mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5fcd708cc7
commit
6b20b6ddca
@ -57,6 +57,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://digitalparadox.org/advisories/sqc.txt"
|
"url": "http://digitalparadox.org/advisories/sqc.txt"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "squirrelcart-index-sql-injection(19904)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19904"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "12944",
|
"name": "12944",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,11 +71,6 @@
|
|||||||
"name": "14770",
|
"name": "14770",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/14770"
|
"url": "http://secunia.com/advisories/14770"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "squirrelcart-index-sql-injection(19904)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19904"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,40 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://digitalparadox.org/advisories/prodcart.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://digitalparadox.org/advisories/prodcart.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "12990",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/12990"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "14833",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/14833"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "15264",
|
"name": "15264",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/15264"
|
"url": "http://www.osvdb.org/15264"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "15266",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/15266"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "15267",
|
"name": "15267",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/15267"
|
"url": "http://www.osvdb.org/15267"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "14833",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/14833"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "12990",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/12990"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "15268",
|
"name": "15268",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/15268"
|
"url": "http://www.osvdb.org/15268"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://digitalparadox.org/advisories/prodcart.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://digitalparadox.org/advisories/prodcart.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "15266",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/15266"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "13597",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/13597"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "15268",
|
"name": "15268",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/15268"
|
"url": "http://secunia.com/advisories/15268"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "13597",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/13597"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,49 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060210 Secunia Research: Lotus Notes UUE File Handling Buffer Overflow",
|
"name": "lotus-kvarcve-filename-bo(24635)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/424689/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24635"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060210 Secunia Research: Lotus Notes ZIP File Handling Buffer Overflow",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/424626/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060210 Secunia Research: Lotus Notes HTML Speed Reader Link BufferOverflows",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/424692/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060210 Secunia Research: Lotus Notes TAR Reader File Extraction BufferOverflow",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/424666/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://secunia.com/secunia_research/2005-66/advisory/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://secunia.com/secunia_research/2005-66/advisory/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://secunia.com/secunia_research/2005-32/advisory/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://secunia.com/secunia_research/2005-32/advisory/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://secunia.com/secunia_research/2005-34/advisory/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://secunia.com/secunia_research/2005-34/advisory/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://secunia.com/secunia_research/2005-36/advisory/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://secunia.com/secunia_research/2005-36/advisory/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://secunia.com/secunia_research/2005-37/advisory/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://secunia.com/secunia_research/2005-37/advisory/"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918",
|
"name": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918",
|
||||||
@ -103,14 +63,19 @@
|
|||||||
"url": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918"
|
"url": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#884076",
|
"name": "http://secunia.com/secunia_research/2005-34/advisory/",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/884076"
|
"url": "http://secunia.com/secunia_research/2005-34/advisory/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "16576",
|
"name": "23067",
|
||||||
"refsource" : "BID",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.securityfocus.com/bid/16576"
|
"url": "http://www.osvdb.org/23067"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "lotus-uudrdr-uue-bo(24636)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24636"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-0500",
|
"name": "ADV-2006-0500",
|
||||||
@ -122,65 +87,100 @@
|
|||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/0501"
|
"url": "http://www.vupen.com/english/advisories/2006/0501"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20060210 Secunia Research: Lotus Notes ZIP File Handling Buffer Overflow",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/424626/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "23064",
|
"name": "23064",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/23064"
|
"url": "http://www.osvdb.org/23064"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "23065",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/23065"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "23066",
|
"name": "23066",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/23066"
|
"url": "http://www.osvdb.org/23066"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "23067",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/23067"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "23068",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/23068"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1015657",
|
"name": "1015657",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1015657"
|
"url": "http://securitytracker.com/id?1015657"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://secunia.com/secunia_research/2005-36/advisory/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://secunia.com/secunia_research/2005-36/advisory/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23065",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/23065"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "16576",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/16576"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060210 Secunia Research: Lotus Notes UUE File Handling Buffer Overflow",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/424689/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "16100",
|
"name": "16100",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/16100"
|
"url": "http://secunia.com/advisories/16100"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "16280",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/16280"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "lotus-htmsr-link-bo(24639)",
|
"name": "lotus-htmsr-link-bo(24639)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24639"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24639"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "lotus-kvarcve-filename-bo(24635)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24635"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "lotus-tarrdr-filename-bo(24638)",
|
"name": "lotus-tarrdr-filename-bo(24638)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24638"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24638"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "lotus-uudrdr-uue-bo(24636)",
|
"name": "http://secunia.com/secunia_research/2005-32/advisory/",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24636"
|
"url": "http://secunia.com/secunia_research/2005-32/advisory/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#884076",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/884076"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://secunia.com/secunia_research/2005-66/advisory/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://secunia.com/secunia_research/2005-66/advisory/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060210 Secunia Research: Lotus Notes HTML Speed Reader Link BufferOverflows",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/424692/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "16280",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/16280"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23068",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/23068"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060210 Secunia Research: Lotus Notes TAR Reader File Extraction BufferOverflow",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/424666/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://secunia.com/secunia_research/2005-37/advisory/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://secunia.com/secunia_research/2005-37/advisory/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "safari-data-uri-dos(22331)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22331"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20050917 Possible memory corruption problems in Apple Safari",
|
"name": "20050917 Possible memory corruption problems in Apple Safari",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=112715234411672&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=112715234411672&w=2"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "16875",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/16875/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "14868",
|
"name": "14868",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,16 +76,6 @@
|
|||||||
"name": "19569",
|
"name": "19569",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/19569"
|
"url": "http://www.osvdb.org/19569"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "16875",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/16875/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "safari-data-uri-dos(22331)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22331"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,55 +52,55 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "phpbb-multiple-variables-bypass-security(22914)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22914"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20051031 Advisory 17/2005: phpBB Multiple Vulnerabilities",
|
"name": "20051031 Advisory 17/2005: phpBB Multiple Vulnerabilities",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=113081113317600&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=113081113317600&w=2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.hardened-php.net/advisory_172005.75.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.hardened-php.net/advisory_172005.75.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-925",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2005/dsa-925"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "15243",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/15243"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20386",
|
"name": "20386",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/20386"
|
"url": "http://www.osvdb.org/20386"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1015121",
|
"name": "DSA-925",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://securitytracker.com/id?1015121"
|
"url": "http://www.debian.org/security/2005/dsa-925"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "17366",
|
"name": "17366",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/17366"
|
"url": "http://secunia.com/advisories/17366"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "18098",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/18098"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "130",
|
"name": "130",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/130"
|
"url": "http://securityreason.com/securityalert/130"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "phpbb-multiple-variables-bypass-security(22914)",
|
"name": "18098",
|
||||||
"refsource" : "XF",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22914"
|
"url": "http://secunia.com/advisories/18098"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.hardened-php.net/advisory_172005.75.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.hardened-php.net/advisory_172005.75.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1015121",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1015121"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "15243",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/15243"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20051115 Authentication vulnerability in Belkin wireless devices",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=113209977115233&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20051115 Authentication vulnerability in Belkin wireless devices",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0489.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "15444",
|
"name": "15444",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/15444/"
|
"url": "http://www.securityfocus.com/bid/15444/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2005-2453",
|
"name": "20051115 Authentication vulnerability in Belkin wireless devices",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "FULLDISC",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2005/2453"
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0489.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20877",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/20877"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "17601",
|
"name": "17601",
|
||||||
@ -91,6 +76,21 @@
|
|||||||
"name": "belkin-wireless-auth-bypass(23059)",
|
"name": "belkin-wireless-auth-bypass(23059)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23059"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23059"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2005-2453",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2005/2453"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20877",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/20877"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20051115 Authentication vulnerability in Belkin wireless devices",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=113209977115233&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,20 +53,15 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20051201 [DRUPAL-SA-2005-009] Drupal 4.6.4 / 4.5.6 fixes minor access control issue",
|
"name": "ADV-2005-2684",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/418336/100/0/threaded"
|
"url": "http://www.vupen.com/english/advisories/2005/2684"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://drupal.org/files/sa-2005-009/4.6.3.patch",
|
"name": "http://drupal.org/files/sa-2005-009/4.6.3.patch",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://drupal.org/files/sa-2005-009/4.6.3.patch"
|
"url": "http://drupal.org/files/sa-2005-009/4.6.3.patch"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://drupal.org/files/sa-2005-009/advisory.txt",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://drupal.org/files/sa-2005-009/advisory.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-958",
|
"name": "DSA-958",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
@ -78,19 +73,24 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/15674"
|
"url": "http://www.securityfocus.com/bid/15674"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2005-2684",
|
"name": "18630",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2005/2684"
|
"url": "http://secunia.com/advisories/18630"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20051201 [DRUPAL-SA-2005-009] Drupal 4.6.4 / 4.5.6 fixes minor access control issue",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/418336/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://drupal.org/files/sa-2005-009/advisory.txt",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://drupal.org/files/sa-2005-009/advisory.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "17824",
|
"name": "17824",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/17824"
|
"url": "http://secunia.com/advisories/17824"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18630",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/18630"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,6 +57,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://pridels0.blogspot.com/2005/12/widget-property-vuln.html"
|
"url": "http://pridels0.blogspot.com/2005/12/widget-property-vuln.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "21426",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/21426"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "15701",
|
"name": "15701",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -67,11 +72,6 @@
|
|||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2005/2741"
|
"url": "http://www.vupen.com/english/advisories/2005/2741"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "21426",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/21426"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "17829",
|
"name": "17829",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://pridels0.blogspot.com/2005/12/contens-searchcfm-multiple-input.html",
|
"name": "21825",
|
||||||
"refsource" : "MISC",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://pridels0.blogspot.com/2005/12/contens-searchcfm-multiple-input.html"
|
"url": "http://www.osvdb.org/21825"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2005-2981",
|
"name": "ADV-2005-2981",
|
||||||
@ -63,19 +63,19 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2005/2981"
|
"url": "http://www.vupen.com/english/advisories/2005/2981"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "21825",
|
"name": "contens-search-path-disclosure(23824)",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "XF",
|
||||||
"url" : "http://www.osvdb.org/21825"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23824"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://pridels0.blogspot.com/2005/12/contens-searchcfm-multiple-input.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://pridels0.blogspot.com/2005/12/contens-searchcfm-multiple-input.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "18143",
|
"name": "18143",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/18143"
|
"url": "http://secunia.com/advisories/18143"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "contens-search-path-disclosure(23824)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23824"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "15326",
|
"name": "15326",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/15326"
|
"url": "http://www.securityfocus.com/bid/15326"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "17425",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/17425"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "17433",
|
"name": "17433",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/17433"
|
"url": "http://secunia.com/advisories/17433"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "17425",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/17425"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20090130 PR08-22: Persistent XSS on Novell GroupWise WebAccess",
|
"name": "33744",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/500572/100/0/threaded"
|
"url": "http://secunia.com/advisories/33744"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33541",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/33541"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-23",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-23"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33537",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/33537"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002320",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002320"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20090130 PR08-23: XSS on Novell GroupWise WebAccess",
|
"name": "20090130 PR08-23: XSS on Novell GroupWise WebAccess",
|
||||||
@ -67,35 +87,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-22"
|
"url": "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-22"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-23",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-23"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002320",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002320"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002321",
|
"name": "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002321",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002321"
|
"url": "http://www.novell.com/support/search.do?usemicrosite=true&searchString=7002321"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "33537",
|
"name": "20090130 PR08-22: Persistent XSS on Novell GroupWise WebAccess",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/33537"
|
"url": "http://www.securityfocus.com/archive/1/500572/100/0/threaded"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33541",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/33541"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33744",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/33744"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,16 +57,16 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/500492/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/500492/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "7902",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/7902"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.coresecurity.com/content/amaya-buffer-overflows",
|
"name": "http://www.coresecurity.com/content/amaya-buffer-overflows",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.coresecurity.com/content/amaya-buffer-overflows"
|
"url": "http://www.coresecurity.com/content/amaya-buffer-overflows"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "7902",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/7902"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "amaya-html-tags-bo(48325)",
|
"name": "amaya-html-tags-bo(48325)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -57,25 +57,25 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/7881"
|
"url": "https://www.exploit-db.com/exploits/7881"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "33455",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/33455"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2009-0249",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/0249"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "33646",
|
"name": "33646",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/33646"
|
"url": "http://secunia.com/advisories/33646"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "33455",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/33455"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "flashmagazine-index-sql-injection(48226)",
|
"name": "flashmagazine-index-sql-injection(48226)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48226"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48226"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2009-0249",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2009/0249"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2009-0690",
|
"ID": "CVE-2009-0690",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,26 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.foxitsoftware.com/pdf/reader/security.htm#0602",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.foxitsoftware.com/pdf/reader/security.htm#0602"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#251793",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/251793"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "35442",
|
"name": "35442",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/35442"
|
"url": "http://www.securityfocus.com/bid/35442"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.foxitsoftware.com/pdf/reader/security.htm#0602",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.foxitsoftware.com/pdf/reader/security.htm#0602"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1022425",
|
"name": "1022425",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1022425"
|
"url": "http://securitytracker.com/id?1022425"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#251793",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/251793"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "35512",
|
"name": "35512",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
|
@ -53,14 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20090312 [Suspected Spam][PT-2009-11] SlySoft Multiple Products ElbyCDIO.sys Denial of Service",
|
"name": "34288",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/501713/100/0/threaded"
|
"url": "http://secunia.com/advisories/34288"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://en.securitylab.ru/lab/PT-2009-11",
|
"name": "http://www.slysoft.com/download/changes_clonedvd.txt",
|
||||||
"refsource" : "MISC",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://en.securitylab.ru/lab/PT-2009-11"
|
"url": "http://www.slysoft.com/download/changes_clonedvd.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "slysoft-elbycdio-dos(49232)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49232"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34289",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/34289"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34269",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/34269"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34287",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/34287"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.slysoft.com/download/changes_anydvd.txt",
|
"name": "http://www.slysoft.com/download/changes_anydvd.txt",
|
||||||
@ -68,9 +88,9 @@
|
|||||||
"url": "http://www.slysoft.com/download/changes_anydvd.txt"
|
"url": "http://www.slysoft.com/download/changes_anydvd.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.slysoft.com/download/changes_clonedvd.txt",
|
"name": "http://en.securitylab.ru/lab/PT-2009-11",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.slysoft.com/download/changes_clonedvd.txt"
|
"url": "http://en.securitylab.ru/lab/PT-2009-11"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "34103",
|
"name": "34103",
|
||||||
@ -83,29 +103,9 @@
|
|||||||
"url": "http://osvdb.org/52679"
|
"url": "http://osvdb.org/52679"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "34269",
|
"name": "20090312 [Suspected Spam][PT-2009-11] SlySoft Multiple Products ElbyCDIO.sys Denial of Service",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://secunia.com/advisories/34269"
|
"url": "http://www.securityfocus.com/archive/1/501713/100/0/threaded"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34288",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/34288"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34289",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/34289"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34287",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/34287"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "slysoft-elbycdio-dos(49232)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49232"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20090817 CVE request: kernel: cfg80211: missing NULL pointer checks",
|
"name": "36278",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2009/08/17/1"
|
"url": "http://secunia.com/advisories/36278"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20090817 Re: CVE request: kernel: cfg80211: missing NULL pointer checks",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2009/08/17/2"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://jon.oberheide.org/files/cfg80211-remote-dos.c",
|
"name": "http://jon.oberheide.org/files/cfg80211-remote-dos.c",
|
||||||
@ -73,9 +68,14 @@
|
|||||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=cd3468bad96c00b5a512f551674f36776129520e"
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=cd3468bad96c00b5a512f551674f36776129520e"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5",
|
"name": "[oss-security] 20090817 Re: CVE request: kernel: cfg80211: missing NULL pointer checks",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5"
|
"url": "http://www.openwall.com/lists/oss-security/2009/08/17/2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20090817 CVE request: kernel: cfg80211: missing NULL pointer checks",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2009/08/17/1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "36052",
|
"name": "36052",
|
||||||
@ -83,9 +83,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/36052"
|
"url": "http://www.securityfocus.com/bid/36052"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "36278",
|
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/36278"
|
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20090818 Vtiger CRM 5.0.4 Multiple Vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=125060676515670&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "9450",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/9450"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.ush.it/2009/08/18/vtiger-crm-504-multiple-vulnerabilities/",
|
"name": "http://www.ush.it/2009/08/18/vtiger-crm-504-multiple-vulnerabilities/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -72,6 +62,16 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.ush.it/team/ush/hack-vtigercrm_504/vtigercrm_504.txt"
|
"url": "http://www.ush.it/team/ush/hack-vtigercrm_504/vtigercrm_504.txt"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "9450",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "http://www.exploit-db.com/exploits/9450"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20090818 Vtiger CRM 5.0.4 Multiple Vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=125060676515670&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "36062",
|
"name": "36062",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -52,21 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "9089",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/9089"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.org/0907-exploits/clearcontent-rfilfi.txt",
|
"name": "http://packetstormsecurity.org/0907-exploits/clearcontent-rfilfi.txt",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.org/0907-exploits/clearcontent-rfilfi.txt"
|
"url": "http://packetstormsecurity.org/0907-exploits/clearcontent-rfilfi.txt"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "55742",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/55742"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "35726",
|
"name": "35726",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -76,6 +66,16 @@
|
|||||||
"name": "clearcontent-image-file-include(51629)",
|
"name": "clearcontent-image-file-include(51629)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51629"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51629"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "9089",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "http://www.exploit-db.com/exploits/9089"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "55742",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/55742"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2009-3551",
|
"ID": "CVE-2009-3551",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-1.2.3.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-1.2.3.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2009-07.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2009-07.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "36846",
|
"name": "36846",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -73,9 +63,19 @@
|
|||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6049"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6049"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "37175",
|
"name": "ADV-2009-3061",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://secunia.com/advisories/37175"
|
"url": "http://www.vupen.com/english/advisories/2009/3061"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.2.3.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.wireshark.org/docs/relnotes/wireshark-1.2.3.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "wireshark-negprotresponse-dos(54018)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54018"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "37409",
|
"name": "37409",
|
||||||
@ -83,14 +83,14 @@
|
|||||||
"url": "http://secunia.com/advisories/37409"
|
"url": "http://secunia.com/advisories/37409"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2009-3061",
|
"name": "http://www.wireshark.org/security/wnpa-sec-2009-07.html",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/3061"
|
"url": "http://www.wireshark.org/security/wnpa-sec-2009-07.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "wireshark-negprotresponse-dos(54018)",
|
"name": "37175",
|
||||||
"refsource" : "XF",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54018"
|
"url": "http://secunia.com/advisories/37175"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "ADV-2009-3206",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2009/3206"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.citrix.com/article/CTX123248",
|
"name": "http://support.citrix.com/article/CTX123248",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -62,20 +67,15 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/37073"
|
"url": "http://www.securityfocus.com/bid/37073"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1023168",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1023168"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "37319",
|
"name": "37319",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/37319"
|
"url": "http://secunia.com/advisories/37319"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2009-3206",
|
"name": "1023168",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/3206"
|
"url": "http://www.securitytracker.com/id?1023168"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "citrix-ssl-spoofing(54213)",
|
"name": "citrix-ssl-spoofing(54213)",
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/",
|
"name": "typo3-nis-xss(54784)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54784"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-3550",
|
"name": "ADV-2009-3550",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2009/3550"
|
"url": "http://www.vupen.com/english/advisories/2009/3550"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "typo3-nis-xss(54784)",
|
"name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/",
|
||||||
"refsource" : "XF",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54784"
|
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "9397",
|
"name": "56870",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.exploit-db.com/exploits/9397"
|
"url": "http://osvdb.org/56870"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "35997",
|
"name": "35997",
|
||||||
@ -68,29 +68,29 @@
|
|||||||
"url": "http://osvdb.org/56869"
|
"url": "http://osvdb.org/56869"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "56870",
|
"name": "supportcenter-lang-file-include(52350)",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "XF",
|
||||||
"url" : "http://osvdb.org/56870"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52350"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "56871",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/56871"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "36208",
|
"name": "36208",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/36208"
|
"url": "http://secunia.com/advisories/36208"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "9397",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "http://www.exploit-db.com/exploits/9397"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "56871",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/56871"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "supportcenter-index-file-include(52352)",
|
"name": "supportcenter-index-file-include(52352)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52352"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52352"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "supportcenter-lang-file-include(52350)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/52350"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,54 +53,54 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17",
|
"name": "fisheye-crucible-xml-dos(75682)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "53595",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/53595"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "81993",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/81993"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "49146",
|
"name": "49146",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/49146"
|
"url": "http://secunia.com/advisories/49146"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "81993",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/81993"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "53595",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/53595"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "jira-xml-dos(75697)",
|
"name": "jira-xml-dos(75697)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "fisheye-crucible-xml-dos(75682)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2015-0168",
|
"ID": "CVE-2015-0168",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2015-0325",
|
"ID": "CVE-2015-0325",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,50 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://technet.microsoft.com/library/security/2755801",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://technet.microsoft.com/library/security/2755801"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201502-02",
|
"name": "GLSA-201502-02",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
|
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:0140",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0140.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:0236",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:0239",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:0237",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2015:0238",
|
"name": "openSUSE-SU-2015:0238",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "72514",
|
"name": "62895",
|
||||||
"refsource" : "BID",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/bid/72514"
|
"url": "http://secunia.com/advisories/62895"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "adobe-flash-cve20150325-dos(100711)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100711"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1031706",
|
"name": "1031706",
|
||||||
@ -108,14 +83,39 @@
|
|||||||
"url": "http://secunia.com/advisories/62886"
|
"url": "http://secunia.com/advisories/62886"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "62895",
|
"name": "https://technet.microsoft.com/library/security/2755801",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/62895"
|
"url": "https://technet.microsoft.com/library/security/2755801"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "adobe-flash-cve20150325-dos(100711)",
|
"name": "openSUSE-SU-2015:0237",
|
||||||
"refsource" : "XF",
|
"refsource": "SUSE",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/100711"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:0236",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "72514",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/72514"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:0140",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:0239",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2015-1196",
|
"ID": "CVE-2015-1196",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,41 +52,41 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20150118 Re: CVE request: directory traversal flaw in patch",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://seclists.org/oss-sec/2015/q1/173"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://git.savannah.gnu.org/cgit/patch.git/commit/?id=4e9269a5fc1fe80a1095a92593dd85db871e1fd3",
|
"name": "http://git.savannah.gnu.org/cgit/patch.git/commit/?id=4e9269a5fc1fe80a1095a92593dd85db871e1fd3",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://git.savannah.gnu.org/cgit/patch.git/commit/?id=4e9269a5fc1fe80a1095a92593dd85db871e1fd3"
|
"url": "http://git.savannah.gnu.org/cgit/patch.git/commit/?id=4e9269a5fc1fe80a1095a92593dd85db871e1fd3"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1182154",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1182154"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2015:0199",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1182154",
|
||||||
"refsource" : "SUSE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-02/msg00013.html"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182154"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "72074",
|
"name": "72074",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/72074"
|
"url": "http://www.securityfocus.com/bid/72074"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20150118 Re: CVE request: directory traversal flaw in patch",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://seclists.org/oss-sec/2015/q1/173"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:0199",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00013.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "gnupatch-unspecified-symlink(99967)",
|
"name": "gnupatch-unspecified-symlink(99967)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,11 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://codereview.chromium.org/636233008",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://codereview.chromium.org/636233008"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
|
"name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
|
"url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201502-13",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://code.google.com/p/chromium/issues/detail?id=416289",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=416289",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,16 +76,6 @@
|
|||||||
"name": "https://code.google.com/p/chromium/issues/detail?id=449894",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=449894",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://code.google.com/p/chromium/issues/detail?id=449894"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=449894"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://codereview.chromium.org/636233008",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://codereview.chromium.org/636233008"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201502-13",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-201502-13.xml"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2015-1781",
|
"ID": "CVE-2015-1781",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,75 +52,75 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[libc-alpha] 20150814 The GNU C Library version 2.22 is now available",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=18287",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=18287"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3480",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3480"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2016-0480defc94",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201602-02",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201602-02"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:0863",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://rhn.redhat.com/errata/RHSA-2015-0863.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2015:1424",
|
"name": "SUSE-SU-2015:1424",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[libc-alpha] 20150814 The GNU C Library version 2.22 is now available",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2016:0470",
|
"name": "SUSE-SU-2016:0470",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "USN-2985-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2985-1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-2985-2",
|
"name": "USN-2985-2",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2985-2"
|
"url": "http://www.ubuntu.com/usn/USN-2985-2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "74255",
|
"name": "GLSA-201602-02",
|
||||||
"refsource" : "BID",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://www.securityfocus.com/bid/74255"
|
"url": "https://security.gentoo.org/glsa/201602-02"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://sourceware.org/git/?p=glibc.git;a=commit;h=2959eda9272a03386"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2016-0480defc94",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:0863",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://rhn.redhat.com/errata/RHSA-2015-0863.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3480",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3480"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2985-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2985-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=18287",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18287"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1032178",
|
"name": "1032178",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1032178"
|
"url": "http://www.securitytracker.com/id/1032178"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "74255",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/74255"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/MISP/MISP/commit/812ac878c3645c02e2a599287117418424cbd4cf",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/MISP/MISP/commit/812ac878c3645c02e2a599287117418424cbd4cf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.circl.lu/advisory/CVE-2015-5720/",
|
"name": "https://www.circl.lu/advisory/CVE-2015-5720/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "92738",
|
"name": "92738",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/92738"
|
"url": "http://www.securityfocus.com/bid/92738"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/MISP/MISP/commit/812ac878c3645c02e2a599287117418424cbd4cf",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/MISP/MISP/commit/812ac878c3645c02e2a599287117418424cbd4cf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,119 +53,59 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=0a755b400876ab4d58151e98462d3fa8fe099f61",
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f11eeadd214e081a824f30aec5cb52d390ef576c",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=0a755b400876ab4d58151e98462d3fa8fe099f61"
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f11eeadd214e081a824f30aec5cb52d390ef576c"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=00022c12e0cad8b735f94d6ee3785a557b4a3df2",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=00022c12e0cad8b735f94d6ee3785a557b4a3df2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=3815e870ef906409af4a228f66d9400081227b75",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=3815e870ef906409af4a228f66d9400081227b75"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=667b3108d10e9580bf9f6d337c759dc88a1a0bdc",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=667b3108d10e9580bf9f6d337c759dc88a1a0bdc"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=731ebf70a25ab2cdc32d2626dcebe60fe3b09481",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=731ebf70a25ab2cdc32d2626dcebe60fe3b09481"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=85ea1c126b05f133206cd9c6d8d9fbf137d81d27",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=85ea1c126b05f133206cd9c6d8d9fbf137d81d27"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=8ee65e3c9addab1d3c15ba013401f5698fb73594",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=8ee65e3c9addab1d3c15ba013401f5698fb73594"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=9a8f1aeb8055de80137e769fae637cd480495509",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=9a8f1aeb8055de80137e769fae637cd480495509"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a009a84d04bfac2a5c01101f38a70d216960fac0",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a009a84d04bfac2a5c01101f38a70d216960fac0"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a4b4267f94802e0a4d93999649710bbf340796d5",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a4b4267f94802e0a4d93999649710bbf340796d5"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=be70d02f12cb9a71a9b07b601f0efafc99718ec9",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=be70d02f12cb9a71a9b07b601f0efafc99718ec9"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ebf1042efb9bd4517cd09a543bb4e3a164de8771",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ebf1042efb9bd4517cd09a543bb4e3a164de8771"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ec9896d0bc7521bbbe6dc28a198635dc281e7358",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ec9896d0bc7521bbbe6dc28a198635dc281e7358"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=f9f86fd07af5606d0cb74c3eca5b2cbfda509345",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=f9f86fd07af5606d0cb74c3eca5b2cbfda509345"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?h=wlan-cld2.driver.lnx.1.0.r21-rel&id=391d37818aaa8038a06662075dd8893501452931",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?h=wlan-cld2.driver.lnx.1.0.r21-rel&id=391d37818aaa8038a06662075dd8893501452931"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=106f5c62b01b5a212bb53d13e3a3e70db2baedee",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=106f5c62b01b5a212bb53d13e3a3e70db2baedee"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=174c053d1aa1bf5395647e3927d718255f3cbe75",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=174c053d1aa1bf5395647e3927d718255f3cbe75"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=17f6fbb4b52a6acdd831ebaffdac9bbc88d2f423",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=17f6fbb4b52a6acdd831ebaffdac9bbc88d2f423"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=191f02a7ec2a4cccaebbdac8d36897e1ae125244",
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=191f02a7ec2a4cccaebbdac8d36897e1ae125244",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=191f02a7ec2a4cccaebbdac8d36897e1ae125244"
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=191f02a7ec2a4cccaebbdac8d36897e1ae125244"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=85ea1c126b05f133206cd9c6d8d9fbf137d81d27",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=85ea1c126b05f133206cd9c6d8d9fbf137d81d27"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=106f5c62b01b5a212bb53d13e3a3e70db2baedee",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=106f5c62b01b5a212bb53d13e3a3e70db2baedee"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=ee9797fbefb45eee88c92420a24cda838cff6b45",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=ee9797fbefb45eee88c92420a24cda838cff6b45"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=0c5a2ba407f23efd89cac6dc45e2ab9bdba3ada1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=0c5a2ba407f23efd89cac6dc45e2ab9bdba3ada1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=174c053d1aa1bf5395647e3927d718255f3cbe75",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=174c053d1aa1bf5395647e3927d718255f3cbe75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=7af334bfc3375c9f85a330b84db17c0db1d6dade",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=7af334bfc3375c9f85a330b84db17c0db1d6dade"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=335ae3f8b353b6c7260eacb6aa706bb30f8a6bdc",
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=335ae3f8b353b6c7260eacb6aa706bb30f8a6bdc",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=335ae3f8b353b6c7260eacb6aa706bb30f8a6bdc"
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=335ae3f8b353b6c7260eacb6aa706bb30f8a6bdc"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=3ea5197d268c6f4ed08fb866b587349f7049c6d5",
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=be70d02f12cb9a71a9b07b601f0efafc99718ec9",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=3ea5197d268c6f4ed08fb866b587349f7049c6d5"
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=be70d02f12cb9a71a9b07b601f0efafc99718ec9"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4aa30844e28eb4b410f86d97e970a39fcdfd797d",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4aa30844e28eb4b410f86d97e970a39fcdfd797d"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4abed07fd2380b6073f5cc9f2a701773e914f86f",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4abed07fd2380b6073f5cc9f2a701773e914f86f"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=54e7d8fa44202a8528ef33d85381bca63d7749a5",
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=54e7d8fa44202a8528ef33d85381bca63d7749a5",
|
||||||
@ -177,125 +117,170 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=57a5e1f62cd3230fd046b199eee902507100e18c"
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=57a5e1f62cd3230fd046b199eee902507100e18c"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=8ee65e3c9addab1d3c15ba013401f5698fb73594",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=8ee65e3c9addab1d3c15ba013401f5698fb73594"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=00022c12e0cad8b735f94d6ee3785a557b4a3df2",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=00022c12e0cad8b735f94d6ee3785a557b4a3df2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=78a681f9d0d8e9843223dc42d02443e911b196a1",
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=78a681f9d0d8e9843223dc42d02443e911b196a1",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=78a681f9d0d8e9843223dc42d02443e911b196a1"
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=78a681f9d0d8e9843223dc42d02443e911b196a1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=846f561170f0f4f6345d6b0ce1c35bf7059126cb",
|
"name": "https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=0a755b400876ab4d58151e98462d3fa8fe099f61",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=846f561170f0f4f6345d6b0ce1c35bf7059126cb"
|
"url": "https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=0a755b400876ab4d58151e98462d3fa8fe099f61"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=8dc81c98ed72c99983660d5b94c2c8283bc1ff7f",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=8dc81c98ed72c99983660d5b94c2c8283bc1ff7f"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9048145ff167fb8f9f8d2a9845ee1d1b45c4884c",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9048145ff167fb8f9f8d2a9845ee1d1b45c4884c"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=99c0ddb04e8de0b8139778c7fb77b1957d113769",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=99c0ddb04e8de0b8139778c7fb77b1957d113769"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9e040e43da5fe987747e16b305d7adf66977420f",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9e040e43da5fe987747e16b305d7adf66977420f"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a978afb1838273e0d7a7ec86dd8bc9db85dff49d",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a978afb1838273e0d7a7ec86dd8bc9db85dff49d"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=b98f8aafb23cbc8e883870bcc9dac165b3d75ae6",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=b98f8aafb23cbc8e883870bcc9dac165b3d75ae6"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=d42e72aa69a02531396b5a37cadebf927a757aa6",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=d42e72aa69a02531396b5a37cadebf927a757aa6"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=eb72224cc57092448663fecc2c9bfa0f775eb770",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=eb72224cc57092448663fecc2c9bfa0f775eb770"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=fb2f07b3b0d637a403bb891c57e76b6345a92cf0",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=fb2f07b3b0d637a403bb891c57e76b6345a92cf0"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=002cb97a955832197f3ceebfa8b32bd12b946151",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=002cb97a955832197f3ceebfa8b32bd12b946151"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=0c5a2ba407f23efd89cac6dc45e2ab9bdba3ada1",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=0c5a2ba407f23efd89cac6dc45e2ab9bdba3ada1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=17275491f327909b32945ec1f465968021d22a7f",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=17275491f327909b32945ec1f465968021d22a7f"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=239aba9a1a4a474d86bde9cb67bfb1b2d6379a7c",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=239aba9a1a4a474d86bde9cb67bfb1b2d6379a7c"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=7af334bfc3375c9f85a330b84db17c0db1d6dade",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=7af334bfc3375c9f85a330b84db17c0db1d6dade"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=9ab5a5a0b63075cfd095ed6bcf506b4704c523e1",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=9ab5a5a0b63075cfd095ed6bcf506b4704c523e1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a544494791b6307a2fe52fa282768083deb8a317",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a544494791b6307a2fe52fa282768083deb8a317"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a6ace5b9ea34f22b136a35248087efc2ceb35fd4",
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a6ace5b9ea34f22b136a35248087efc2ceb35fd4",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a6ace5b9ea34f22b136a35248087efc2ceb35fd4"
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a6ace5b9ea34f22b136a35248087efc2ceb35fd4"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=17275491f327909b32945ec1f465968021d22a7f",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=17275491f327909b32945ec1f465968021d22a7f"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a009a84d04bfac2a5c01101f38a70d216960fac0",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a009a84d04bfac2a5c01101f38a70d216960fac0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4abed07fd2380b6073f5cc9f2a701773e914f86f",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4abed07fd2380b6073f5cc9f2a701773e914f86f"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a4b4267f94802e0a4d93999649710bbf340796d5",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=a4b4267f94802e0a4d93999649710bbf340796d5"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=c13bdf105aa20559d2d783508051ad2dd3cfa65b",
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=c13bdf105aa20559d2d783508051ad2dd3cfa65b",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=c13bdf105aa20559d2d783508051ad2dd3cfa65b"
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=c13bdf105aa20559d2d783508051ad2dd3cfa65b"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=99c0ddb04e8de0b8139778c7fb77b1957d113769",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=99c0ddb04e8de0b8139778c7fb77b1957d113769"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=3815e870ef906409af4a228f66d9400081227b75",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=3815e870ef906409af4a228f66d9400081227b75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a978afb1838273e0d7a7ec86dd8bc9db85dff49d",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=a978afb1838273e0d7a7ec86dd8bc9db85dff49d"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dd9ae2971b493909879cc2fd0fa97d12e1560762",
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dd9ae2971b493909879cc2fd0fa97d12e1560762",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dd9ae2971b493909879cc2fd0fa97d12e1560762"
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dd9ae2971b493909879cc2fd0fa97d12e1560762"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=846f561170f0f4f6345d6b0ce1c35bf7059126cb",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=846f561170f0f4f6345d6b0ce1c35bf7059126cb"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=239aba9a1a4a474d86bde9cb67bfb1b2d6379a7c",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=239aba9a1a4a474d86bde9cb67bfb1b2d6379a7c"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=f9f86fd07af5606d0cb74c3eca5b2cbfda509345",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=f9f86fd07af5606d0cb74c3eca5b2cbfda509345"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4aa30844e28eb4b410f86d97e970a39fcdfd797d",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=4aa30844e28eb4b410f86d97e970a39fcdfd797d"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=9a8f1aeb8055de80137e769fae637cd480495509",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=9a8f1aeb8055de80137e769fae637cd480495509"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a544494791b6307a2fe52fa282768083deb8a317",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=a544494791b6307a2fe52fa282768083deb8a317"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=d42e72aa69a02531396b5a37cadebf927a757aa6",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=d42e72aa69a02531396b5a37cadebf927a757aa6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=002cb97a955832197f3ceebfa8b32bd12b946151",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=002cb97a955832197f3ceebfa8b32bd12b946151"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=8dc81c98ed72c99983660d5b94c2c8283bc1ff7f",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=8dc81c98ed72c99983660d5b94c2c8283bc1ff7f"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=9ab5a5a0b63075cfd095ed6bcf506b4704c523e1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=9ab5a5a0b63075cfd095ed6bcf506b4704c523e1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=731ebf70a25ab2cdc32d2626dcebe60fe3b09481",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=731ebf70a25ab2cdc32d2626dcebe60fe3b09481"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=3ea5197d268c6f4ed08fb866b587349f7049c6d5",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=3ea5197d268c6f4ed08fb866b587349f7049c6d5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ebf1042efb9bd4517cd09a543bb4e3a164de8771",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ebf1042efb9bd4517cd09a543bb4e3a164de8771"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9e040e43da5fe987747e16b305d7adf66977420f",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9e040e43da5fe987747e16b305d7adf66977420f"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=b98f8aafb23cbc8e883870bcc9dac165b3d75ae6",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=b98f8aafb23cbc8e883870bcc9dac165b3d75ae6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=eb72224cc57092448663fecc2c9bfa0f775eb770",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=eb72224cc57092448663fecc2c9bfa0f775eb770"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=17f6fbb4b52a6acdd831ebaffdac9bbc88d2f423",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=17f6fbb4b52a6acdd831ebaffdac9bbc88d2f423"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dda167ca8104de77f46fd29c66f66f807c63b309",
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dda167ca8104de77f46fd29c66f66f807c63b309",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dda167ca8104de77f46fd29c66f66f807c63b309"
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=dda167ca8104de77f46fd29c66f66f807c63b309"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=ee9797fbefb45eee88c92420a24cda838cff6b45",
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9048145ff167fb8f9f8d2a9845ee1d1b45c4884c",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=ee9797fbefb45eee88c92420a24cda838cff6b45"
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=9048145ff167fb8f9f8d2a9845ee1d1b45c4884c"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f11eeadd214e081a824f30aec5cb52d390ef576c",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f11eeadd214e081a824f30aec5cb52d390ef576c"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f7ee321d5f31ce5bc6a4cbec72a965d272b3b77b",
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f7ee321d5f31ce5bc6a4cbec72a965d272b3b77b",
|
||||||
@ -303,9 +288,24 @@
|
|||||||
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f7ee321d5f31ce5bc6a4cbec72a965d272b3b77b"
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=f7ee321d5f31ce5bc6a4cbec72a965d272b3b77b"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin",
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?h=wlan-cld2.driver.lnx.1.0.r21-rel&id=391d37818aaa8038a06662075dd8893501452931",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin"
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?h=wlan-cld2.driver.lnx.1.0.r21-rel&id=391d37818aaa8038a06662075dd8893501452931"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ec9896d0bc7521bbbe6dc28a198635dc281e7358",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=ec9896d0bc7521bbbe6dc28a198635dc281e7358"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=fb2f07b3b0d637a403bb891c57e76b6345a92cf0",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=fb2f07b3b0d637a403bb891c57e76b6345a92cf0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=667b3108d10e9580bf9f6d337c759dc88a1a0bdc",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=667b3108d10e9580bf9f6d337c759dc88a1a0bdc"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,14 +58,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
"name": "1041888",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
|
"url": "http://www.securitytracker.com/id/1041888"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://security.netapp.com/advisory/ntap-20181018-0002/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://security.netapp.com/advisory/ntap-20181018-0002/"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3655",
|
"name": "RHSA-2018:3655",
|
||||||
@ -77,15 +72,20 @@
|
|||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "https://usn.ubuntu.com/3799-1/"
|
"url": "https://usn.ubuntu.com/3799-1/"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "105594",
|
"name": "105594",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/105594"
|
"url": "http://www.securityfocus.com/bid/105594"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1041888",
|
"name": "https://security.netapp.com/advisory/ntap-20181018-0002/",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1041888"
|
"url": "https://security.netapp.com/advisory/ntap-20181018-0002/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "106618",
|
"name": "106618",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/106618"
|
"url": "http://www.securityfocus.com/bid/106618"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "Secure@Microsoft.com",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2018-8492",
|
"ID": "CVE-2018-8492",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -112,11 +112,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8492",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8492"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "105455",
|
"name": "105455",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -126,6 +121,11 @@
|
|||||||
"name": "1041842",
|
"name": "1041842",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1041842"
|
"url": "http://www.securitytracker.com/id/1041842"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8492",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8492"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "Secure@Microsoft.com",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2018-8569",
|
"ID": "CVE-2018-8569",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -53,11 +53,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.usa.philips.com/healthcare/about/customer-support/product-security",
|
"name": "https://www.usa.philips.com/healthcare/about/customer-support/product-security",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"name": "105194",
|
"name": "105194",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/105194"
|
"url": "http://www.securityfocus.com/bid/105194"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user