mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
52c804e9d5
commit
6bb090612f
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ADV-2006-1699",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1699"
|
||||
},
|
||||
{
|
||||
"name": "http://d4igoro.blogspot.com/2006/05/dynamic-galerie-10-path-traversal-xss.html",
|
||||
"refsource": "MISC",
|
||||
@ -63,20 +68,15 @@
|
||||
"url": "http://www.securityfocus.com/bid/17896"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1699",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1699"
|
||||
"name": "25444",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/25444"
|
||||
},
|
||||
{
|
||||
"name": "25443",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/25443"
|
||||
},
|
||||
{
|
||||
"name" : "25444",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/25444"
|
||||
},
|
||||
{
|
||||
"name": "19995",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -52,16 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060617 [ECHO_ADV_33$2006] CMS Faethon 1.3.2 mainpath Remote File Inclusion",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/437492/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://advisories.echo.or.id/adv/adv33-K-159-2006.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://advisories.echo.or.id/adv/adv33-K-159-2006.txt"
|
||||
},
|
||||
{
|
||||
"name": "20713",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20713"
|
||||
},
|
||||
{
|
||||
"name": "cms-faethon-dataheader-file-include(27330)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27330"
|
||||
},
|
||||
{
|
||||
"name": "1127",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1127"
|
||||
},
|
||||
{
|
||||
"name": "20060617 [ECHO_ADV_33$2006] CMS Faethon 1.3.2 mainpath Remote File Inclusion",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/437492/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "18489",
|
||||
"refsource": "BID",
|
||||
@ -71,21 +86,6 @@
|
||||
"name": "ADV-2006-2409",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2409"
|
||||
},
|
||||
{
|
||||
"name" : "20713",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20713"
|
||||
},
|
||||
{
|
||||
"name" : "1127",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1127"
|
||||
},
|
||||
{
|
||||
"name" : "cms-faethon-dataheader-file-include(27330)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27330"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "22068",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22068"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3737",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3737"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2006-09-21",
|
||||
"refsource": "APPLE",
|
||||
@ -62,25 +72,15 @@
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/867796"
|
||||
},
|
||||
{
|
||||
"name" : "20144",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20144"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3737",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3737"
|
||||
},
|
||||
{
|
||||
"name": "1016903",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016903"
|
||||
},
|
||||
{
|
||||
"name" : "22068",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22068"
|
||||
"name": "20144",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20144"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,31 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060710 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/439617/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060711 Re: [Full-disclosure] ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/440135/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060710 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047757.html"
|
||||
},
|
||||
{
|
||||
"name" : "20060711 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047794.html"
|
||||
},
|
||||
{
|
||||
"name" : "18906",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18906"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2735",
|
||||
"refsource": "VUPEN",
|
||||
@ -87,11 +62,6 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/27122"
|
||||
},
|
||||
{
|
||||
"name" : "1016455",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016455"
|
||||
},
|
||||
{
|
||||
"name": "20997",
|
||||
"refsource": "SECUNIA",
|
||||
@ -101,6 +71,36 @@
|
||||
"name": "sipxtapi-cseq-bo(27681)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27681"
|
||||
},
|
||||
{
|
||||
"name": "20060711 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047794.html"
|
||||
},
|
||||
{
|
||||
"name": "20060710 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047757.html"
|
||||
},
|
||||
{
|
||||
"name": "18906",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18906"
|
||||
},
|
||||
{
|
||||
"name": "20060711 Re: [Full-disclosure] ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/440135/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1016455",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016455"
|
||||
},
|
||||
{
|
||||
"name": "20060710 ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/439617/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060702 plume-cms v1.0.4 Multiple Remote File include",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/438948/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "18780",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18780"
|
||||
},
|
||||
{
|
||||
"name" : "1016426",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016426"
|
||||
"name": "20060702 plume-cms v1.0.4 Multiple Remote File include",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/438948/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "plumecms-multiple-scripts-file-include(27530)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27530"
|
||||
},
|
||||
{
|
||||
"name": "1220",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://securityreason.com/securityalert/1220"
|
||||
},
|
||||
{
|
||||
"name" : "plumecms-multiple-scripts-file-include(27530)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27530"
|
||||
"name": "1016426",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016426"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061126 [Aria-Security Team] FipsSHOP SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/453029/100/0/threaded"
|
||||
"name": "ADV-2006-4779",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4779"
|
||||
},
|
||||
{
|
||||
"name": "1959",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1959"
|
||||
},
|
||||
{
|
||||
"name": "http://www.aria-security.com/forum/showthread.php?t=46",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.aria-security.com/forum/showthread.php?t=46"
|
||||
},
|
||||
{
|
||||
"name" : "21289",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21289"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4779",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4779"
|
||||
},
|
||||
{
|
||||
"name": "23147",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23147"
|
||||
},
|
||||
{
|
||||
"name" : "1959",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1959"
|
||||
"name": "20061126 [Aria-Security Team] FipsSHOP SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/453029/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "21289",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21289"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://dl.sugarforge.org/sugardocs/Notes/ReleaseNotes/SugarOpenSource_ReleaseNotes_4.5.0g.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://dl.sugarforge.org/sugardocs/Notes/ReleaseNotes/SugarOpenSource_ReleaseNotes_4.5.0g.pdf"
|
||||
"name": "1017434",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1017434"
|
||||
},
|
||||
{
|
||||
"name": "JVN#74079537",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/jp/JVN%2374079537/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "21694",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21694"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-5100",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/5100"
|
||||
},
|
||||
{
|
||||
"name" : "1017434",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1017434"
|
||||
},
|
||||
{
|
||||
"name": "23424",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23424"
|
||||
},
|
||||
{
|
||||
"name": "21694",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21694"
|
||||
},
|
||||
{
|
||||
"name": "http://dl.sugarforge.org/sugardocs/Notes/ReleaseNotes/SugarOpenSource_ReleaseNotes_4.5.0g.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://dl.sugarforge.org/sugardocs/Notes/ReleaseNotes/SugarOpenSource_ReleaseNotes_4.5.0g.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "2993",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/2993"
|
||||
"name": "ADV-2006-5151",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/5151"
|
||||
},
|
||||
{
|
||||
"name": "21763",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21763"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-5151",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/5151"
|
||||
},
|
||||
{
|
||||
"name": "23515",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23515"
|
||||
},
|
||||
{
|
||||
"name": "2993",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2993"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3026",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3026"
|
||||
},
|
||||
{
|
||||
"name" : "21793",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21793"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-5195",
|
||||
"refsource": "VUPEN",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "bubla-process-file-include(31135)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31135"
|
||||
},
|
||||
{
|
||||
"name": "3026",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3026"
|
||||
},
|
||||
{
|
||||
"name": "21793",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21793"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://sla.ckers.org/forum/read.php?13,2253",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://sla.ckers.org/forum/read.php?13,2253"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=356355",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=356355"
|
||||
},
|
||||
{
|
||||
"name": "http://sla.ckers.org/forum/read.php?13,2253",
|
||||
"refsource": "MISC",
|
||||
"url": "http://sla.ckers.org/forum/read.php?13,2253"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-0008",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,44 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=668843",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=668843"
|
||||
"name": "MDVSA-2011:018",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:018"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-0470",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0199",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0199"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=668843",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=668843"
|
||||
},
|
||||
{
|
||||
"name": "sudo-parse-privilege-escalation(64965)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64965"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-0455",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2011:018",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:018"
|
||||
},
|
||||
{
|
||||
"name" : "42968",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42968"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0195",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0195"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0199",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0199"
|
||||
},
|
||||
{
|
||||
"name" : "sudo-parse-privilege-escalation(64965)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64965"
|
||||
"name": "42968",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42968"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2011-0654",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,31 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "16166",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/16166"
|
||||
},
|
||||
{
|
||||
"name" : "20110214 MS Windows Server 2003 AD Pre-Auth BROWSER ELECTION Remote Heap Overflow",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0284.html"
|
||||
},
|
||||
{
|
||||
"name": "http://blogs.technet.com/b/mmpc/archive/2011/02/16/my-sweet-valentine-the-cifs-browser-protocol-heap-corruption-vulnerability.aspx",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blogs.technet.com/b/mmpc/archive/2011/02/16/my-sweet-valentine-the-cifs-browser-protocol-heap-corruption-vulnerability.aspx"
|
||||
},
|
||||
{
|
||||
"name" : "http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx"
|
||||
},
|
||||
{
|
||||
"name" : "MS11-019",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-019"
|
||||
},
|
||||
{
|
||||
"name": "TA11-102A",
|
||||
"refsource": "CERT",
|
||||
@ -88,39 +68,59 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/323172"
|
||||
},
|
||||
{
|
||||
"name" : "46360",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/46360"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:12637",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12637"
|
||||
},
|
||||
{
|
||||
"name" : "1025328",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1025328"
|
||||
},
|
||||
{
|
||||
"name" : "43299",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43299"
|
||||
"name": "16166",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/16166"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0394",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0394"
|
||||
},
|
||||
{
|
||||
"name": "http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx"
|
||||
},
|
||||
{
|
||||
"name": "1025328",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1025328"
|
||||
},
|
||||
{
|
||||
"name": "20110214 MS Windows Server 2003 AD Pre-Auth BROWSER ELECTION Remote Heap Overflow",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0284.html"
|
||||
},
|
||||
{
|
||||
"name": "46360",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/46360"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0938",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0938"
|
||||
},
|
||||
{
|
||||
"name": "43299",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43299"
|
||||
},
|
||||
{
|
||||
"name": "ms-win-server-browser-bo(65376)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65376"
|
||||
},
|
||||
{
|
||||
"name": "MS11-019",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-019"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:12637",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12637"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2011-0805",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2011-0845",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
|
||||
},
|
||||
{
|
||||
"name": "TA11-201A",
|
||||
"refsource": "CERT",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "48794",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48794"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2011-0935",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -58,14 +58,9 @@
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=70078"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html"
|
||||
},
|
||||
{
|
||||
"name" : "46614",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/46614"
|
||||
"name": "google-chrome-form-controls-unspecified(65729)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65729"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14245",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14245"
|
||||
},
|
||||
{
|
||||
"name" : "google-chrome-form-controls-unspecified(65729)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65729"
|
||||
"name": "46614",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/46614"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2011-1623",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20110601 Default Credentials for root Account on the Cisco Media Experience Engine 5600",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80122.shtml"
|
||||
"name": "72721",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/72721"
|
||||
},
|
||||
{
|
||||
"name": "cisco-mxe-default-password(67760)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67760"
|
||||
},
|
||||
{
|
||||
"name": "48078",
|
||||
@ -63,19 +68,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/48078"
|
||||
},
|
||||
{
|
||||
"name" : "72721",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/72721"
|
||||
"name": "20110601 Default Credentials for root Account on the Cisco Media Experience Engine 5600",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80122.shtml"
|
||||
},
|
||||
{
|
||||
"name": "1025590",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1025590"
|
||||
},
|
||||
{
|
||||
"name" : "cisco-mxe-default-password(67760)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67760"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2011-3249",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5016",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5016"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5130",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "oval:org.mitre.oval:def:16130",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16130"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5016",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5016"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-4122",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20111207 Disputing CVE-2011-4122",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2011/12/07/3"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20111208 Re: Disputing CVE-2011-4122",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2011/12/08/9"
|
||||
},
|
||||
{
|
||||
"name" : "http://c-skills.blogspot.com/2011/11/openpam-trickery.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://c-skills.blogspot.com/2011/11/openpam-trickery.html"
|
||||
},
|
||||
{
|
||||
"name": "http://stealth.openwall.net/xSports/pamslam",
|
||||
"refsource": "MISC",
|
||||
"url": "http://stealth.openwall.net/xSports/pamslam"
|
||||
},
|
||||
{
|
||||
"name" : "http://trac.des.no/openpam/changeset/478/trunk/lib/openpam_configure.c",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://trac.des.no/openpam/changeset/478/trunk/lib/openpam_configure.c"
|
||||
},
|
||||
{
|
||||
"name" : "76945",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/76945"
|
||||
},
|
||||
{
|
||||
"name": "46756",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/46756"
|
||||
},
|
||||
{
|
||||
"name" : "46804",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/46804"
|
||||
"name": "[oss-security] 20111207 Disputing CVE-2011-4122",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2011/12/07/3"
|
||||
},
|
||||
{
|
||||
"name": "http://trac.des.no/openpam/changeset/478/trunk/lib/openpam_configure.c",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://trac.des.no/openpam/changeset/478/trunk/lib/openpam_configure.c"
|
||||
},
|
||||
{
|
||||
"name": "openpam-Pamstart-privilege-escalation(71205)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71205"
|
||||
},
|
||||
{
|
||||
"name": "76945",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/76945"
|
||||
},
|
||||
{
|
||||
"name": "http://c-skills.blogspot.com/2011/11/openpam-trickery.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://c-skills.blogspot.com/2011/11/openpam-trickery.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20111208 Re: Disputing CVE-2011-4122",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2011/12/08/9"
|
||||
},
|
||||
{
|
||||
"name": "46804",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/46804"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://technet.microsoft.com/en-us/security/msvr/msvr11-015",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://technet.microsoft.com/en-us/security/msvr/msvr11-015"
|
||||
},
|
||||
{
|
||||
"name" : "http://code.google.com/p/idapython/downloads/detail?name=idapython-1.5.2.3_ida6.1_py2.6_win32.zip",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://code.google.com/p/idapython/downloads/detail?name=idapython-1.5.2.3_ida6.1_py2.6_win32.zip"
|
||||
},
|
||||
{
|
||||
"name" : "http://code.google.com/p/idapython/source/detail?r=361",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://code.google.com/p/idapython/source/detail?r=361"
|
||||
},
|
||||
{
|
||||
"name": "47295",
|
||||
"refsource": "SECUNIA",
|
||||
@ -76,6 +61,21 @@
|
||||
"name": "idapro-idb-code-execution(71936)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71936"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/idapython/source/detail?r=361",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/idapython/source/detail?r=361"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/idapython/downloads/detail?name=idapython-1.5.2.3_ida6.1_py2.6_win32.zip",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/idapython/downloads/detail?name=idapython-1.5.2.3_ida6.1_py2.6_win32.zip"
|
||||
},
|
||||
{
|
||||
"name": "http://technet.microsoft.com/en-us/security/msvr/msvr11-015",
|
||||
"refsource": "MISC",
|
||||
"url": "http://technet.microsoft.com/en-us/security/msvr/msvr11-015"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html"
|
||||
},
|
||||
{
|
||||
"name": "ppp-cp-httpresponse-info-disc(72223)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72223"
|
||||
},
|
||||
{
|
||||
"name": "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-5890",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
||||
},
|
||||
{
|
||||
"name" : "64758",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/64758"
|
||||
"name": "1029619",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029619"
|
||||
},
|
||||
{
|
||||
"name": "64816",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://osvdb.org/102104"
|
||||
},
|
||||
{
|
||||
"name" : "1029619",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1029619"
|
||||
"name": "64758",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/64758"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
||||
},
|
||||
{
|
||||
"name": "56471",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2014-2005",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "JVNDB-2014-000061",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000061"
|
||||
},
|
||||
{
|
||||
"name": "http://www.sophos.com/en-us/support/knowledgebase/121066.aspx",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN63940326/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2014-000061",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000061"
|
||||
},
|
||||
{
|
||||
"name": "68169",
|
||||
"refsource": "BID",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2014-2483",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,79 +53,79 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
|
||||
},
|
||||
{
|
||||
"name" : "http://hg.openjdk.java.net/jdk7u/jdk7u/hotspot/rev/848481af9003",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://hg.openjdk.java.net/jdk7u/jdk7u/hotspot/rev/848481af9003"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1119626",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1119626"
|
||||
"name": "DSA-2987",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2987"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2987",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2987"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201502-12",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201502-12.xml"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX03091",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101667",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=140852886808946&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0902",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2014:0902"
|
||||
},
|
||||
{
|
||||
"name" : "68608",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/68608"
|
||||
},
|
||||
{
|
||||
"name": "1030577",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030577"
|
||||
},
|
||||
{
|
||||
"name" : "60485",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/60485"
|
||||
"name": "SSRT101667",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2"
|
||||
},
|
||||
{
|
||||
"name": "60812",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60812"
|
||||
},
|
||||
{
|
||||
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1119626",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1119626"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
|
||||
},
|
||||
{
|
||||
"name": "60485",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60485"
|
||||
},
|
||||
{
|
||||
"name": "http://hg.openjdk.java.net/jdk7u/jdk7u/hotspot/rev/848481af9003",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://hg.openjdk.java.net/jdk7u/jdk7u/hotspot/rev/848481af9003"
|
||||
},
|
||||
{
|
||||
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0902",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2014:0902"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201502-12",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
|
||||
},
|
||||
{
|
||||
"name": "68608",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/68608"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-2797",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,6 +57,11 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037"
|
||||
},
|
||||
{
|
||||
"name": "59775",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59775"
|
||||
},
|
||||
{
|
||||
"name": "68380",
|
||||
"refsource": "BID",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "1030532",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030532"
|
||||
},
|
||||
{
|
||||
"name" : "59775",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59775"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-2813",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -62,15 +62,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/68390"
|
||||
},
|
||||
{
|
||||
"name" : "1030532",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030532"
|
||||
},
|
||||
{
|
||||
"name": "59775",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59775"
|
||||
},
|
||||
{
|
||||
"name": "1030532",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030532"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2014-6121",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21693035",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21693035"
|
||||
},
|
||||
{
|
||||
"name": "1031427",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031427"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21693035",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693035"
|
||||
},
|
||||
{
|
||||
"name": "ibm-appscan-cve20146121-xss(96722)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2014-6564",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
|
||||
"name": "70511",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/70511"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:0743",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name" : "70511",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/70511"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2014-6582",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2014-6595",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201612-27",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201612-27"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0229",
|
||||
"refsource": "SUSE",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-6743",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "VU#436329",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/436329"
|
||||
},
|
||||
{
|
||||
"name" : "VU#582497",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/582497"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-6787",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
"name": "VU#690033",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/690033"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name" : "VU#690033",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/690033"
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7075",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "VU#460353",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/460353"
|
||||
},
|
||||
{
|
||||
"name" : "VU#582497",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/582497"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-7245",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7328",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#556361",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7652",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#671377",
|
||||
"refsource": "CERT-VN",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0168",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0168"
|
||||
"name": "1038232",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038232"
|
||||
},
|
||||
{
|
||||
"name": "97418",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/97418"
|
||||
},
|
||||
{
|
||||
"name" : "1038232",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038232"
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0168",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0168"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"DATE_PUBLIC": "2017-07-05T00:00:00",
|
||||
"ID": "CVE-2017-0664",
|
||||
"STATE": "PUBLIC"
|
||||
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2017-07-01",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2017-07-01"
|
||||
},
|
||||
{
|
||||
"name": "99470",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99470"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2017-07-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-07-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://hackerone.com/reports/173622",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://hackerone.com/reports/173622"
|
||||
},
|
||||
{
|
||||
"name": "https://nextcloud.com/security/advisory/?id=nc-sa-2017-005",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://nextcloud.com/security/advisory/?id=nc-sa-2017-005"
|
||||
},
|
||||
{
|
||||
"name": "https://hackerone.com/reports/173622",
|
||||
"refsource": "MISC",
|
||||
"url": "https://hackerone.com/reports/173622"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2017-1000366",
|
||||
"REQUESTER": "qsa@qualys.com",
|
||||
"STATE": "PUBLIC"
|
||||
@ -12,18 +12,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "glibc",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.25"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "GNU Project"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "A specific CWE doesn't exist, listing as unknown for now"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -54,9 +54,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "42274",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/42274/"
|
||||
"name": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
|
||||
},
|
||||
{
|
||||
"name": "1038712",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038712"
|
||||
},
|
||||
{
|
||||
"name": "42275",
|
||||
@ -64,45 +69,15 @@
|
||||
"url": "https://www.exploit-db.com/exploits/42275/"
|
||||
},
|
||||
{
|
||||
"name" : "42276",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/42276/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
|
||||
},
|
||||
{
|
||||
"name" : "https://access.redhat.com/security/cve/CVE-2017-1000366",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://access.redhat.com/security/cve/CVE-2017-1000366"
|
||||
"name": "RHSA-2017:1712",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1712"
|
||||
},
|
||||
{
|
||||
"name": "https://www.suse.com/security/cve/CVE-2017-1000366/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.suse.com/support/kb/doc/?id=7020973",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.suse.com/support/kb/doc/?id=7020973"
|
||||
},
|
||||
{
|
||||
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10205",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10205"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3887",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2017/dsa-3887"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201706-19",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201706-19"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1479",
|
||||
"refsource": "REDHAT",
|
||||
@ -114,9 +89,19 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1480"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1481",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1481"
|
||||
"name": "99127",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99127"
|
||||
},
|
||||
{
|
||||
"name": "42276",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/42276/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.suse.com/support/kb/doc/?id=7020973",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.suse.com/support/kb/doc/?id=7020973"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1567",
|
||||
@ -124,19 +109,34 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1712",
|
||||
"name": "42274",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/42274/"
|
||||
},
|
||||
{
|
||||
"name": "https://access.redhat.com/security/cve/CVE-2017-1000366",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1481",
|
||||
"refsource": "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1712"
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1481"
|
||||
},
|
||||
{
|
||||
"name" : "99127",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/99127"
|
||||
"name": "DSA-3887",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3887"
|
||||
},
|
||||
{
|
||||
"name" : "1038712",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038712"
|
||||
"name": "GLSA-201706-19",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201706-19"
|
||||
},
|
||||
{
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10205",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10205"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2017-1000376",
|
||||
"REQUESTER": "qsa@qualys.com",
|
||||
"STATE": "PUBLIC"
|
||||
@ -12,18 +12,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "libffi",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "3.1"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "libffi"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Requests executable stack"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,25 +62,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ibm-websphere-cve20171743-info-disc(134933)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134933"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22013601",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22013601"
|
||||
},
|
||||
{
|
||||
"name" : "104134",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/104134"
|
||||
},
|
||||
{
|
||||
"name": "1040890",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040890"
|
||||
},
|
||||
{
|
||||
"name" : "ibm-websphere-cve20171743-info-disc(134933)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/134933"
|
||||
"name": "104134",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104134"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,20 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01"
|
||||
"name": "https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager"
|
||||
},
|
||||
{
|
||||
"name": "96028",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96028"
|
||||
},
|
||||
{
|
||||
"name": "https://support.citrix.com/article/CTX219885",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.citrix.com/article/CTX219885"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager"
|
||||
},
|
||||
{
|
||||
"name": "https://www.schneider-electric.com/en/download/document/SEVD-2018-137-01/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-144-01/"
|
||||
},
|
||||
{
|
||||
"name" : "96028",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/96028"
|
||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01",
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user