mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
b45dfea59f
commit
751cb51d70
@ -52,21 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://kiki91.altervista.org/exploit/sBlog_0.72_xss.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://kiki91.altervista.org/exploit/sBlog_0.72_xss.txt"
|
||||
},
|
||||
{
|
||||
"name": "17044",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17044"
|
||||
},
|
||||
{
|
||||
"name": "sblog-username-xss(25111)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25111"
|
||||
},
|
||||
{
|
||||
"name": "http://kiki91.altervista.org/exploit/sBlog_0.72_xss.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://kiki91.altervista.org/exploit/sBlog_0.72_xss.txt"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0883",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0883"
|
||||
},
|
||||
{
|
||||
"name": "19151",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19151"
|
||||
},
|
||||
{
|
||||
"name": "23759",
|
||||
"refsource": "OSVDB",
|
||||
@ -76,16 +86,6 @@
|
||||
"name": "23760",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/23760"
|
||||
},
|
||||
{
|
||||
"name" : "19151",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19151"
|
||||
},
|
||||
{
|
||||
"name" : "sblog-username-xss(25111)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25111"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2006-1186",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS06-013",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013"
|
||||
"name": "VU#959049",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/959049"
|
||||
},
|
||||
{
|
||||
"name": "18957",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18957"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:1589",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1589"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:1446",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1446"
|
||||
},
|
||||
{
|
||||
"name": "1015900",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015900"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:1651",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1651"
|
||||
},
|
||||
{
|
||||
"name": "TA06-101A",
|
||||
@ -63,9 +88,9 @@
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA06-101A.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#959049",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/959049"
|
||||
"name": "MS06-013",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013"
|
||||
},
|
||||
{
|
||||
"name": "17453",
|
||||
@ -78,19 +103,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1318"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:1446",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1446"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:1589",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1589"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:1651",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1651"
|
||||
"name": "ie-com-activex-execute-code(25545)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25545"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:1704",
|
||||
@ -101,21 +116,6 @@
|
||||
"name": "oval:org.mitre.oval:def:791",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A791"
|
||||
},
|
||||
{
|
||||
"name" : "1015900",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015900"
|
||||
},
|
||||
{
|
||||
"name" : "18957",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18957"
|
||||
},
|
||||
{
|
||||
"name" : "ie-com-activex-execute-code(25545)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25545"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1015733",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015733"
|
||||
},
|
||||
{
|
||||
"name": "19171",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19171"
|
||||
},
|
||||
{
|
||||
"name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.03.07.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,16 +76,6 @@
|
||||
"name": "ADV-2006-0870",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0870"
|
||||
},
|
||||
{
|
||||
"name" : "1015733",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015733"
|
||||
},
|
||||
{
|
||||
"name" : "19171",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19171"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974551.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974551.htm"
|
||||
},
|
||||
{
|
||||
"name": "20428",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20428"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3998",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3998"
|
||||
},
|
||||
{
|
||||
"name": "1017025",
|
||||
"refsource": "SECTRACK",
|
||||
@ -81,6 +71,16 @@
|
||||
"name": "novell-bordermanager-unspecified-dos(29447)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29447"
|
||||
},
|
||||
{
|
||||
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974551.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974551.htm"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3998",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3998"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061012 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/448422/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20061017 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
|
||||
"refsource": "VIM",
|
||||
"url": "http://attrition.org/pipermail/vim/2006-October/001085.html"
|
||||
},
|
||||
{
|
||||
"name": "20061012 SecureWorks Research Client Advisory: Multiple Vendor Bluetooth Memory Stack Corruption Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/448422/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.secureworks.com/press/20061011-dell.html",
|
||||
"refsource": "MISC",
|
||||
@ -87,15 +87,15 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22402"
|
||||
},
|
||||
{
|
||||
"name" : "1744",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1744"
|
||||
},
|
||||
{
|
||||
"name": "toshiba-bluetooth-stack-code-execute(29503)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29503"
|
||||
},
|
||||
{
|
||||
"name": "1744",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1744"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061018 {x0n3-h4ck} DEV Web Manager System <= 1.5 XSS Exploit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/449121/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.x0n3-h4ck.org/index.php?name=news&article=139",
|
||||
"refsource": "MISC",
|
||||
@ -72,6 +67,11 @@
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1758"
|
||||
},
|
||||
{
|
||||
"name": "20061018 {x0n3-h4ck} DEV Web Manager System <= 1.5 XSS Exploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/449121/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "dev-index-xss(29659)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,60 +52,60 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061101 Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/450270/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061111 Re: Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/451350/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061031 Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050462.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zion-security.com/text/XSS_Vulnerability_VIRtechs_Netquery.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zion-security.com/text/XSS_Vulnerability_VIRtechs_Netquery.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://virtech.org/tools/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://virtech.org/tools/"
|
||||
},
|
||||
{
|
||||
"name": "20837",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20837"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4512",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4512"
|
||||
},
|
||||
{
|
||||
"name" : "1017147",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1017147"
|
||||
},
|
||||
{
|
||||
"name": "22864",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22864"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4512",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4512"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zion-security.com/text/XSS_Vulnerability_VIRtechs_Netquery.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zion-security.com/text/XSS_Vulnerability_VIRtechs_Netquery.txt"
|
||||
},
|
||||
{
|
||||
"name": "20061111 Re: Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/451350/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1017147",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1017147"
|
||||
},
|
||||
{
|
||||
"name": "1807",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1807"
|
||||
},
|
||||
{
|
||||
"name": "20061031 Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050462.html"
|
||||
},
|
||||
{
|
||||
"name": "netquery-nquser-xss(29927)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29927"
|
||||
},
|
||||
{
|
||||
"name": "http://virtech.org/tools/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://virtech.org/tools/"
|
||||
},
|
||||
{
|
||||
"name": "20061101 Cross Site Scripting (XSS) Vulnerability in Netquery by \"VIRtech\"",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/450270/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2006-5692",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3761",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3761"
|
||||
"name": "mozzers-subsystem-index-code-execution(33739)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33739"
|
||||
},
|
||||
{
|
||||
"name": "23548",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1446"
|
||||
},
|
||||
{
|
||||
"name" : "mozzers-subsystem-index-code-execution(33739)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33739"
|
||||
"name": "3761",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3761"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://moaxb.blogspot.com/2007/05/moaxb-09-barcodewiz-activex-control-20.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://moaxb.blogspot.com/2007/05/moaxb-09-barcodewiz-activex-control-20.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.shinnai.altervista.org/moaxb/20070509/barcodewiz.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.shinnai.altervista.org/moaxb/20070509/barcodewiz.txt"
|
||||
},
|
||||
{
|
||||
"name" : "23891",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23891"
|
||||
"name": "barcodewiz-barcodewiz-bo(34180)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34180"
|
||||
},
|
||||
{
|
||||
"name": "25209",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25209"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1728",
|
||||
@ -78,14 +78,14 @@
|
||||
"url": "http://osvdb.org/35869"
|
||||
},
|
||||
{
|
||||
"name" : "25209",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25209"
|
||||
"name": "http://moaxb.blogspot.com/2007/05/moaxb-09-barcodewiz-activex-control-20.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://moaxb.blogspot.com/2007/05/moaxb-09-barcodewiz-activex-control-20.html"
|
||||
},
|
||||
{
|
||||
"name" : "barcodewiz-barcodewiz-bo(34180)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34180"
|
||||
"name": "23891",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23891"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4637",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4637"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.securityfocus.com/bid/31941/exploit",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.securityfocus.com/bid/31941/exploit"
|
||||
},
|
||||
{
|
||||
"name": "26505",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26505"
|
||||
},
|
||||
{
|
||||
"name" : "31941",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31941"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3962",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3962"
|
||||
},
|
||||
{
|
||||
"name": "bcoos-click-sql-injection(38594)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38594"
|
||||
},
|
||||
{
|
||||
"name": "4637",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4637"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3962",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3962"
|
||||
},
|
||||
{
|
||||
"name": "bcoos-bid-sql-injection(46156)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46156"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securityfocus.com/bid/31941/exploit",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securityfocus.com/bid/31941/exploit"
|
||||
},
|
||||
{
|
||||
"name": "31941",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31941"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,90 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://crypto.stanford.edu/advisories/CVE-2007-6244/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://crypto.stanford.edu/advisories/CVE-2007-6244/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb07-20.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb07-20.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200801-07",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:1126",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-1126.html"
|
||||
},
|
||||
{
|
||||
"name" : "238305",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:069",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA07-355A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-355A.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#758769",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/758769"
|
||||
},
|
||||
{
|
||||
"name" : "26929",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26929"
|
||||
},
|
||||
{
|
||||
"name" : "26949",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26949"
|
||||
},
|
||||
{
|
||||
"name" : "26960",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26960"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10210",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10210"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-4258",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/4258"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-1724",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/1724/references"
|
||||
},
|
||||
{
|
||||
"name" : "1019116",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1019116"
|
||||
},
|
||||
{
|
||||
"name": "28157",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28157"
|
||||
},
|
||||
{
|
||||
"name" : "28161",
|
||||
"name": "30507",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28161"
|
||||
"url": "http://secunia.com/advisories/30507"
|
||||
},
|
||||
{
|
||||
"name": "adobe-navigatetourl-xss(39131)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39131"
|
||||
},
|
||||
{
|
||||
"name": "28570",
|
||||
@ -143,14 +78,49 @@
|
||||
"url": "http://secunia.com/advisories/28570"
|
||||
},
|
||||
{
|
||||
"name" : "28213",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28213"
|
||||
"name": "26960",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26960"
|
||||
},
|
||||
{
|
||||
"name" : "30507",
|
||||
"name": "ADV-2008-1724",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1724/references"
|
||||
},
|
||||
{
|
||||
"name": "TA07-355A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200801-07",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://crypto.stanford.edu/advisories/CVE-2007-6244/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://crypto.stanford.edu/advisories/CVE-2007-6244/"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10210",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10210"
|
||||
},
|
||||
{
|
||||
"name": "26929",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26929"
|
||||
},
|
||||
{
|
||||
"name": "28161",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30507"
|
||||
"url": "http://secunia.com/advisories/28161"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:1126",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html"
|
||||
},
|
||||
{
|
||||
"name": "adobe-asfunction-protocol-xss(39130)",
|
||||
@ -158,9 +128,39 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39130"
|
||||
},
|
||||
{
|
||||
"name" : "adobe-navigatetourl-xss(39131)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39131"
|
||||
"name": "238305",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-4258",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/4258"
|
||||
},
|
||||
{
|
||||
"name": "1019116",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1019116"
|
||||
},
|
||||
{
|
||||
"name": "26949",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26949"
|
||||
},
|
||||
{
|
||||
"name": "VU#758769",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/758769"
|
||||
},
|
||||
{
|
||||
"name": "28213",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28213"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb07-20.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071204 PR07-39: Multiple vulnerabilities on Absolute News Manager.NET 5.1 including file retrieval and SQL injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/484560/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.procheckup.com/Vulnerability_PR07-39.php",
|
||||
"refsource": "MISC",
|
||||
@ -72,6 +67,11 @@
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3421"
|
||||
},
|
||||
{
|
||||
"name": "20071204 PR07-39: Multiple vulnerabilities on Absolute News Manager.NET 5.1 including file retrieval and SQL injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/484560/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "absolutenewsmanager-getpath-info-disclosure(38874)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
|
||||
},
|
||||
{
|
||||
"name" : "JVN#44736880",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/jp/JVN%2344736880/index.html"
|
||||
"name": "ADV-2007-4312",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/4312"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2007-000822",
|
||||
@ -73,9 +68,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/27017"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-4312",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/4312"
|
||||
"name": "winace-uue-bo(39268)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
|
||||
},
|
||||
{
|
||||
"name": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
|
||||
},
|
||||
{
|
||||
"name": "JVN#44736880",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/jp/JVN%2344736880/index.html"
|
||||
},
|
||||
{
|
||||
"name": "40267",
|
||||
@ -86,11 +91,6 @@
|
||||
"name": "28215",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28215"
|
||||
},
|
||||
{
|
||||
"name" : "winace-uue-bo(39268)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2010-0117",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://secunia.com/secunia_research/2010-5/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secunia.com/secunia_research/2010-5/"
|
||||
},
|
||||
{
|
||||
"name" : "http://service.real.com/realplayer/security/08262010_player/en/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://service.real.com/realplayer/security/08262010_player/en/"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:7169",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7169"
|
||||
},
|
||||
{
|
||||
"name" : "1024370",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1024370"
|
||||
"name": "ADV-2010-2216",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/2216"
|
||||
},
|
||||
{
|
||||
"name": "41096",
|
||||
@ -78,19 +63,34 @@
|
||||
"url": "http://secunia.com/advisories/41096"
|
||||
},
|
||||
{
|
||||
"name" : "41154",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/41154"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-2216",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/2216"
|
||||
"name": "http://service.real.com/realplayer/security/08262010_player/en/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://service.real.com/realplayer/security/08262010_player/en/"
|
||||
},
|
||||
{
|
||||
"name": "realplayer-yuv420-code-execution(61421)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61421"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2010-5/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2010-5/"
|
||||
},
|
||||
{
|
||||
"name": "1024370",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1024370"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:7169",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7169"
|
||||
},
|
||||
{
|
||||
"name": "41154",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41154"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-0309",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,39 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[kvm] 20100129 KVM: PIT: control word is write-only",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.mail-archive.com/kvm@vger.kernel.org/msg28002.html"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100202 CVE request - kvm: cat /dev/port in the guest can cause host DoS",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2010/02/02/1"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100202 Re: CVE request - kvm: cat /dev/port in the guest can cause host DoS",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2010/02/02/4"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=560887",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=560887"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1996",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2010/dsa-1996"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2010:0088",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://rhn.redhat.com/errata/RHSA-2010-0088.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2010:0095",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
|
||||
"name": "38158",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38158"
|
||||
},
|
||||
{
|
||||
"name": "USN-914-1",
|
||||
@ -93,19 +63,14 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-914-1"
|
||||
},
|
||||
{
|
||||
"name" : "38158",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/38158"
|
||||
"name": "ADV-2010-0638",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0638"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11095",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11095"
|
||||
},
|
||||
{
|
||||
"name" : "38492",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/38492"
|
||||
"name": "RHSA-2010:0088",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://rhn.redhat.com/errata/RHSA-2010-0088.html"
|
||||
},
|
||||
{
|
||||
"name": "38922",
|
||||
@ -113,9 +78,44 @@
|
||||
"url": "http://secunia.com/advisories/38922"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-0638",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/0638"
|
||||
"name": "[oss-security] 20100202 Re: CVE request - kvm: cat /dev/port in the guest can cause host DoS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/02/02/4"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1996",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2010/dsa-1996"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11095",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11095"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=560887",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=560887"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100202 CVE request - kvm: cat /dev/port in the guest can cause host DoS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/02/02/1"
|
||||
},
|
||||
{
|
||||
"name": "[kvm] 20100129 KVM: PIT: control word is write-only",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.mail-archive.com/kvm@vger.kernel.org/msg28002.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2010:0095",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
|
||||
},
|
||||
{
|
||||
"name": "38492",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38492"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-0745",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,55 +52,55 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[dovecot-news] 20100308 v1.2.11 released",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://dovecot.org/list/dovecot-news/2010-March/000152.html"
|
||||
},
|
||||
{
|
||||
"name" : "[dovecot] 20100227 Possible CPU Denial-Of-Service attack to dovecot IMAP.",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://dovecot.org/pipermail/dovecot/2010-February/047190.html"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100310 CVE Request -- Dovecot v1.2.11 -- DoS (excessive CPU use) by processing email with huge header",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2010/03/10/6"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100401 Re: CVE Request -- Dovecot v1.2.11 -- DoS (excessive CPU use) by processing email with huge header",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=127013715227551&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://security-tracker.debian.org/tracker/CVE-2010-0745",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://security-tracker.debian.org/tracker/CVE-2010-0745"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=572268",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=572268"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2010:104",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:104"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2010:011",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1107",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1107"
|
||||
},
|
||||
{
|
||||
"name": "[dovecot] 20100227 Possible CPU Denial-Of-Service attack to dovecot IMAP.",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://dovecot.org/pipermail/dovecot/2010-February/047190.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2010:011",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2010:104",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:104"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=572268",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=572268"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1226",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1226"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100310 CVE Request -- Dovecot v1.2.11 -- DoS (excessive CPU use) by processing email with huge header",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/03/10/6"
|
||||
},
|
||||
{
|
||||
"name": "[dovecot-news] 20100308 v1.2.11 released",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://dovecot.org/list/dovecot-news/2010-March/000152.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100401 Re: CVE Request -- Dovecot v1.2.11 -- DoS (excessive CPU use) by processing email with huge header",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=127013715227551&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2010-0862",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html"
|
||||
},
|
||||
{
|
||||
"name": "TA10-103B",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA10-103B.html"
|
||||
},
|
||||
{
|
||||
"name" : "39444",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/39444"
|
||||
"name": "oipsr-rmo-unspecifed(57742)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57742"
|
||||
},
|
||||
{
|
||||
"name": "1023872",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://www.securitytracker.com/id?1023872"
|
||||
},
|
||||
{
|
||||
"name" : "oipsr-rmo-unspecifed(57742)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57742"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html"
|
||||
},
|
||||
{
|
||||
"name": "39444",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/39444"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt"
|
||||
"name": "38247",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38247"
|
||||
},
|
||||
{
|
||||
"name": "61845",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/61845"
|
||||
},
|
||||
{
|
||||
"name" : "38247",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/38247"
|
||||
},
|
||||
{
|
||||
"name": "lookmermusicportal-mdb-info-disclosure(55751)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55751"
|
||||
},
|
||||
{
|
||||
"name": "http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.packetstormsecurity.com/1001-exploits/lookmer-disclose.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ipa.go.jp/about/press/20100517_2.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.ipa.go.jp/about/press/20100517_2.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.nec.co.jp/security-info/secinfo/nv10-005.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.nec.co.jp/security-info/secinfo/nv10-005.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVN#82749282",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/en/jp/JVN82749282/index.html"
|
||||
"name": "40190",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/40190"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ipa.go.jp/about/press/20100517_2.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.ipa.go.jp/about/press/20100517_2.html"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2010-000020",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000020.html"
|
||||
},
|
||||
{
|
||||
"name" : "40190",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/40190"
|
||||
"name": "ADV-2010-1166",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1166"
|
||||
},
|
||||
{
|
||||
"name": "64701",
|
||||
@ -88,9 +88,9 @@
|
||||
"url": "http://secunia.com/advisories/39800"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-1166",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/1166"
|
||||
"name": "JVN#82749282",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN82749282/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-266",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-266"
|
||||
},
|
||||
{
|
||||
"name" : "http://service.real.com/realplayer/security/12102010_player/en/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://service.real.com/realplayer/security/12102010_player/en/"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2010:0981",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0981.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-266",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-266"
|
||||
},
|
||||
{
|
||||
"name": "1024861",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1024861"
|
||||
},
|
||||
{
|
||||
"name": "http://service.real.com/realplayer/security/12102010_player/en/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://service.real.com/realplayer/security/12102010_player/en/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21454745",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21454745"
|
||||
"name": "1024901",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1024901"
|
||||
},
|
||||
{
|
||||
"name": "IC66686",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC66686"
|
||||
},
|
||||
{
|
||||
"name" : "1024901",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1024901"
|
||||
"name": "ADV-2010-3251",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/3251"
|
||||
},
|
||||
{
|
||||
"name": "42639",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://secunia.com/advisories/42639"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-3251",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/3251"
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg21454745",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg21454745"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "15220",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/15220"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt"
|
||||
},
|
||||
{
|
||||
"name" : "43886",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/43886"
|
||||
},
|
||||
{
|
||||
"name" : "41763",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/41763"
|
||||
"name": "flex-timesheet-username-sql-injection(62374)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62374"
|
||||
},
|
||||
{
|
||||
"name": "8222",
|
||||
@ -78,9 +63,24 @@
|
||||
"url": "http://securityreason.com/securityalert/8222"
|
||||
},
|
||||
{
|
||||
"name" : "flex-timesheet-username-sql-injection(62374)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62374"
|
||||
"name": "41763",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41763"
|
||||
},
|
||||
{
|
||||
"name": "15220",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/15220"
|
||||
},
|
||||
{
|
||||
"name": "43886",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/43886"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/1010-exploits/flextimesheet-sql.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4"
|
||||
},
|
||||
{
|
||||
"name": "http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "https://twitter.com/digitalbond/status/619250429751222277",
|
||||
"refsource": "MISC",
|
||||
"url": "https://twitter.com/digitalbond/status/619250429751222277"
|
||||
},
|
||||
{
|
||||
"name" : "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://apps.gehealthcare.com/servlet/ClientServlet/MR360+operator+manual+paper.pdf?REQ=RAA&DIRECTION=5339461-1EN&FILENAME=MR360%2Boperator%2Bmanual%2Bpaper.pdf&FILEREV=4&DOCREV_ORG=4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2014-0422",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,64 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
||||
"name": "56432",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/56432"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1051528",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1051528"
|
||||
"name": "RHSA-2014:0414",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0136",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0136.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0174",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html"
|
||||
},
|
||||
{
|
||||
"name": "SSRT101455",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0135",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0135.html"
|
||||
},
|
||||
{
|
||||
"name": "56535",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/56535"
|
||||
},
|
||||
{
|
||||
"name": "USN-2089-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2089-1"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0030",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0097",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0097.html"
|
||||
},
|
||||
{
|
||||
"name": "56485",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/56485"
|
||||
},
|
||||
{
|
||||
"name": "SSRT101454",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777",
|
||||
@ -72,140 +122,90 @@
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02973",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101454",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101455",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0026",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0026.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0027",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0027.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0097",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0097.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0136",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0136.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0030",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0134",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0134.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0135",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0135.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0414",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2014:0414"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0174",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:0246",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:0266",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0177",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0180",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:0451",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2089-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2089-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2124-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2124-1"
|
||||
},
|
||||
{
|
||||
"name" : "64758",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/64758"
|
||||
},
|
||||
{
|
||||
"name" : "64921",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/64921"
|
||||
},
|
||||
{
|
||||
"name" : "101997",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/101997"
|
||||
},
|
||||
{
|
||||
"name" : "1029608",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1029608"
|
||||
},
|
||||
{
|
||||
"name" : "56432",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/56432"
|
||||
},
|
||||
{
|
||||
"name" : "56485",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/56485"
|
||||
},
|
||||
{
|
||||
"name": "56486",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/56486"
|
||||
},
|
||||
{
|
||||
"name" : "56535",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/56535"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1051528",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051528"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0451",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02973",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
|
||||
},
|
||||
{
|
||||
"name": "1029608",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029608"
|
||||
},
|
||||
{
|
||||
"name": "64921",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/64921"
|
||||
},
|
||||
{
|
||||
"name": "USN-2124-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2124-1"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0266",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0026",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0026.html"
|
||||
},
|
||||
{
|
||||
"name": "64758",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/64758"
|
||||
},
|
||||
{
|
||||
"name": "101997",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/101997"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0246",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0134",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0134.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0180",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0177",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2014-0469",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "67090",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/67090"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2921",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2921"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140428 CVE-2014-0469: xbuffy stack-based buffer overflow in subject processing",
|
||||
"refsource": "MLIST",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "http://packages.qa.debian.org/x/xbuffy/news/20140427T181904Z.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://packages.qa.debian.org/x/xbuffy/news/20140427T181904Z.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2921",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2921"
|
||||
},
|
||||
{
|
||||
"name" : "67090",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/67090"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2014-1335",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT6254",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT6254"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/kb/HT6537",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT6537"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2014-05-21-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2014-06-30-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-06-30-4",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT6254",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT6254"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-06-30-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
|
||||
},
|
||||
{
|
||||
"name": "67553",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/67553"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-05-21-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20140213 Wordpress plugin Buddypress <= 1.9.1 stored xss vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/531049/100/0/threaded"
|
||||
"name": "65555",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/65555"
|
||||
},
|
||||
{
|
||||
"name": "buddypress-cve20141888-xss(91175)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91175"
|
||||
},
|
||||
{
|
||||
"name": "56950",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/56950"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/125212/WordPress-Buddypress-1.9.1-Cross-Site-Scripting.html",
|
||||
@ -68,24 +78,14 @@
|
||||
"url": "http://buddypress.org/2014/02/buddypress-1-9-2"
|
||||
},
|
||||
{
|
||||
"name" : "65555",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/65555"
|
||||
"name": "20140213 Wordpress plugin Buddypress <= 1.9.1 stored xss vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/531049/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "103307",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/103307"
|
||||
},
|
||||
{
|
||||
"name" : "56950",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/56950"
|
||||
},
|
||||
{
|
||||
"name" : "buddypress-cve20141888-xss(91175)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/91175"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://jvn.jp/vu/JVNVU97441356/index.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://jvn.jp/vu/JVNVU97441356/index.html"
|
||||
"name": "VU#566894",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/566894"
|
||||
},
|
||||
{
|
||||
"name": "102814",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/102814"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details",
|
||||
@ -63,20 +68,15 @@
|
||||
"url": "http://www.vspublic.com/help/Cyber%20Recruiter/default.aspx?pageid=release_details"
|
||||
},
|
||||
{
|
||||
"name" : "VU#566894",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/566894"
|
||||
"name": "http://jvn.jp/vu/JVNVU97441356/index.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://jvn.jp/vu/JVNVU97441356/index.html"
|
||||
},
|
||||
{
|
||||
"name": "65305",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/65305"
|
||||
},
|
||||
{
|
||||
"name" : "102814",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/102814"
|
||||
},
|
||||
{
|
||||
"name": "102815",
|
||||
"refsource": "OSVDB",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2014-4235",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
||||
},
|
||||
{
|
||||
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
||||
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
|
||||
},
|
||||
{
|
||||
"name": "68647",
|
||||
|
@ -57,16 +57,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/"
|
||||
},
|
||||
{
|
||||
"name" : "http://helpx.adobe.com/security/products/flash-player/apsb14-17.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://helpx.adobe.com/security/products/flash-player/apsb14-17.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201407-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201407-02.xml"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0860",
|
||||
"refsource": "REDHAT",
|
||||
@ -77,6 +67,11 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/68457"
|
||||
},
|
||||
{
|
||||
"name": "59774",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59774"
|
||||
},
|
||||
{
|
||||
"name": "1030533",
|
||||
"refsource": "SECTRACK",
|
||||
@ -88,9 +83,14 @@
|
||||
"url": "http://secunia.com/advisories/59837"
|
||||
},
|
||||
{
|
||||
"name" : "59774",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59774"
|
||||
"name": "GLSA-201407-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201407-02.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://helpx.adobe.com/security/products/flash-player/apsb14-17.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-17.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-3850",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-3890",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "92851",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92851"
|
||||
},
|
||||
{
|
||||
"name": "http://source.android.com/security/bulletin/2016-09-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://source.android.com/security/bulletin/2016-09-01.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://android.googlesource.com/platform/system/core/+/014b01706cc64dc9c2ad94a96f62e07c058d0b5d",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://android.googlesource.com/platform/system/core/+/014b01706cc64dc9c2ad94a96f62e07c058d0b5d"
|
||||
},
|
||||
{
|
||||
"name": "https://android.googlesource.com/platform/system/core/+/268068f25673242d1d5130d96202d3288c91b700",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform/system/core/+/268068f25673242d1d5130d96202d3288c91b700"
|
||||
},
|
||||
{
|
||||
"name" : "92851",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/92851"
|
||||
},
|
||||
{
|
||||
"name": "1036763",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036763"
|
||||
},
|
||||
{
|
||||
"name": "https://android.googlesource.com/platform/system/core/+/014b01706cc64dc9c2ad94a96f62e07c058d0b5d",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform/system/core/+/014b01706cc64dc9c2ad94a96f62e07c058d0b5d"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1037252",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037252"
|
||||
},
|
||||
{
|
||||
"name": "MS16-134",
|
||||
"refsource": "MS",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "94015",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94015"
|
||||
},
|
||||
{
|
||||
"name" : "1037252",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1037252"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "GLSA-201702-23",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201702-23"
|
||||
},
|
||||
{
|
||||
"name": "92974",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92974"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160915 Re: CVE request for Dropbear SSH <2016.74",
|
||||
"refsource": "MLIST",
|
||||
@ -66,16 +76,6 @@
|
||||
"name": "https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201702-23",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201702-23"
|
||||
},
|
||||
{
|
||||
"name" : "92974",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/92974"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,25 +53,25 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913"
|
||||
"name": "JVN#96681653",
|
||||
"refsource": "JVN",
|
||||
"url": "https://jvn.jp/en/jp/JVN96681653/index.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.wireshark.org/news/20161214.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.wireshark.org/news/20161214.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913"
|
||||
},
|
||||
{
|
||||
"name": "JVN#90813656",
|
||||
"refsource": "JVN",
|
||||
"url": "https://jvn.jp/en/jp/JVN90813656/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVN#96681653",
|
||||
"refsource" : "JVN",
|
||||
"url" : "https://jvn.jp/en/jp/JVN96681653/index.html"
|
||||
},
|
||||
{
|
||||
"name": "95099",
|
||||
"refsource": "BID",
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-624",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-624"
|
||||
},
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201701-17",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201701-17"
|
||||
"name": "SUSE-SU-2016:3148",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
|
||||
},
|
||||
{
|
||||
"name": "MS16-154",
|
||||
@ -73,29 +63,39 @@
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2947",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:3148",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:3160",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-624",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-624"
|
||||
},
|
||||
{
|
||||
"name": "94871",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94871"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-17",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-17"
|
||||
},
|
||||
{
|
||||
"name": "1037442",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037442"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2947",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:3160",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-8267",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-8415",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20161104 Re: CVE request: XXE in perl Image:nfo and XML:wig",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/11/04/2"
|
||||
},
|
||||
{
|
||||
"name": "94219",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94219"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20161104 Re: CVE request: XXE in perl Image:nfo and XML:wig",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/11/04/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.phpmyadmin.net/security/PMASA-2016-70"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201701-32",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201701-32"
|
||||
},
|
||||
{
|
||||
"name": "94531",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94531"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-32",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-32"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
||||
},
|
||||
{
|
||||
"name": "106579",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106579"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user