mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
0555543698
commit
6e3d5644bb
@ -52,36 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060112 Advisory 02/2006: PHP ext/mysqli Format String Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/421705/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.hardened-php.net/advisory_022006.113.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.hardened-php.net/advisory_022006.113.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.php.net/release_5_1_2.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.php.net/release_5_1_2.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "16219",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/16219"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-0177",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/0177"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-0369",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/0369"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1015485",
|
"name": "1015485",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
@ -93,14 +63,44 @@
|
|||||||
"url": "http://secunia.com/advisories/18431"
|
"url": "http://secunia.com/advisories/18431"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "337",
|
"name": "ADV-2006-0369",
|
||||||
"refsource" : "SREASON",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://securityreason.com/securityalert/337"
|
"url": "http://www.vupen.com/english/advisories/2006/0369"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-0177",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/0177"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060112 Advisory 02/2006: PHP ext/mysqli Format String Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/421705/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "php-extmysqli-format-string(24095)",
|
"name": "php-extmysqli-format-string(24095)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24095"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24095"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.hardened-php.net/advisory_022006.113.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.hardened-php.net/advisory_022006.113.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "337",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/337"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "16219",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/16219"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.php.net/release_5_1_2.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.php.net/release_5_1_2.php"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,29 +58,29 @@
|
|||||||
"url": "http://www.integrigy.com/info/IntegrigySecurityAnalysis-CPU0106.pdf"
|
"url": "http://www.integrigy.com/info/IntegrigySecurityAnalysis-CPU0106.pdf"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technology/deploy/security/pdf/cpujan2006.html",
|
"name": "oracle-january2006-update(24321)",
|
||||||
"refsource" : "MISC",
|
"refsource": "XF",
|
||||||
"url" : "http://www.oracle.com/technology/deploy/security/pdf/cpujan2006.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24321"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html",
|
"name": "http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html"
|
"url": "http://www.red-database-security.com/advisory/oracle_cpu_jan_2006.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "TA06-018A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-018A.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#999268",
|
"name": "VU#999268",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/999268"
|
"url": "http://www.kb.cert.org/vuls/id/999268"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oracle-january2006-update(24321)",
|
"name": "TA06-018A",
|
||||||
"refsource" : "XF",
|
"refsource": "CERT",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24321"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA06-018A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technology/deploy/security/pdf/cpujan2006.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.oracle.com/technology/deploy/security/pdf/cpujan2006.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "478",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/478"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1015671",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1015671"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20060223 NOCC Webmail <= 1.0 multiple vulnerabilities",
|
"name": "20060223 NOCC Webmail <= 1.0 multiple vulnerabilities",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-02/0418.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-02/0418.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "16921",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/16921"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://retrogod.altervista.org/noccw_10_incl_xpl.html",
|
"name": "http://retrogod.altervista.org/noccw_10_incl_xpl.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -66,21 +81,6 @@
|
|||||||
"name": "16793",
|
"name": "16793",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/16793"
|
"url": "http://www.securityfocus.com/bid/16793"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1015671",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1015671"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "16921",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/16921"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "478",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/478"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,20 +57,15 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/431308/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/431308/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://advisory.patriotichackers.com/index.php?itemid=3",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://advisory.patriotichackers.com/index.php?itemid=3"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "17591",
|
"name": "17591",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/17591"
|
"url": "http://www.securityfocus.com/bid/17591"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "735",
|
"name": "http://advisory.patriotichackers.com/index.php?itemid=3",
|
||||||
"refsource" : "SREASON",
|
"refsource": "MISC",
|
||||||
"url" : "http://securityreason.com/securityalert/735"
|
"url": "http://advisory.patriotichackers.com/index.php?itemid=3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "770",
|
"name": "770",
|
||||||
@ -81,6 +76,11 @@
|
|||||||
"name": "phplister-index-xss(25910)",
|
"name": "phplister-index-xss(25910)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25910"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25910"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "735",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/735"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,74 +53,39 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1",
|
"name": "21934",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1"
|
"url": "http://secunia.com/advisories/21934"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.9",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.9"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://issues.rpath.com/browse/RPL-611",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://issues.rpath.com/browse/RPL-611"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1184",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2006/dsa-1184"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1237",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2006/dsa-1237"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2006:0689",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0689.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2006:021",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2006:022",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2006_22_sr.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SA:2006:057",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2006_57_kernel.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-346-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/usn-346-1"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "19615",
|
"name": "19615",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/19615"
|
"url": "http://www.securityfocus.com/bid/19615"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "21847",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21847"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:10666",
|
"name": "oval:org.mitre.oval:def:10666",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10666"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10666"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-3330",
|
"name": "21695",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/3330"
|
"url": "http://secunia.com/advisories/21695"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22292",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/22292"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2006:0689",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2006-0689.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-3331",
|
"name": "ADV-2006-3331",
|
||||||
@ -133,19 +98,39 @@
|
|||||||
"url": "http://secunia.com/advisories/21563"
|
"url": "http://secunia.com/advisories/21563"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "21695",
|
"name": "22148",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/21695"
|
"url": "http://secunia.com/advisories/22148"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22093",
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/22093"
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22292",
|
"name": "USN-346-1",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://secunia.com/advisories/22292"
|
"url": "http://www.ubuntu.com/usn/usn-346-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-3330",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/3330"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2006:021",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2006:022",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/2006_22_sr.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "22945",
|
"name": "22945",
|
||||||
@ -153,19 +138,34 @@
|
|||||||
"url": "http://secunia.com/advisories/22945"
|
"url": "http://secunia.com/advisories/22945"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "21847",
|
"name": "https://issues.rpath.com/browse/RPL-611",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/21847"
|
"url": "https://issues.rpath.com/browse/RPL-611"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "21934",
|
"name": "DSA-1237",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://secunia.com/advisories/21934"
|
"url": "http://www.debian.org/security/2006/dsa-1237"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22148",
|
"name": "22093",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/22148"
|
"url": "http://secunia.com/advisories/22093"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.9",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1184",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2006/dsa-1184"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SA:2006:057",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/2006_57_kernel.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,40 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-4750",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/4750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "macos-webkit-code-execution(30645)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30645"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "30726",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/30726"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://docs.info.apple.com/article.html?artnum=304829",
|
"name": "http://docs.info.apple.com/article.html?artnum=304829",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://docs.info.apple.com/article.html?artnum=304829"
|
"url": "http://docs.info.apple.com/article.html?artnum=304829"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2006-11-28",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA06-333A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-333A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#848960",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/848960"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "21335",
|
"name": "21335",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/21335"
|
"url": "http://www.securityfocus.com/bid/21335"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-4750",
|
"name": "VU#848960",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "CERT-VN",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/4750"
|
"url": "http://www.kb.cert.org/vuls/id/848960"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "30726",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/30726"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1017304",
|
"name": "1017304",
|
||||||
@ -98,9 +93,14 @@
|
|||||||
"url": "http://secunia.com/advisories/23155"
|
"url": "http://secunia.com/advisories/23155"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "macos-webkit-code-execution(30645)",
|
"name": "APPLE-SA-2006-11-28",
|
||||||
"refsource" : "XF",
|
"refsource": "APPLE",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30645"
|
"url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA06-333A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060909 Multible injections and vulnerabilities in Jetbox CMS",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/445652/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "19303",
|
"name": "19303",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/19303"
|
"url": "http://www.securityfocus.com/bid/19303"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "jetboxcms-phpthumb-file-include(28843)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28843"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1562",
|
"name": "1562",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/1562"
|
"url": "http://securityreason.com/securityalert/1562"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "jetboxcms-phpthumb-file-include(28843)",
|
"name": "20060909 Multible injections and vulnerabilities in Jetbox CMS",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28843"
|
"url": "http://www.securityfocus.com/archive/1/445652/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20061112 infinicart [ multiples injection sql & xss (post) ]",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/451322/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "21043",
|
"name": "21043",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/21043"
|
"url": "http://www.securityfocus.com/bid/21043"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20061112 infinicart [ multiples injection sql & xss (post) ]",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/451322/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-4501",
|
"name": "ADV-2006-4501",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -72,15 +72,15 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/22865"
|
"url": "http://secunia.com/advisories/22865"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1881",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/1881"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "infinicart-multiple-xss(30233)",
|
"name": "infinicart-multiple-xss(30233)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30233"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30233"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1881",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/1881"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.exploit-db.com/exploits/12855/",
|
"name": "phpbazar-picturelib-file-include(59127)",
|
||||||
"refsource" : "MISC",
|
"refsource": "XF",
|
||||||
"url" : "http://www.exploit-db.com/exploits/12855/"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59127"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "40546",
|
"name": "40546",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/40546"
|
"url": "http://www.securityfocus.com/bid/40546"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "phpbazar-picturelib-file-include(59127)",
|
"name": "http://www.exploit-db.com/exploits/12855/",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/59127"
|
"url": "http://www.exploit-db.com/exploits/12855/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20100608 jar, fastjar directory traversal vulnerabilities",
|
"name": "GLSA-201209-21",
|
||||||
"refsource" : "MLIST",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://marc.info/?l=oss-security&m=127602564508766&w=2"
|
"url": "http://security.gentoo.org/glsa/glsa-201209-21.xml"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=594497",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=594497",
|
||||||
@ -68,34 +63,34 @@
|
|||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=594497"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=594497"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=601823",
|
"name": "[oss-security] 20100608 jar, fastjar directory traversal vulnerabilities",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MLIST",
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=601823"
|
"url": "http://marc.info/?l=oss-security&m=127602564508766&w=2"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://launchpad.net/bugs/540575",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://launchpad.net/bugs/540575"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201209-21",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-201209-21.xml"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2011:0025",
|
"name": "RHSA-2011:0025",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0025.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2011-0025.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=601823",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=601823"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "41009",
|
"name": "41009",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/41009"
|
"url": "http://www.securityfocus.com/bid/41009"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "65467",
|
"name": "ADV-2011-0121",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.osvdb.org/65467"
|
"url": "http://www.vupen.com/english/advisories/2011/0121"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://packages.debian.org/changelogs/pool/main/f/fastjar/fastjar_0.98-3/changelog"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "42892",
|
"name": "42892",
|
||||||
@ -108,9 +103,14 @@
|
|||||||
"url": "http://secunia.com/advisories/50786"
|
"url": "http://secunia.com/advisories/50786"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2011-0121",
|
"name": "https://launchpad.net/bugs/540575",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/0121"
|
"url": "https://launchpad.net/bugs/540575"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "65467",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/65467"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "40343",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/40343"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-013/index.html",
|
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-013/index.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -62,11 +67,6 @@
|
|||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/65833"
|
"url": "http://osvdb.org/65833"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "40343",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/40343"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2010-1635",
|
"name": "ADV-2010-1635",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=42396",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=42396"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html",
|
"name": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html"
|
"url": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://code.google.com/p/chromium/issues/detail?id=42396",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://code.google.com/p/chromium/issues/detail?id=42396"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:12090",
|
"name": "oval:org.mitre.oval:def:12090",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://zerodayinitiative.com/advisories/ZDI-10-135/",
|
"name": "https://bugzilla.novell.com/show_bug.cgi?id=599865",
|
||||||
"refsource" : "MISC",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://zerodayinitiative.com/advisories/ZDI-10-135/"
|
"url": "https://bugzilla.novell.com/show_bug.cgi?id=599865"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.novell.com/support/viewContent.do?externalId=7006375&sliceId=1",
|
"name": "http://www.novell.com/support/viewContent.do?externalId=7006375&sliceId=1",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.novell.com/support/viewContent.do?externalId=7006375&sliceId=1"
|
"url": "http://www.novell.com/support/viewContent.do?externalId=7006375&sliceId=1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=599865",
|
"name": "http://zerodayinitiative.com/advisories/ZDI-10-135/",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=599865"
|
"url": "http://zerodayinitiative.com/advisories/ZDI-10-135/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,15 +53,30 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20100824 Firefox <= 3.6.8 DLL Hijacking Exploit [dwmapi.dll]",
|
"name": "41095",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/513324/100/0/threaded"
|
"url": "http://secunia.com/advisories/41095"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SA:2010:049",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "14783",
|
"name": "14783",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/14783"
|
"url": "http://www.exploit-db.com/exploits/14783"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20100824 Firefox <= 3.6.8 DLL Hijacking Exploit [dwmapi.dll]",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/513324/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2010-2201",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2010/2201"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "14730",
|
"name": "14730",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -73,14 +88,14 @@
|
|||||||
"url": "http://www.mozilla.org/security/announce/2010/mfsa2010-52.html"
|
"url": "http://www.mozilla.org/security/announce/2010/mfsa2010-52.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=579593",
|
"name": "ADV-2010-2169",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "VUPEN",
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=579593"
|
"url": "http://www.vupen.com/english/advisories/2010/2169"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SA:2010:049",
|
"name": "ADV-2010-2323",
|
||||||
"refsource" : "SUSE",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html"
|
"url": "http://www.vupen.com/english/advisories/2010/2323"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:12143",
|
"name": "oval:org.mitre.oval:def:12143",
|
||||||
@ -88,29 +103,14 @@
|
|||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12143"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12143"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "41095",
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=579593",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/41095"
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=579593"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "41168",
|
"name": "41168",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/41168"
|
"url": "http://secunia.com/advisories/41168"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2010-2169",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2010/2169"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2010-2201",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2010/2201"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2010-2323",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2010/2323"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://code.google.com/p/chromium/issues/detail?id=34414"
|
"url": "http://code.google.com/p/chromium/issues/detail?id=34414"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:11752",
|
"name": "oval:org.mitre.oval:def:11752",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11752"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11752"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://googlechromereleases.blogspot.com/2010/09/stable-and-beta-channel-updates.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2010-3583",
|
"ID": "CVE-2010-3583",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2010-3713",
|
"ID": "CVE-2010-3713",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -62,15 +62,15 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2010/10/11/5"
|
"url": "http://www.openwall.com/lists/oss-security/2010/10/11/5"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.usebb.net/community/topic-2495.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.usebb.net/community/topic-2495.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.usebb.net/community/topic.php?id=2501",
|
"name": "http://www.usebb.net/community/topic.php?id=2501",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.usebb.net/community/topic.php?id=2501"
|
"url": "http://www.usebb.net/community/topic.php?id=2501"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.usebb.net/community/topic-2495.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.usebb.net/community/topic-2495.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.org/1005-exploits/webasyst-sql.txt"
|
"url": "http://packetstormsecurity.org/1005-exploits/webasyst-sql.txt"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "40349",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/40349"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "8416",
|
"name": "8416",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/8416"
|
"url": "http://securityreason.com/securityalert/8416"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "40349",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/40349"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -67,15 +67,15 @@
|
|||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/65642"
|
"url": "http://www.osvdb.org/65642"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "40289",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/40289"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "bannermanagement-trackads-sql-injection(59558)",
|
"name": "bannermanagement-trackads-sql-injection(59558)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59558"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59558"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "40289",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/40289"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2011-1225",
|
"ID": "CVE-2011-1225",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,45 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.avaya.com/css/P8/documents/100133352",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.avaya.com/css/P8/documents/100133352"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MS11-034",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "TA11-102A",
|
"name": "TA11-102A",
|
||||||
"refsource": "CERT",
|
"refsource": "CERT",
|
||||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "47225",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/47225"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:12014",
|
"name": "oval:org.mitre.oval:def:12014",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12014"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12014"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1025345",
|
"name": "mswin-win32k-var13-priv-escalation(66407)",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securitytracker.com/id?1025345"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66407"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "44156",
|
"name": "MS11-034",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MS",
|
||||||
"url" : "http://secunia.com/advisories/44156"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2011-0952",
|
"name": "ADV-2011-0952",
|
||||||
@ -98,9 +78,29 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2011/0952"
|
"url": "http://www.vupen.com/english/advisories/2011/0952"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "mswin-win32k-var13-priv-escalation(66407)",
|
"name": "47225",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66407"
|
"url": "http://www.securityfocus.com/bid/47225"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.avaya.com/css/P8/documents/100133352",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.avaya.com/css/P8/documents/100133352"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "44156",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/44156"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1025345",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1025345"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@symantec.com",
|
||||||
"ID": "CVE-2014-3436",
|
"ID": "CVE-2014-3436",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140821_00",
|
"name": "symantec-encryption-cve20143436-dos(95406)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140821_00"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95406"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "69259",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/69259"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1030761",
|
"name": "1030761",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://www.securitytracker.com/id/1030761"
|
"url": "http://www.securitytracker.com/id/1030761"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "symantec-encryption-cve20143436-dos(95406)",
|
"name": "69259",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95406"
|
"url": "http://www.securityfocus.com/bid/69259"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140821_00",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140821_00"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2014-3558",
|
"ID": "CVE-2014-3558",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -62,6 +62,21 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://hibernate.atlassian.net/browse/HV-912"
|
"url": "https://hibernate.atlassian.net/browse/HV-912"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:0720",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2014:1288",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-1288.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:0125",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-0125.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2014:1285",
|
"name": "RHSA-2014:1285",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
@ -76,21 +91,6 @@
|
|||||||
"name": "RHSA-2014:1287",
|
"name": "RHSA-2014:1287",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-1287.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-1287.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:1288",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1288.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:0125",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0125.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:0720",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0720.html"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://codevigilant.com/disclosure/wp-plugin-ss-downloads-a3-cross-site-scripting-xss",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://codevigilant.com/disclosure/wp-plugin-ss-downloads-a3-cross-site-scripting-xss"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://wordpress.org/plugins/ss-downloads/changelog",
|
"name": "http://wordpress.org/plugins/ss-downloads/changelog",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://wordpress.org/plugins/ss-downloads/changelog"
|
"url": "http://wordpress.org/plugins/ss-downloads/changelog"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://codevigilant.com/disclosure/wp-plugin-ss-downloads-a3-cross-site-scripting-xss",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://codevigilant.com/disclosure/wp-plugin-ss-downloads-a3-cross-site-scripting-xss"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "65141",
|
"name": "65141",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2014-7252",
|
"ID": "CVE-2014-7252",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "JVNDB-2014-000137",
|
||||||
|
"refsource": "JVNDB",
|
||||||
|
"url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000137.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "JVN#67792023",
|
||||||
|
"refsource": "JVN",
|
||||||
|
"url": "http://jvn.jp/en/jp/JVN67792023/index.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://jvn.jp/en/jp/JVN67792023/397327/index.html",
|
"name": "http://jvn.jp/en/jp/JVN67792023/397327/index.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,16 +71,6 @@
|
|||||||
"name": "http://jvn.jp/en/jp/JVN67792023/995312/index.html",
|
"name": "http://jvn.jp/en/jp/JVN67792023/995312/index.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://jvn.jp/en/jp/JVN67792023/995312/index.html"
|
"url": "http://jvn.jp/en/jp/JVN67792023/995312/index.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "JVN#67792023",
|
|
||||||
"refsource" : "JVN",
|
|
||||||
"url" : "http://jvn.jp/en/jp/JVN67792023/index.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "JVNDB-2014-000137",
|
|
||||||
"refsource" : "JVNDB",
|
|
||||||
"url" : "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000137.html"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2014-8007",
|
"ID": "CVE-2014-8007",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -62,15 +62,15 @@
|
|||||||
"refsource": "FREEBSD",
|
"refsource": "FREEBSD",
|
||||||
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A25.setlogin.asc"
|
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A25.setlogin.asc"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "61118",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/61118"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "62218",
|
"name": "62218",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/62218"
|
"url": "http://secunia.com/advisories/62218"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "61118",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/61118"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://support.tapatalk.com/threads/tapatalk-for-woltlab-plugin-release-announcement-and-changelog.19540",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.tapatalk.com/threads/tapatalk-for-woltlab-plugin-release-announcement-and-changelog.19540"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-015/-cross-site-scripting-in-tapatalk-plugin-for-woltlab-burning-board-4-0",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-015/-cross-site-scripting-in-tapatalk-plugin-for-woltlab-burning-board-4-0"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20150112 [RT-SA-2014-015] Cross-site Scripting in Tapatalk Plugin for WoltLab Burning Board 4.0",
|
"name": "20150112 [RT-SA-2014-015] Cross-site Scripting in Tapatalk Plugin for WoltLab Burning Board 4.0",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -62,16 +72,6 @@
|
|||||||
"refsource": "FULLDISC",
|
"refsource": "FULLDISC",
|
||||||
"url": "http://seclists.org/fulldisclosure/2015/Jan/31"
|
"url": "http://seclists.org/fulldisclosure/2015/Jan/31"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-015/-cross-site-scripting-in-tapatalk-plugin-for-woltlab-burning-board-4-0",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-015/-cross-site-scripting-in-tapatalk-plugin-for-woltlab-burning-board-4-0"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.tapatalk.com/threads/tapatalk-for-woltlab-plugin-release-announcement-and-changelog.19540",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.tapatalk.com/threads/tapatalk-for-woltlab-plugin-release-announcement-and-changelog.19540"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "71997",
|
"name": "71997",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2014-8914",
|
"ID": "CVE-2014-8914",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21693239",
|
"name": "62205",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21693239"
|
"url": "http://secunia.com/advisories/62205"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "JR51836",
|
"name": "JR51836",
|
||||||
@ -63,9 +63,14 @@
|
|||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR51836"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR51836"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "JR52103",
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21693239",
|
||||||
"refsource" : "AIXAPAR",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1JR52103"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693239"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ibm-bpm-cve20148914-xss(99285)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99285"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1031614",
|
"name": "1031614",
|
||||||
@ -73,14 +78,9 @@
|
|||||||
"url": "http://www.securitytracker.com/id/1031614"
|
"url": "http://www.securitytracker.com/id/1031614"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "62205",
|
"name": "JR52103",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "AIXAPAR",
|
||||||
"url" : "http://secunia.com/advisories/62205"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR52103"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ibm-bpm-cve20148914-xss(99285)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/99285"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,59 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt",
|
"name": "FEDORA-2015-2347",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151437.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt",
|
"name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt"
|
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:0794",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-0794.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/krb5/krb5/commit/6609658db0799053fbef0d7d0aa2f1fd68ef32d8",
|
"name": "https://github.com/krb5/krb5/commit/6609658db0799053fbef0d7d0aa2f1fd68ef32d8",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/krb5/krb5/commit/6609658db0799053fbef0d7d0aa2f1fd68ef32d8"
|
"url": "https://github.com/krb5/krb5/commit/6609658db0799053fbef0d7d0aa2f1fd68ef32d8"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-3153",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3153"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2015-2382",
|
"name": "FEDORA-2015-2382",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "FEDORA-2015-2347",
|
"name": "DSA-3153",
|
||||||
"refsource" : "FEDORA",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151437.html"
|
"url": "http://www.debian.org/security/2015/dsa-3153"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2015:069",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:069"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:0439",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0439.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:0794",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0794.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:0257",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:0290",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2015:0255",
|
"name": "openSUSE-SU-2015:0255",
|
||||||
@ -113,14 +88,39 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-2498-1",
|
"name": "RHSA-2015:0439",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2498-1"
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-0439.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:0290",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "72494",
|
"name": "72494",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/72494"
|
"url": "http://www.securityfocus.com/bid/72494"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2015:069",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:069"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2498-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2498-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:0257",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "DSA-3188",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2015/dsa-3188"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201503-05",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201503-05"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "72986",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/72986"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2739-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2739-1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://code.google.com/p/google-security-research/issues/detail?id=196",
|
"name": "http://code.google.com/p/google-security-research/issues/detail?id=196",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -62,6 +82,11 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f0292bb9920aa1dbfed5f53861e7c7a89b35833a"
|
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f0292bb9920aa1dbfed5f53861e7c7a89b35833a"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:0627",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://advisories.mageia.org/MGASA-2015-0083.html",
|
"name": "http://advisories.mageia.org/MGASA-2015-0083.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -72,50 +97,25 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-3188",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3188"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2015-2216",
|
"name": "FEDORA-2015-2216",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-2237",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201503-05",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201503-05"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "MDVSA-2015:055",
|
"name": "MDVSA-2015:055",
|
||||||
"refsource": "MANDRIVA",
|
"refsource": "MANDRIVA",
|
||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:0627",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-2510-1",
|
"name": "USN-2510-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2510-1"
|
"url": "http://www.ubuntu.com/usn/USN-2510-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-2739-1",
|
"name": "FEDORA-2015-2237",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2739-1"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "72986",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/72986"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "http://seclists.org/fulldisclosure/2014/Mar/324"
|
"url": "http://seclists.org/fulldisclosure/2014/Mar/324"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.quantumleap.it/vlc-reflected-xss-vulnerability/",
|
"name": "66307",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "http://www.quantumleap.it/vlc-reflected-xss-vulnerability/"
|
"url": "http://www.securityfocus.com/bid/66307"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://git.videolan.org/?p=vlc.git;a=commit;h=fe5063ec5ad1873039ea719eb1f137c8f3bda84b",
|
"name": "http://git.videolan.org/?p=vlc.git;a=commit;h=fe5063ec5ad1873039ea719eb1f137c8f3bda84b",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://git.videolan.org/?p=vlc.git;a=commit;h=fe5063ec5ad1873039ea719eb1f137c8f3bda84b"
|
"url": "http://git.videolan.org/?p=vlc.git;a=commit;h=fe5063ec5ad1873039ea719eb1f137c8f3bda84b"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "66307",
|
"name": "http://www.quantumleap.it/vlc-reflected-xss-vulnerability/",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/66307"
|
"url": "http://www.quantumleap.it/vlc-reflected-xss-vulnerability/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2014-9937",
|
"ID": "CVE-2014-9937",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-2248",
|
"ID": "CVE-2016-2248",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-2619",
|
"ID": "CVE-2016-2619",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-2695",
|
"ID": "CVE-2016-2695",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -53,64 +53,64 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20160724 Re: Fwd: CVE for PHP 5.5.38 issues",
|
"name": "92115",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "http://openwall.com/lists/oss-security/2016/07/24/2"
|
"url": "http://www.securityfocus.com/bid/92115"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://php.net/ChangeLog-5.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://php.net/ChangeLog-5.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://php.net/ChangeLog-7.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://php.net/ChangeLog-7.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugs.php.net/72533",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugs.php.net/72533"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT207170",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT207170"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2016-09-20",
|
"name": "APPLE-SA-2016-09-20",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
|
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-3631",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3631"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201611-22",
|
"name": "GLSA-201611-22",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201611-22"
|
"url": "https://security.gentoo.org/glsa/201611-22"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2750",
|
"name": "RHSA-2016:2750",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "92115",
|
"name": "https://bugs.php.net/72533",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/92115"
|
"url": "https://bugs.php.net/72533"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://php.net/ChangeLog-5.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://php.net/ChangeLog-5.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1036430",
|
"name": "1036430",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1036430"
|
"url": "http://www.securitytracker.com/id/1036430"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3631",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3631"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://php.net/ChangeLog-7.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://php.net/ChangeLog-7.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20160724 Re: Fwd: CVE for PHP 5.5.38 issues",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://openwall.com/lists/oss-security/2016/07/24/2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT207170",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT207170"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,41 +52,41 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "40197",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/40197/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases",
|
"name": "[oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://openwall.com/lists/oss-security/2016/07/28/3"
|
"url": "http://openwall.com/lists/oss-security/2016/07/28/3"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2016-41.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2016-41.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12577",
|
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12577",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12577"
|
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12577"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=94e97e45cf614c7bb8fe90c23df52910246b2c95",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=94e97e45cf614c7bb8fe90c23df52910246b2c95"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-3648",
|
"name": "DSA-3648",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2016/dsa-3648"
|
"url": "http://www.debian.org/security/2016/dsa-3648"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=94e97e45cf614c7bb8fe90c23df52910246b2c95",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=94e97e45cf614c7bb8fe90c23df52910246b2c95"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.wireshark.org/security/wnpa-sec-2016-41.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.wireshark.org/security/wnpa-sec-2016-41.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "92163",
|
"name": "92163",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/92163"
|
"url": "http://www.securityfocus.com/bid/92163"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "40197",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/40197/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1036480",
|
"name": "1036480",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2016-6711",
|
"ID": "CVE-2016-6711",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://android.googlesource.com/platform/external/libvpx/+/063be1485e0099bc81ace3a08b0ec9186dcad693",
|
"name": "94137",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "https://android.googlesource.com/platform/external/libvpx/+/063be1485e0099bc81ace3a08b0ec9186dcad693"
|
"url": "http://www.securityfocus.com/bid/94137"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://source.android.com/security/bulletin/2016-11-01.html",
|
"name": "https://source.android.com/security/bulletin/2016-11-01.html",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://source.android.com/security/bulletin/2016-11-01.html"
|
"url": "https://source.android.com/security/bulletin/2016-11-01.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "94137",
|
"name": "https://android.googlesource.com/platform/external/libvpx/+/063be1485e0099bc81ace3a08b0ec9186dcad693",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/94137"
|
"url": "https://android.googlesource.com/platform/external/libvpx/+/063be1485e0099bc81ace3a08b0ec9186dcad693"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT207422",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT207422"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT207423",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT207423"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://support.apple.com/HT207487",
|
"name": "https://support.apple.com/HT207487",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://support.apple.com/HT207487"
|
"url": "https://support.apple.com/HT207487"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT207422",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT207422"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "94905",
|
"name": "94905",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -76,6 +71,11 @@
|
|||||||
"name": "1037469",
|
"name": "1037469",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1037469"
|
"url": "http://www.securitytracker.com/id/1037469"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT207423",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT207423"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-7679",
|
"ID": "CVE-2016-7679",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user