.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20020502 [VulnWatch] KPMG-2002017: Snapgear Lite+ Firewall Denial of Service",
|
||||||
|
"refsource": "VULNWATCH",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0050.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "snapgear-vpn-ipoptions-dos(8988)",
|
"name": "snapgear-vpn-ipoptions-dos(8988)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "http://www.iss.net/security_center/static/8988.php"
|
"url": "http://www.iss.net/security_center/static/8988.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "4660",
|
"name": "20020502 KPMG-2002017: Snapgear Lite+ Firewall Denial of Service",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/4660"
|
"url": "http://marc.info/?l=bugtraq&m=102035583114759&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "A071202-1",
|
"name": "pingtel-xpressa-plaintext-passwords(9565)",
|
||||||
"refsource" : "ATSTAKE",
|
"refsource": "XF",
|
||||||
"url" : "http://www.atstake.com/research/advisories/2002/a071202-1.txt"
|
"url": "http://www.iss.net/security_center/static/9565.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.pingtel.com/PingtelAtStakeAdvisoryResponse.jsp",
|
"name": "http://www.pingtel.com/PingtelAtStakeAdvisoryResponse.jsp",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.pingtel.com/PingtelAtStakeAdvisoryResponse.jsp"
|
"url": "http://www.pingtel.com/PingtelAtStakeAdvisoryResponse.jsp"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "pingtel-xpressa-plaintext-passwords(9565)",
|
"name": "A071202-1",
|
||||||
"refsource" : "XF",
|
"refsource": "ATSTAKE",
|
||||||
"url" : "http://www.iss.net/security_center/static/9565.php"
|
"url": "http://www.atstake.com/research/advisories/2002/a071202-1.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "http://online.securityfocus.com/archive/1/273615"
|
"url": "http://online.securityfocus.com/archive/1/273615"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20020522 [VulnWatch] Multiple vulnerabilities in NewAtlanta ServletExec ISAPI 4.1",
|
"name": "4795",
|
||||||
"refsource" : "VULNWATCH",
|
"refsource": "BID",
|
||||||
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0077.html"
|
"url": "http://www.securityfocus.com/bid/4795"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "servletexec-dotdot-directory-traversal(9140)",
|
"name": "servletexec-dotdot-directory-traversal(9140)",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://www.iss.net/security_center/static/9140.php"
|
"url": "http://www.iss.net/security_center/static/9140.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "4795",
|
"name": "20020522 [VulnWatch] Multiple vulnerabilities in NewAtlanta ServletExec ISAPI 4.1",
|
||||||
"refsource" : "BID",
|
"refsource": "VULNWATCH",
|
||||||
"url" : "http://www.securityfocus.com/bid/4795"
|
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0077.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.idefense.com/advisory/10.31.02a.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.idefense.com/advisory/10.31.02a.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20021101 iDEFENSE Security Advisory 10.31.02a: Denial of Service Vulnerability in Linksys BEFSR41 EtherFast Cable/DSL Router",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=103616324103171&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20021101 iDEFENSE Security Advisory 10.31.02a: Denial of Service Vulnerability in Linksys BEFSR41 EtherFast Cable/DSL Router",
|
"name": "20021101 iDEFENSE Security Advisory 10.31.02a: Denial of Service Vulnerability in Linksys BEFSR41 EtherFast Cable/DSL Router",
|
||||||
"refsource": "VULNWATCH",
|
"refsource": "VULNWATCH",
|
||||||
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0049.html"
|
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0049.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "6086",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/6086"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.idefense.com/advisory/10.31.02a.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.idefense.com/advisory/10.31.02a.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "linksys-etherfast-gozila-dos(10514)",
|
"name": "linksys-etherfast-gozila-dos(10514)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "http://www.iss.net/security_center/static/10514.php"
|
"url": "http://www.iss.net/security_center/static/10514.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "6086",
|
"name": "20021101 iDEFENSE Security Advisory 10.31.02a: Denial of Service Vulnerability in Linksys BEFSR41 EtherFast Cable/DSL Router",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/6086"
|
"url": "http://marc.info/?l=bugtraq&m=103616324103171&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20020904 Bypassing the Finjan SurfinGate URL filter",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-09/0032.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20020904 RE: Bypassing the Finjan SurfinGate URL filter",
|
"name": "20020904 RE: Bypassing the Finjan SurfinGate URL filter",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/5634"
|
"url": "http://www.securityfocus.com/bid/5634"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20020904 Bypassing the Finjan SurfinGate URL filter",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0032.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "finjan-surfingate-dot-bypass(10037)",
|
"name": "finjan-surfingate-dot-bypass(10037)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "http://online.securityfocus.com/archive/1/291058"
|
"url": "http://online.securityfocus.com/archive/1/291058"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20020909 Small correction...",
|
"name": "5682",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-09/0082.html"
|
"url": "http://www.securityfocus.com/bid/5682"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "outlook-express-href-dos(10067)",
|
"name": "outlook-express-href-dos(10067)",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://www.iss.net/security_center/static/10067.php"
|
"url": "http://www.iss.net/security_center/static/10067.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "5682",
|
"name": "20020909 Small correction...",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/5682"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0082.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,31 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "MS03-024",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-024"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#337764",
|
"name": "VU#337764",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/337764"
|
"url": "http://www.kb.cert.org/vuls/id/337764"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "9225",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/9225"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:146",
|
"name": "oval:org.mitre.oval:def:146",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A146"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A146"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "win-smb-bo(12544)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/12544"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "8152",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/8152"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:118",
|
"name": "oval:org.mitre.oval:def:118",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
@ -87,15 +77,25 @@
|
|||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3391"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3391"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "win-smb-bo(12544)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12544"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MS03-024",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-024"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "8152",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/8152"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1007154",
|
"name": "1007154",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1007154"
|
"url": "http://securitytracker.com/id?1007154"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "9225",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/9225"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.punbb.org/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.punbb.org/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "14882",
|
"name": "14882",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/14882"
|
"url": "http://secunia.com/advisories/14882"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.punbb.org/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.punbb.org/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
"refsource": "FULLDISC",
|
"refsource": "FULLDISC",
|
||||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-May/033705.html"
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-May/033705.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.digitalmunition.com/DMA[2005-0501a].txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.digitalmunition.com/DMA[2005-0501a].txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1013855",
|
"name": "1013855",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "15197",
|
"name": "15197",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/15197"
|
"url": "http://secunia.com/advisories/15197"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.digitalmunition.com/DMA[2005-0501a].txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.digitalmunition.com/DMA[2005-0501a].txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,26 +57,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971588.htm"
|
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971588.htm"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "13926",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/13926"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2005-0727",
|
"name": "ADV-2005-0727",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -87,10 +67,30 @@
|
|||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/17240"
|
"url": "http://www.osvdb.org/17240"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "15644",
|
"name": "15644",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/15644"
|
"url": "http://secunia.com/advisories/15644"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "13926",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/13926"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,20 +57,20 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971588.htm"
|
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971588.htm"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2005-0727",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2005/0727"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm",
|
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm"
|
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971590.htm"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm",
|
"name": "15644",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm"
|
"url": "http://secunia.com/advisories/15644"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "13926",
|
"name": "13926",
|
||||||
@ -78,9 +78,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/13926"
|
"url": "http://www.securityfocus.com/bid/13926"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2005-0727",
|
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2005/0727"
|
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2971591.htm"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "17241",
|
"name": "17241",
|
||||||
@ -88,9 +88,9 @@
|
|||||||
"url": "http://www.osvdb.org/17241"
|
"url": "http://www.osvdb.org/17241"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "15644",
|
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/15644"
|
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097957.htm"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.princeofnigeria.org/blogs/index.php/2009/05/17/netdecision-tftp-server-4-2-tftp-directo?blog=1"
|
"url": "http://www.princeofnigeria.org/blogs/index.php/2009/05/17/netdecision-tftp-server-4-2-tftp-directo?blog=1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "35002",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/35002"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "35131",
|
"name": "35131",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "netdecision-tftp-dir-traversal(50574)",
|
"name": "netdecision-tftp-dir-traversal(50574)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50574"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50574"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "35002",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/35002"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[dev] 20090424 Buffer overflow in apr_brigade_vprintf() ?",
|
"name": "35487",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.mail-archive.com/dev@apr.apache.org/msg21591.html"
|
"url": "http://secunia.com/advisories/35487"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[dev] 20090424 Re: Buffer overflow in apr_brigade_vprintf() ?",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.mail-archive.com/dev@apr.apache.org/msg21592.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20090605 CVE Request (apr-util)",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2009/06/06/1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://svn.apache.org/viewvc?view=rev&revision=768417",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://svn.apache.org/viewvc?view=rev&revision=768417"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3",
|
"name": "http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3",
|
||||||
@ -78,44 +63,9 @@
|
|||||||
"url": "http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3"
|
"url": "http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=504390",
|
"name": "ADV-2009-1907",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "VUPEN",
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=504390"
|
"url": "http://www.vupen.com/english/advisories/2009/1907"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT3937",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT3937"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014463"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "PK88341",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PK88341"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "PK91241",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "PK99478",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2009-11-09-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2009-5969",
|
"name": "FEDORA-2009-5969",
|
||||||
@ -123,129 +73,179 @@
|
|||||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html"
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "FEDORA-2009-6014",
|
"name": "PK88341",
|
||||||
"refsource" : "FEDORA",
|
"refsource": "AIXAPAR",
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK88341"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2009-6261",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200907-03",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-200907-03.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBUX02612",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=129190899612998&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT100345",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=129190899612998&w=2"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MDVSA-2009:131",
|
"name": "MDVSA-2009:131",
|
||||||
"refsource": "MANDRIVA",
|
"refsource": "MANDRIVA",
|
||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:131"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:131"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "MDVSA-2013:150",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2009:1107",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1107.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2009:1108",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1108.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-786-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/usn-786-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-787-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/usn-787-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "35251",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/35251"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:11567",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11567"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:12237",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12237"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34724",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/34724"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "35487",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/35487"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "35395",
|
"name": "35395",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/35395"
|
"url": "http://secunia.com/advisories/35395"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "35565",
|
"name": "PK99478",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "AIXAPAR",
|
||||||
"url" : "http://secunia.com/advisories/35565"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "35710",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/35710"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "35284",
|
"name": "35284",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/35284"
|
"url": "http://secunia.com/advisories/35284"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "PK91241",
|
||||||
|
"refsource": "AIXAPAR",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20090605 CVE Request (apr-util)",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2009/06/06/1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "35251",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/35251"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "35843",
|
"name": "35843",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/35843"
|
"url": "http://secunia.com/advisories/35843"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2009-6014",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2009:1108",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2009-1108.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBUX02612",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=129190899612998&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "35797",
|
"name": "35797",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/35797"
|
"url": "http://secunia.com/advisories/35797"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://svn.apache.org/viewvc?view=rev&revision=768417",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://svn.apache.org/viewvc?view=rev&revision=768417"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-200907-03",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-200907-03.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[dev] 20090424 Re: Buffer overflow in apr_brigade_vprintf() ?",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.mail-archive.com/dev@apr.apache.org/msg21592.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:11567",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11567"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2009-6261",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[dev] 20090424 Buffer overflow in apr_brigade_vprintf() ?",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.mail-archive.com/dev@apr.apache.org/msg21591.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-786-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/usn-786-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=504390",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504390"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34724",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/34724"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "37221",
|
"name": "37221",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/37221"
|
"url": "http://secunia.com/advisories/37221"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2009-1907",
|
"name": "35565",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/1907"
|
"url": "http://secunia.com/advisories/35565"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-3184",
|
"name": "ADV-2009-3184",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2009/3184"
|
"url": "http://www.vupen.com/english/advisories/2009/3184"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT100345",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=129190899612998&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2009-11-09-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2013:150",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "35710",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/35710"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2009:1107",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2009-1107.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT3937",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT3937"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:12237",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12237"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-787-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/usn-787-1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2009-1977",
|
"ID": "CVE-2009-1977",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,41 +52,41 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-09-058/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-09-058/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "35672",
|
"name": "35672",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/35672"
|
"url": "http://www.securityfocus.com/bid/35672"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "55903",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/55903"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1022565",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1022565"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "35776",
|
"name": "35776",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/35776"
|
"url": "http://secunia.com/advisories/35776"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-09-058/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-058/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-1900",
|
"name": "ADV-2009-1900",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2009/1900"
|
"url": "http://www.vupen.com/english/advisories/2009/1900"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "55903",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/55903"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1022565",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1022565"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oracle-securebackup-sbc-unspecified(51761)",
|
"name": "oracle-securebackup-sbc-unspecified(51761)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2012-0098",
|
"ID": "CVE-2012-0098",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
|
"name": "sun-solarisunknown-dos(72510)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72510"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "78427",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/78427"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "48308",
|
"name": "48308",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://secunia.com/advisories/48308"
|
"url": "http://secunia.com/advisories/48308"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "sun-solarisunknown-dos(72510)",
|
"name": "78427",
|
||||||
"refsource" : "XF",
|
"refsource": "OSVDB",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72510"
|
"url": "http://osvdb.org/78427"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2012-0222",
|
"ID": "CVE-2012-0222",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2012-0230",
|
"ID": "CVE-2012-0230",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "52434",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/52434"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "proficy-plant-prrds-code-exec(73956)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73956"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "48415",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/48415"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.ge-ip.com/support/index?page=kbchannel&id=S:KB14766",
|
"name": "http://support.ge-ip.com/support/index?page=kbchannel&id=S:KB14766",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,21 +76,6 @@
|
|||||||
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-032-02.pdf",
|
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-032-02.pdf",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-032-02.pdf"
|
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-032-02.pdf"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "52434",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/52434"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "48415",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/48415"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "proficy-plant-prrds-code-exec(73956)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73956"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2012-0538",
|
"ID": "CVE-2012-0538",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "48882",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/48882"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1026954",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1026954"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "53065",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/53065"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -61,21 +76,6 @@
|
|||||||
"name": "MDVSA-2013:150",
|
"name": "MDVSA-2013:150",
|
||||||
"refsource": "MANDRIVA",
|
"refsource": "MANDRIVA",
|
||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "53065",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/53065"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1026954",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1026954"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "48882",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/48882"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -67,15 +67,15 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/47723"
|
"url": "http://secunia.com/advisories/47723"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "schneider-modicon-ftp-dos(72589)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72589"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "schneider-modicon-http-dos(72588)",
|
"name": "schneider-modicon-http-dos(72588)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72588"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72588"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "schneider-modicon-ftp-dos(72589)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72589"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2012-0966",
|
"ID": "CVE-2012-0966",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "hp-security-alert@hp.com",
|
||||||
"ID": "CVE-2012-3281",
|
"ID": "CVE-2012-3281",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2012-3308",
|
"ID": "CVE-2012-3308",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21599114",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21599114"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21607903",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21607903"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1027402",
|
"name": "1027402",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
@ -71,6 +61,16 @@
|
|||||||
"name": "ibm-sametime-xss(77567)",
|
"name": "ibm-sametime-xss(77567)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77567"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77567"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg21607903",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg21607903"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg21599114",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg21599114"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2012-3322",
|
"ID": "CVE-2012-3322",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21625624",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21625624"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "IV23838",
|
"name": "IV23838",
|
||||||
"refsource": "AIXAPAR",
|
"refsource": "AIXAPAR",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV23838"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV23838"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21625624",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21625624"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "mam-displayname-xss(77918)",
|
"name": "mam-displayname-xss(77918)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2012-3915",
|
"ID": "CVE-2012-3915",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "81684",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/81684"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "49029",
|
"name": "49029",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "mycare2xcms-multiple-sql-injection-(75390)",
|
"name": "mycare2xcms-multiple-sql-injection-(75390)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75390"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75390"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "81684",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/81684"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||||
"ID": "CVE-2012-4696",
|
"ID": "CVE-2012-4696",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.us-cert.gov/control_systems/pdf/ICSA-13-024-01.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-13-024-01.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "57546",
|
"name": "57546",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/57546"
|
"url": "http://www.securityfocus.com/bid/57546"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-024-01.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-024-01.pdf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@suse.com",
|
||||||
"ID": "CVE-2012-6703",
|
"ID": "CVE-2012-6703",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -62,16 +62,16 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b35cc8225845112a616e3a2266d2fde5ab13d3ab"
|
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b35cc8225845112a616e3a2266d2fde5ab13d3ab"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1351076",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1351076"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/torvalds/linux/commit/b35cc8225845112a616e3a2266d2fde5ab13d3ab",
|
"name": "https://github.com/torvalds/linux/commit/b35cc8225845112a616e3a2266d2fde5ab13d3ab",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/torvalds/linux/commit/b35cc8225845112a616e3a2266d2fde5ab13d3ab"
|
"url": "https://github.com/torvalds/linux/commit/b35cc8225845112a616e3a2266d2fde5ab13d3ab"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1351076",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351076"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.kernel.org/pub/linux/kernel/next/patch-v3.6-rc6-next-20120917.xz",
|
"name": "https://www.kernel.org/pub/linux/kernel/next/patch-v3.6-rc6-next-20120917.xz",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
"ASSIGNER": "larry0@me.com",
|
||||||
"DATE_ASSIGNED": "2017-03-01",
|
"DATE_ASSIGNED": "2017-03-01",
|
||||||
"ID": "CVE-2017-1002002",
|
"ID": "CVE-2017-1002002",
|
||||||
"REQUESTER": "kurt@seifried.org",
|
"REQUESTER": "kurt@seifried.org",
|
||||||
@ -57,14 +57,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "41540",
|
"name": "96906",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "BID",
|
||||||
"url" : "https://www.exploit-db.com/exploits/41540/"
|
"url": "http://www.securityfocus.com/bid/96906"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.vapidlabs.com/advisory.php?v=181",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.vapidlabs.com/advisory.php?v=181"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://wordpress.org/plugins-wp/webapp-builder/",
|
"name": "https://wordpress.org/plugins-wp/webapp-builder/",
|
||||||
@ -72,9 +67,14 @@
|
|||||||
"url": "https://wordpress.org/plugins-wp/webapp-builder/"
|
"url": "https://wordpress.org/plugins-wp/webapp-builder/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "96906",
|
"name": "http://www.vapidlabs.com/advisory.php?v=181",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/96906"
|
"url": "http://www.vapidlabs.com/advisory.php?v=181"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "41540",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/41540/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "97113",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/97113"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.securebrain.co.jp/about/news/2017/03/170316.html",
|
"name": "http://www.securebrain.co.jp/about/news/2017/03/170316.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "JVN#93699304",
|
"name": "JVN#93699304",
|
||||||
"refsource": "JVN",
|
"refsource": "JVN",
|
||||||
"url": "http://jvn.jp/en/jp/JVN93699304/index.html"
|
"url": "http://jvn.jp/en/jp/JVN93699304/index.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "97113",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/97113"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://support.apple.com/HT207617",
|
"name": "1038139",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://support.apple.com/HT207617"
|
"url": "http://www.securitytracker.com/id/1038139"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "97138",
|
"name": "97138",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/97138"
|
"url": "http://www.securityfocus.com/bid/97138"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1038139",
|
"name": "https://support.apple.com/HT207617",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1038139"
|
"url": "https://support.apple.com/HT207617"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20170216 Linux: CVE-2017-6001: Incomplete fix for CVE-2016-6786: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race",
|
"name": "96264",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2017/02/16/1"
|
"url": "http://www.securityfocus.com/bid/96264"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825",
|
||||||
@ -77,40 +67,50 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/torvalds/linux/commit/321027c1fe77f892f4ea07846aeae08cefbbb290"
|
"url": "https://github.com/torvalds/linux/commit/321027c1fe77f892f4ea07846aeae08cefbbb290"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://source.android.com/security/bulletin/pixel/2017-11-01",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.android.com/security/bulletin/pixel/2017-11-01"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3791",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2017/dsa-3791"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:2669",
|
"name": "RHSA-2017:2669",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2017:2669"
|
"url": "https://access.redhat.com/errata/RHSA-2017:2669"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2017:1842",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1842"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2017:2077",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2077"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:1854",
|
"name": "RHSA-2018:1854",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
|
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "96264",
|
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/96264"
|
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.android.com/security/bulletin/pixel/2017-11-01",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.android.com/security/bulletin/pixel/2017-11-01"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2017:2077",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2017:2077"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2017:1842",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2017:1842"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3791",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2017/dsa-3791"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20170216 Linux: CVE-2017-6001: Incomplete fix for CVE-2016-6786: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2017/02/16/1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-ios1"
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170621-ios1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "99226",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/99226"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1038741",
|
"name": "1038741",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1038741"
|
"url": "http://www.securitytracker.com/id/1038741"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "99226",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/99226"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -62,15 +62,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-asa2"
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-asa2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "100113",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/100113"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1039057",
|
"name": "1039057",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1039057"
|
"url": "http://www.securitytracker.com/id/1039057"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "100113",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/100113"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "sfowler@redhat.com",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2017-7497",
|
"ID": "CVE-2017-7497",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -53,20 +53,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/hercules-team/augeas/pull/480",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/hercules-team/augeas/pull/480"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://puppet.com/security/cve/cve-2017-7555",
|
"name": "https://puppet.com/security/cve/cve-2017-7555",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://puppet.com/security/cve/cve-2017-7555"
|
"url": "https://puppet.com/security/cve/cve-2017-7555"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-3949",
|
"name": "100378",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "BID",
|
||||||
"url" : "http://www.debian.org/security/2017/dsa-3949"
|
"url": "http://www.securityfocus.com/bid/100378"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:2788",
|
"name": "RHSA-2017:2788",
|
||||||
@ -74,9 +69,14 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2017:2788"
|
"url": "https://access.redhat.com/errata/RHSA-2017:2788"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "100378",
|
"name": "https://github.com/hercules-team/augeas/pull/480",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/100378"
|
"url": "https://github.com/hercules-team/augeas/pull/480"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3949",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2017/dsa-3949"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,25 +53,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[debian-lts-announce] 20180825 [SECURITY] [DLA 1477-1] libgit2 security update",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/08/msg00024.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1598024",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1598024"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/libgit2/libgit2/commit/9844d38bed10e9ff17174434b3421b227ae710f3",
|
"name": "https://github.com/libgit2/libgit2/commit/9844d38bed10e9ff17174434b3421b227ae710f3",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/libgit2/libgit2/commit/9844d38bed10e9ff17174434b3421b227ae710f3"
|
"url": "https://github.com/libgit2/libgit2/commit/9844d38bed10e9ff17174434b3421b227ae710f3"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[debian-lts-announce] 20180825 [SECURITY] [DLA 1477-1] libgit2 security update",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00024.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/libgit2/libgit2/releases/tag/v0.27.3",
|
"name": "https://github.com/libgit2/libgit2/releases/tag/v0.27.3",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/libgit2/libgit2/releases/tag/v0.27.3"
|
"url": "https://github.com/libgit2/libgit2/releases/tag/v0.27.3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1598024",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1598024"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,15 +53,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[trafficserver-announce] 20190212 [ANNOUNCE] Apache Traffic Server vulnerability with sslheader plugin",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://lists.apache.org/thread.html/4f102f943935476732fb1fb653d687c7b69d29d9792f0d6cf72c505e@%3Cannounce.trafficserver.apache.org%3E"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "107032",
|
"name": "107032",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/107032"
|
"url": "http://www.securityfocus.com/bid/107032"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[trafficserver-announce] 20190212 [ANNOUNCE] Apache Traffic Server vulnerability with sslheader plugin",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.apache.org/thread.html/4f102f943935476732fb1fb653d687c7b69d29d9792f0d6cf72c505e@%3Cannounce.trafficserver.apache.org%3E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2018-15619",
|
"ID": "CVE-2018-15619",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2018-15622",
|
"ID": "CVE-2018-15622",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[debian-lts-announce] 20190211 [SECURITY] [DLA 1673-1] wordpress security update",
|
"name": "106220",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2019/02/msg00019.html"
|
"url": "http://www.securityfocus.com/bid/106220"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://codex.wordpress.org/Version_4.9.9",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://codex.wordpress.org/Version_4.9.9"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://wordpress.org/support/wordpress-version/version-5-0-1/",
|
"name": "https://wordpress.org/support/wordpress-version/version-5-0-1/",
|
||||||
@ -73,9 +63,9 @@
|
|||||||
"url": "https://wordpress.org/support/wordpress-version/version-5-0-1/"
|
"url": "https://wordpress.org/support/wordpress-version/version-5-0-1/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/",
|
"name": "https://codex.wordpress.org/Version_4.9.9",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/"
|
"url": "https://codex.wordpress.org/Version_4.9.9"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://wpvulndb.com/vulnerabilities/9170",
|
"name": "https://wpvulndb.com/vulnerabilities/9170",
|
||||||
@ -88,9 +78,19 @@
|
|||||||
"url": "https://www.debian.org/security/2019/dsa-4401"
|
"url": "https://www.debian.org/security/2019/dsa-4401"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "106220",
|
"name": "https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/106220"
|
"url": "https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[debian-lts-announce] 20190211 [SECURITY] [DLA 1673-1] wordpress security update",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00019.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2018-9553",
|
"ID": "CVE-2018-9553",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://source.android.com/security/bulletin/2018-12-01",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.android.com/security/bulletin/2018-12-01"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "106137",
|
"name": "106137",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/106137"
|
"url": "http://www.securityfocus.com/bid/106137"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.android.com/security/bulletin/2018-12-01",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-12-01"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user