mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
84cf86f99b
commit
6ab07d9892
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2008-0072",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,99 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080528 rPSA-2008-0105-1 evolution",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/492684/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://secunia.com/secunia_research/2008-8/advisory/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secunia.com/secunia_research/2008-8/advisory/"
|
||||
},
|
||||
{
|
||||
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0105",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0105"
|
||||
},
|
||||
{
|
||||
"name" : "https://issues.rpath.com/browse/RPL-2310",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://issues.rpath.com/browse/RPL-2310"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1512",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2008/dsa-1512"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-2290",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00190.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-2292",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00195.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200803-12",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200803-12.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2008:063",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:063"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0177",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0177.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0178",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0178.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2008:014",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-583-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-583-1"
|
||||
},
|
||||
{
|
||||
"name" : "VU#512491",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/512491"
|
||||
},
|
||||
{
|
||||
"name" : "28102",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28102"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10701",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10701"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0768",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0768/references"
|
||||
},
|
||||
{
|
||||
"name" : "1019540",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1019540"
|
||||
},
|
||||
{
|
||||
"name" : "29057",
|
||||
"name": "29258",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29057"
|
||||
"url": "http://secunia.com/advisories/29258"
|
||||
},
|
||||
{
|
||||
"name": "29163",
|
||||
@ -153,44 +63,134 @@
|
||||
"url": "http://secunia.com/advisories/29163"
|
||||
},
|
||||
{
|
||||
"name" : "29210",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29210"
|
||||
"name": "DSA-1512",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1512"
|
||||
},
|
||||
{
|
||||
"name" : "29244",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29244"
|
||||
"name": "RHSA-2008:0178",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0178.html"
|
||||
},
|
||||
{
|
||||
"name" : "29258",
|
||||
"name": "29057",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29258"
|
||||
"url": "http://secunia.com/advisories/29057"
|
||||
},
|
||||
{
|
||||
"name" : "29264",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29264"
|
||||
"name": "VU#512491",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/512491"
|
||||
},
|
||||
{
|
||||
"name" : "29317",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29317"
|
||||
"name": "USN-583-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-583-1"
|
||||
},
|
||||
{
|
||||
"name" : "30437",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30437"
|
||||
"name": "SUSE-SA:2008:014",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "20080528 rPSA-2008-0105-1 evolution",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/492684/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10701",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10701"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2008-8/advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2008-8/advisory/"
|
||||
},
|
||||
{
|
||||
"name": "30491",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30491"
|
||||
},
|
||||
{
|
||||
"name": "29210",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29210"
|
||||
},
|
||||
{
|
||||
"name": "30437",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30437"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-2290",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00190.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0768",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0768/references"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200803-12",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200803-12.xml"
|
||||
},
|
||||
{
|
||||
"name": "29317",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29317"
|
||||
},
|
||||
{
|
||||
"name": "29264",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29264"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2008:063",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:063"
|
||||
},
|
||||
{
|
||||
"name": "29244",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29244"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0177",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0177.html"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.rpath.com/browse/RPL-2310",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-2310"
|
||||
},
|
||||
{
|
||||
"name": "evolution-emfmultipart-format-string(41011)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41011"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-2292",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00195.html"
|
||||
},
|
||||
{
|
||||
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0105",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0105"
|
||||
},
|
||||
{
|
||||
"name": "28102",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28102"
|
||||
},
|
||||
{
|
||||
"name": "1019540",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1019540"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "28782",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28782"
|
||||
},
|
||||
{
|
||||
"name": "http://deluge-torrent.org/Changelog.php",
|
||||
"refsource": "CONFIRM",
|
||||
@ -63,59 +68,54 @@
|
||||
"url": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?r1=956&r2=1968&pathrev=1968"
|
||||
},
|
||||
{
|
||||
"name" : "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?view=log&pathrev=1968#rev1968",
|
||||
"name": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/trunk/include/libtorrent/bencode.hpp?view=log&pathrev=1968",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?view=log&pathrev=1968#rev1968"
|
||||
"url": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/trunk/include/libtorrent/bencode.hpp?view=log&pathrev=1968"
|
||||
},
|
||||
{
|
||||
"name": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_13/include/libtorrent/bencode.hpp?view=log&pathrev=1968",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_13/include/libtorrent/bencode.hpp?view=log&pathrev=1968"
|
||||
},
|
||||
{
|
||||
"name" : "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/trunk/include/libtorrent/bencode.hpp?view=log&pathrev=1968",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/trunk/include/libtorrent/bencode.hpp?view=log&pathrev=1968"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-1198",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "27597",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27597"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0384",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0384"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0383",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0383"
|
||||
},
|
||||
{
|
||||
"name" : "28699",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28699"
|
||||
},
|
||||
{
|
||||
"name": "28781",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28781"
|
||||
},
|
||||
{
|
||||
"name" : "28782",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28782"
|
||||
},
|
||||
{
|
||||
"name": "28700",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28700"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0384",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0384"
|
||||
},
|
||||
{
|
||||
"name": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?view=log&pathrev=1968#rev1968",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?view=log&pathrev=1968#rev1968"
|
||||
},
|
||||
{
|
||||
"name": "28699",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28699"
|
||||
},
|
||||
{
|
||||
"name": "27597",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27597"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0383",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0383"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080218 Crafty Syntax Xss Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/488286/100/0/threaded"
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=580994",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=580994"
|
||||
},
|
||||
{
|
||||
"name": "20080302 Re: Crafty Syntax Xss Vulnerability",
|
||||
@ -63,29 +63,29 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/489016/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=580994",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=580994"
|
||||
"name": "3688",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3688"
|
||||
},
|
||||
{
|
||||
"name" : "27859",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27859"
|
||||
"name": "20080218 Crafty Syntax Xss Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/488286/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "29201",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29201"
|
||||
},
|
||||
{
|
||||
"name" : "3688",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3688"
|
||||
},
|
||||
{
|
||||
"name": "cslh-lostsheep-xss(40636)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40636"
|
||||
},
|
||||
{
|
||||
"name": "27859",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27859"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2008-1232",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,149 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080801 [CVE-2008-1232] Apache Tomcat XSS vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/495021/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20090616 CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/504351/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20090806 CA20090806-02: Security Notice for Unicenter Asset Portfolio Management, Unicenter Desktop and Server Management, Unicenter Patch Management",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/505556/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://tomcat.apache.org/security-4.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tomcat.apache.org/security-4.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://tomcat.apache.org/security-5.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tomcat.apache.org/security-5.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://tomcat.apache.org/security-6.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tomcat.apache.org/security-6.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3216",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3216"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2009-0002.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2009-0002.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2008-10-09",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-8113",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-8130",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-7977",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02401",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=123376588623823&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT090005",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=123376588623823&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBST02955",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2008:188",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0648",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0648.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0862",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0864",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0864.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2008:018",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2009:004",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "30496",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30496"
|
||||
},
|
||||
{
|
||||
"name" : "31681",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31681"
|
||||
"name": "1020622",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020622"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:5985",
|
||||
@ -203,124 +63,14 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5985"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11181",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11181"
|
||||
"name": "http://tomcat.apache.org/security-4.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tomcat.apache.org/security-4.html"
|
||||
},
|
||||
{
|
||||
"name" : "33999",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33999"
|
||||
},
|
||||
{
|
||||
"name" : "34013",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/34013"
|
||||
},
|
||||
{
|
||||
"name" : "35474",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/35474"
|
||||
},
|
||||
{
|
||||
"name" : "36108",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/36108"
|
||||
},
|
||||
{
|
||||
"name" : "37460",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/37460"
|
||||
},
|
||||
{
|
||||
"name" : "57126",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/57126"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2305",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2305"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2823",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2823"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2780",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2780"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-0320",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/0320"
|
||||
},
|
||||
{
|
||||
"name" : "1020622",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1020622"
|
||||
},
|
||||
{
|
||||
"name" : "31379",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31379"
|
||||
},
|
||||
{
|
||||
"name" : "31381",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31381"
|
||||
},
|
||||
{
|
||||
"name" : "31639",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31639"
|
||||
},
|
||||
{
|
||||
"name" : "31891",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31891"
|
||||
},
|
||||
{
|
||||
"name" : "31865",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31865"
|
||||
},
|
||||
{
|
||||
"name" : "32222",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32222"
|
||||
},
|
||||
{
|
||||
"name" : "31982",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31982"
|
||||
},
|
||||
{
|
||||
"name" : "33797",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33797"
|
||||
},
|
||||
{
|
||||
"name" : "32120",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32120"
|
||||
},
|
||||
{
|
||||
"name" : "32266",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32266"
|
||||
},
|
||||
{
|
||||
"name" : "4098",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4098"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-0503",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/0503"
|
||||
"name": "RHSA-2008:0862",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1609",
|
||||
@ -332,15 +82,265 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/2194"
|
||||
},
|
||||
{
|
||||
"name": "34013",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34013"
|
||||
},
|
||||
{
|
||||
"name": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2823",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2823"
|
||||
},
|
||||
{
|
||||
"name": "37460",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37460"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0002.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0002.html"
|
||||
},
|
||||
{
|
||||
"name": "31982",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31982"
|
||||
},
|
||||
{
|
||||
"name": "31681",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31681"
|
||||
},
|
||||
{
|
||||
"name": "32120",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32120"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11181",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11181"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
|
||||
},
|
||||
{
|
||||
"name": "33999",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33999"
|
||||
},
|
||||
{
|
||||
"name": "30496",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30496"
|
||||
},
|
||||
{
|
||||
"name": "31865",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31865"
|
||||
},
|
||||
{
|
||||
"name": "4098",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4098"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-8130",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095"
|
||||
},
|
||||
{
|
||||
"name": "31639",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31639"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2008:018",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "36108",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36108"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2008:188",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
|
||||
},
|
||||
{
|
||||
"name": "31379",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31379"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-0320",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0320"
|
||||
},
|
||||
{
|
||||
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0864",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0864.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2009:004",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "http://tomcat.apache.org/security-6.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tomcat.apache.org/security-6.html"
|
||||
},
|
||||
{
|
||||
"name": "57126",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/57126"
|
||||
},
|
||||
{
|
||||
"name": "32222",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32222"
|
||||
},
|
||||
{
|
||||
"name": "31891",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31891"
|
||||
},
|
||||
{
|
||||
"name": "33797",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33797"
|
||||
},
|
||||
{
|
||||
"name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500"
|
||||
},
|
||||
{
|
||||
"name": "20090806 CA20090806-02: Security Notice for Unicenter Asset Portfolio Management, Unicenter Desktop and Server Management, Unicenter Patch Management",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/505556/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-7977",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2305",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2305"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-8113",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html"
|
||||
},
|
||||
{
|
||||
"name": "20090616 CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/504351/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://tomcat.apache.org/security-5.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tomcat.apache.org/security-5.html"
|
||||
},
|
||||
{
|
||||
"name": "35474",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35474"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2780",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2780"
|
||||
},
|
||||
{
|
||||
"name": "31381",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31381"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02401",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=123376588623823&w=2"
|
||||
},
|
||||
{
|
||||
"name": "HPSBST02955",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2008-10-09",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3216",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3216"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-0503",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0503"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-3316",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3316"
|
||||
},
|
||||
{
|
||||
"name": "SSRT090005",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=123376588623823&w=2"
|
||||
},
|
||||
{
|
||||
"name": "tomcat-httpservletresponse-xss(44155)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44155"
|
||||
},
|
||||
{
|
||||
"name": "20080801 [CVE-2008-1232] Apache Tomcat XSS vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/495021/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "32266",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32266"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0648",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0648.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,19 +58,14 @@
|
||||
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4153"
|
||||
},
|
||||
{
|
||||
"name" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154"
|
||||
"name": "28467",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28467"
|
||||
},
|
||||
{
|
||||
"name" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155"
|
||||
},
|
||||
{
|
||||
"name" : "IZ11820",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=isg1IZ11820"
|
||||
"name": "1019606",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1019606"
|
||||
},
|
||||
{
|
||||
"name": "IZ12794",
|
||||
@ -82,15 +77,25 @@
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ16992"
|
||||
},
|
||||
{
|
||||
"name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155"
|
||||
},
|
||||
{
|
||||
"name": "IZ17111",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ17111"
|
||||
},
|
||||
{
|
||||
"name" : "28467",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28467"
|
||||
"name": "IZ11820",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ11820"
|
||||
},
|
||||
{
|
||||
"name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:4595",
|
||||
@ -101,11 +106,6 @@
|
||||
"name": "ADV-2008-0865",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0865"
|
||||
},
|
||||
{
|
||||
"name" : "1019606",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1019606"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,30 +57,30 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5338"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1207033569.ff.php",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1207033569.ff.php"
|
||||
},
|
||||
{
|
||||
"name": "28546",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28546"
|
||||
},
|
||||
{
|
||||
"name": "chilkathttp-activex-file-overwrite(45988)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45988"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-1050",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1050/references"
|
||||
},
|
||||
{
|
||||
"name": "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1207033569.ff.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1207033569.ff.php"
|
||||
},
|
||||
{
|
||||
"name": "29581",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29581"
|
||||
},
|
||||
{
|
||||
"name" : "chilkathttp-activex-file-overwrite(45988)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45988"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5433"
|
||||
},
|
||||
{
|
||||
"name" : "28751",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28751"
|
||||
},
|
||||
{
|
||||
"name": "29812",
|
||||
"refsource": "SECUNIA",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "ccmail-admin-security-bypass(41797)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41797"
|
||||
},
|
||||
{
|
||||
"name": "28751",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28751"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6178",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6178"
|
||||
},
|
||||
{
|
||||
"name": "4108",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4108"
|
||||
},
|
||||
{
|
||||
"name": "6178",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6178"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,6 +62,11 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30580"
|
||||
},
|
||||
{
|
||||
"name": "freehostingmanager-cookie-security-bypass(44260)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44260"
|
||||
},
|
||||
{
|
||||
"name": "31383",
|
||||
"refsource": "SECUNIA",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "4118",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4118"
|
||||
},
|
||||
{
|
||||
"name" : "freehostingmanager-cookie-security-bypass(44260)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44260"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://high-norm.rash.jp/script_soundmaster2nd.html."
|
||||
},
|
||||
{
|
||||
"name" : "JVN#55010230",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/en/jp/JVN55010230/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "31076",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31076"
|
||||
},
|
||||
{
|
||||
"name": "soundmaster2nd-unspecified-xss(44977)",
|
||||
"refsource": "XF",
|
||||
@ -76,6 +66,16 @@
|
||||
"name": "http://high-norm.rash.jp/script_soundmaster2nd.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://high-norm.rash.jp/script_soundmaster2nd.html"
|
||||
},
|
||||
{
|
||||
"name": "JVN#55010230",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN55010230/index.html"
|
||||
},
|
||||
{
|
||||
"name": "31076",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31076"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6458",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6458"
|
||||
"name": "1020897",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020897"
|
||||
},
|
||||
{
|
||||
"name": "http://shinnok.evonet.ro/vulns_html/pftp.html",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/31173"
|
||||
},
|
||||
{
|
||||
"name" : "1020897",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1020897"
|
||||
"name": "personalftp-retr-dos(45129)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45129"
|
||||
},
|
||||
{
|
||||
"name": "31852",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://secunia.com/advisories/31852"
|
||||
},
|
||||
{
|
||||
"name" : "personalftp-retr-dos(45129)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45129"
|
||||
"name": "6458",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6458"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6537",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6537"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS"
|
||||
},
|
||||
{
|
||||
"name" : "31332",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31332"
|
||||
},
|
||||
{
|
||||
"name": "31951",
|
||||
"refsource": "SECUNIA",
|
||||
@ -76,6 +61,21 @@
|
||||
"name": "chilkatxml-chilkatutil-file-overwrite(45333)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45333"
|
||||
},
|
||||
{
|
||||
"name": "6537",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6537"
|
||||
},
|
||||
{
|
||||
"name": "31332",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31332"
|
||||
},
|
||||
{
|
||||
"name": "http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20081019 CVE id request: vlc",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/10/19/2"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20081022 Re: CVE id request: vlc",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/10/22/6"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14630",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14630"
|
||||
},
|
||||
{
|
||||
"name": "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=d859e6b9537af2d7326276f70de25a840f554dc3",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=d859e6b9537af2d7326276f70de25a840f554dc3"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20081019 CVE id request: vlc",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/10/19/2"
|
||||
},
|
||||
{
|
||||
"name": "31867",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31867"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:14630",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14630"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2013/Mar/87"
|
||||
},
|
||||
{
|
||||
"name": "58335",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/58335"
|
||||
},
|
||||
{
|
||||
"name": "[oss-secuirty] 20130325 Re: CVE request: ibutils improper use of files in /tmp",
|
||||
"refsource": "MLIST",
|
||||
@ -68,19 +73,9 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/26/4"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-secuirty] 20130326 Re: CVE request: ibutils improper use of files in /tmp",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/03/26/11"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20130319 Fwd: CVE requests",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/03/19/8"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=927430",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=927430"
|
||||
"name": "RHSA-2013:1661",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1661.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
|
||||
@ -88,14 +83,19 @@
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1661",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1661.html"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=927430",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=927430"
|
||||
},
|
||||
{
|
||||
"name" : "58335",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/58335"
|
||||
"name": "[oss-security] 20130319 Fwd: CVE requests",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/19/8"
|
||||
},
|
||||
{
|
||||
"name": "[oss-secuirty] 20130326 Re: CVE request: ibutils improper use of files in /tmp",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/26/11"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-2815",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-2973",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-3203",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-069"
|
||||
},
|
||||
{
|
||||
"name" : "TA13-253A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-253A"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:18916",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18916"
|
||||
},
|
||||
{
|
||||
"name": "TA13-253A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-3401",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10594",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10594"
|
||||
},
|
||||
{
|
||||
"name": "62962",
|
||||
"refsource": "BID",
|
||||
@ -72,15 +67,20 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029175"
|
||||
},
|
||||
{
|
||||
"name" : "55109",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/55109"
|
||||
},
|
||||
{
|
||||
"name": "juniper-junos-cve20136013-bo(87847)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87847"
|
||||
},
|
||||
{
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10594",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10594"
|
||||
},
|
||||
{
|
||||
"name": "55109",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/55109"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6149",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-6399",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "RHSA-2014:0743",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0743.html"
|
||||
},
|
||||
{
|
||||
"name": "[Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1"
|
||||
"name": "RHSA-2014:0744",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0744.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2014-6288",
|
||||
@ -68,14 +73,9 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0743",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0743.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0744",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0744.html"
|
||||
"name": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6762",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6764",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20140410 CVE-2013-7353 CVE-2013-7354 libpng integer overflows",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2014/q2/83"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/p/libpng/bugs/199/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "67344",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/67344"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140410 CVE-2013-7353 CVE-2013-7354 libpng integer overflows",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q2/83"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
"name": "1038941",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038941"
|
||||
},
|
||||
{
|
||||
"name": "99781",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/99781"
|
||||
},
|
||||
{
|
||||
"name" : "1038941",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038941"
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,21 +61,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20180629 [SECURITY] [DLA 1407-1] mariadb-10.0 security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://security.netapp.com/advisory/ntap-20171019-0002/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4002",
|
||||
"refsource": "DEBIAN",
|
||||
@ -86,31 +71,16 @@
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4341"
|
||||
},
|
||||
{
|
||||
"name": "https://security.netapp.com/advisory/ntap-20171019-0002/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20171019-0002/"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:3265",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:3442",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:0279",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:0279"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:0574",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:0574"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:2439",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2439"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:2729",
|
||||
"refsource": "REDHAT",
|
||||
@ -121,10 +91,40 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101390"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1407-1] mariadb-10.0 security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:0574",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:0574"
|
||||
},
|
||||
{
|
||||
"name": "1039597",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039597"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:0279",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:0279"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:2439",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2439"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:3442",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-17273",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "DSA-4104",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4104"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180202 [SECURITY] [DLA 1268-1] p7zip security update",
|
||||
"refsource": "MLIST",
|
||||
@ -62,20 +67,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/"
|
||||
},
|
||||
{
|
||||
"name" : "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4104",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4104"
|
||||
},
|
||||
{
|
||||
"name": "1040831",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040831"
|
||||
},
|
||||
{
|
||||
"name": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html"
|
||||
},
|
||||
{
|
||||
"name": "http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/"
|
||||
},
|
||||
{
|
||||
"name": "96865",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96865"
|
||||
},
|
||||
{
|
||||
"name": "https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -60,25 +60,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.tenable.com/security/research/tra-2018-20",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.tenable.com/security/research/tra-2018-20"
|
||||
},
|
||||
{
|
||||
"name": "20180828 Cisco Data Center Network Manager Path Traversal Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180828-dcnm-traversal"
|
||||
},
|
||||
{
|
||||
"name" : "105159",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/105159"
|
||||
},
|
||||
{
|
||||
"name": "1041585",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041585"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/research/tra-2018-20",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.tenable.com/security/research/tra-2018-20"
|
||||
},
|
||||
{
|
||||
"name": "105159",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105159"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@qnapsecurity.com.tw",
|
||||
"ASSIGNER": "security@qnap.com",
|
||||
"DATE_PUBLIC": "2018-04-27T00:00:00",
|
||||
"ID": "CVE-2018-0711",
|
||||
"STATE": "PUBLIC"
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-02-26",
|
||||
"ID": "CVE-2018-1000114",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins Promoted Builds Plugin",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.31.1 and older"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins project"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-285"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-12-19T20:52:45.253944",
|
||||
"DATE_REQUESTED": "2018-12-06T06:56:23",
|
||||
"ID": "CVE-2018-1000870",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "PHPipam",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.3.2 and earlier"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "PHPipam"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-79"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2018/Dec/20"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2018/Dec/20"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/sass/libsass/issues/2657",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/sass/libsass/issues/2657"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/sass/libsass/pull/2767",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/sass/libsass/pull/2767"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/sass/libsass/issues/2657",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/sass/libsass/issues/2657"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "Secure@Microsoft.com",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2018-1008",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -190,16 +190,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1008",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1008"
|
||||
},
|
||||
{
|
||||
"name": "103658",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103658"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1008",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1008"
|
||||
},
|
||||
{
|
||||
"name": "1040673",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "Secure@Microsoft.com",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2018-1026",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -70,16 +70,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1026",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1026"
|
||||
},
|
||||
{
|
||||
"name": "103613",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103613"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1026",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1026"
|
||||
},
|
||||
{
|
||||
"name": "1040654",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -74,9 +74,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10734059",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10734059"
|
||||
"name": "1042176",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1042176"
|
||||
},
|
||||
{
|
||||
"name": "105883",
|
||||
@ -84,9 +84,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/105883"
|
||||
},
|
||||
{
|
||||
"name" : "1042176",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1042176"
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=ibm10734059",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10734059"
|
||||
},
|
||||
{
|
||||
"name": "ibm-db2-cve20181857-info-disc(151155)",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT208848",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT208848"
|
||||
},
|
||||
{
|
||||
"name": "1041031",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041031"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208848",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT208848"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user