mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
b985814b22
commit
77191301d1
@ -57,16 +57,16 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-009"
|
||||
},
|
||||
{
|
||||
"name" : "4158",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/4158"
|
||||
},
|
||||
{
|
||||
"name": "763",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/763"
|
||||
},
|
||||
{
|
||||
"name": "4158",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/4158"
|
||||
},
|
||||
{
|
||||
"name": "1003630",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/262213"
|
||||
},
|
||||
{
|
||||
"name" : "ftp://ftp.qualcomm.com/eudora/servers/unix/popper/qpopper4.0.4.tar.gz",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "ftp://ftp.qualcomm.com/eudora/servers/unix/popper/qpopper4.0.4.tar.gz"
|
||||
"name": "4295",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/4295"
|
||||
},
|
||||
{
|
||||
"name": "qpopper-qpopper-dos(8458)",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.iss.net/security_center/static/8458.php"
|
||||
},
|
||||
{
|
||||
"name" : "4295",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/4295"
|
||||
"name": "ftp://ftp.qualcomm.com/eudora/servers/unix/popper/qpopper4.0.4.tar.gz",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "ftp://ftp.qualcomm.com/eudora/servers/unix/popper/qpopper4.0.4.tar.gz"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020413 SunSop: cross-site-scripting bug",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-04/0154.html"
|
||||
"name": "4506",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/4506"
|
||||
},
|
||||
{
|
||||
"name": "sunshop-new-cust-css(8840)",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.iss.net/security_center/static/8840.php"
|
||||
},
|
||||
{
|
||||
"name" : "4506",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/4506"
|
||||
"name": "20020413 SunSop: cross-site-scripting bug",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-04/0154.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020710 [CORE-20020528] Multiple vulnerabilities in ToolTalk Database server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=102635906423617&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20021102-02-P",
|
||||
"refsource": "SGI",
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20021102-02-P"
|
||||
},
|
||||
{
|
||||
"name": "CSSA-2002-SCO.28",
|
||||
"refsource": "CALDERA",
|
||||
"url": "ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28/CSSA-2002-SCO.28.txt"
|
||||
},
|
||||
{
|
||||
"name": "CA-2002-20",
|
||||
"refsource": "CERT",
|
||||
@ -72,11 +72,6 @@
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/975403"
|
||||
},
|
||||
{
|
||||
"name" : "CSSA-2002-SCO.28",
|
||||
"refsource" : "CALDERA",
|
||||
"url" : "ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28/CSSA-2002-SCO.28.txt"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:15",
|
||||
"refsource": "OVAL",
|
||||
@ -87,6 +82,11 @@
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A91"
|
||||
},
|
||||
{
|
||||
"name": "20020710 [CORE-20020528] Multiple vulnerabilities in ToolTalk Database server",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=102635906423617&w=2"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:1099",
|
||||
"refsource": "OVAL",
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "SSRT2362",
|
||||
"refsource" : "COMPAQ",
|
||||
"url" : "http://online.securityfocus.com/advisories/4497"
|
||||
},
|
||||
{
|
||||
"name" : "20020923 [security bulletin] SSRT2362 WEBES Service Tools (HP Tru64 UNIX, HP",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=103280973718587&w=2"
|
||||
},
|
||||
{
|
||||
"name": "webes-unauth-file-access(10167)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/10167.php"
|
||||
},
|
||||
{
|
||||
"name": "SSRT2362",
|
||||
"refsource": "COMPAQ",
|
||||
"url": "http://online.securityfocus.com/advisories/4497"
|
||||
},
|
||||
{
|
||||
"name": "5773",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5773"
|
||||
},
|
||||
{
|
||||
"name": "20020923 [security bulletin] SSRT2362 WEBES Service Tools (HP Tru64 UNIX, HP",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=103280973718587&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20021009 Flood ACK packets cause AIX DoS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=103418410408599&w=2"
|
||||
"name": "aix-tcp-flood-dos(10326)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/10326.php"
|
||||
},
|
||||
{
|
||||
"name": "IY31641",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?rs=0&q=IY31641&uid=isg1IY31641&loc=en_US&cs=utf-8&cc=us&lang=en"
|
||||
},
|
||||
{
|
||||
"name": "20021009 Flood ACK packets cause AIX DoS",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=103418410408599&w=2"
|
||||
},
|
||||
{
|
||||
"name": "VU#102345",
|
||||
"refsource": "CERT-VN",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "5925",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5925"
|
||||
},
|
||||
{
|
||||
"name" : "aix-tcp-flood-dos(10326)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/10326.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mhonarc.org/archive/cgi-bin/mesg.cgi?a=mhonarc-users&i=200212220120.gBM1K8502180@mcguire.earlhood.com",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mhonarc.org/archive/cgi-bin/mesg.cgi?a=mhonarc-users&i=200212220120.gBM1K8502180@mcguire.earlhood.com"
|
||||
"name": "6479",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/6479"
|
||||
},
|
||||
{
|
||||
"name": "DSA-221",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2002/dsa-221"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mhonarc.org/archive/cgi-bin/mesg.cgi?a=mhonarc-users&i=200212220120.gBM1K8502180@mcguire.earlhood.com",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mhonarc.org/archive/cgi-bin/mesg.cgi?a=mhonarc-users&i=200212220120.gBM1K8502180@mcguire.earlhood.com"
|
||||
},
|
||||
{
|
||||
"name": "mhonarc-m2htexthtml-filter-xss(10950)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10950"
|
||||
},
|
||||
{
|
||||
"name" : "6479",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/6479"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml"
|
||||
"name": "cisco-ons-ftp-no-account(10505)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/10505.php"
|
||||
},
|
||||
{
|
||||
"name": "6076",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/6076"
|
||||
},
|
||||
{
|
||||
"name" : "cisco-ons-ftp-no-account(10505)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/10505.php"
|
||||
"name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020603 Security holes in two Teekai's products + security hole in ncmail.netscape.com",
|
||||
"refsource" : "VULN-DEV",
|
||||
"url" : "http://marc.info/?l=vuln-dev&m=102313697923798&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ifrance.com/kitetoua/tuto/Teekai.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.ifrance.com/kitetoua/tuto/Teekai.txt"
|
||||
},
|
||||
{
|
||||
"name": "20020603 Security holes in two Teekai's products + security hole in ncmail.netscape.com",
|
||||
"refsource": "VULN-DEV",
|
||||
"url": "http://marc.info/?l=vuln-dev&m=102313697923798&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2012-0176",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS12-034",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-034"
|
||||
},
|
||||
{
|
||||
"name" : "TA12-129A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA12-129A.html"
|
||||
},
|
||||
{
|
||||
"name" : "53360",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/53360"
|
||||
"name": "49122",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/49122"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:15574",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15574"
|
||||
},
|
||||
{
|
||||
"name": "MS12-034",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-034"
|
||||
},
|
||||
{
|
||||
"name": "1027040",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1027040"
|
||||
},
|
||||
{
|
||||
"name" : "49122",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/49122"
|
||||
"name": "53360",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53360"
|
||||
},
|
||||
{
|
||||
"name": "TA12-129A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA12-129A.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2012-0491",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201308-06",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
||||
},
|
||||
{
|
||||
"name": "USN-1397-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1397-1"
|
||||
},
|
||||
{
|
||||
"name": "mysql-serveruns10-dos(72532)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72532"
|
||||
},
|
||||
{
|
||||
"name": "51518",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/51518"
|
||||
},
|
||||
{
|
||||
"name" : "78389",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/78389"
|
||||
},
|
||||
{
|
||||
"name": "53372",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/53372"
|
||||
},
|
||||
{
|
||||
"name" : "mysql-serveruns10-dos(72532)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72532"
|
||||
"name": "GLSA-201308-06",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
||||
},
|
||||
{
|
||||
"name": "78389",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/78389"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-0803",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-0840",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,35 +58,15 @@
|
||||
"url": "http://mail-archives.apache.org/mod_mbox/apr-commits/201201.mbox/%3C20120115003715.071D423888FD@eris.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"name" : "[dev] 20120105 Hash collision vectors in APR?",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.mail-archive.com/dev%40apr.apache.org/msg24439.html"
|
||||
},
|
||||
{
|
||||
"name" : "[dev] 20120113 Re: Hash collision vectors in APR?",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.mail-archive.com/dev%40apr.apache.org/msg24472.html"
|
||||
},
|
||||
{
|
||||
"name" : "[dev] 20120114 Re: Hash collision vectors in APR?",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.mail-archive.com/dev%40apr.apache.org/msg24473.html"
|
||||
"name": "apacheapr-hash-dos(73096)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73096"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120208 CVE request: apr - Hash DoS vulnerability",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2012/02/08/3"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20120208 Re: CVE request: apr - Hash DoS vulnerability",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2012/02/09/1"
|
||||
},
|
||||
{
|
||||
"name" : "http://svn.apache.org/viewvc?rev=1231605&view=rev",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://svn.apache.org/viewvc?rev=1231605&view=rev"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:019",
|
||||
"refsource": "MANDRIVA",
|
||||
@ -98,9 +78,29 @@
|
||||
"url": "http://secunia.com/advisories/47862"
|
||||
},
|
||||
{
|
||||
"name" : "apacheapr-hash-dos(73096)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73096"
|
||||
"name": "http://svn.apache.org/viewvc?rev=1231605&view=rev",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.apache.org/viewvc?rev=1231605&view=rev"
|
||||
},
|
||||
{
|
||||
"name": "[dev] 20120105 Hash collision vectors in APR?",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.mail-archive.com/dev%40apr.apache.org/msg24439.html"
|
||||
},
|
||||
{
|
||||
"name": "[dev] 20120113 Re: Hash collision vectors in APR?",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.mail-archive.com/dev%40apr.apache.org/msg24472.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120208 Re: CVE request: apr - Hash DoS vulnerability",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2012/02/09/1"
|
||||
},
|
||||
{
|
||||
"name": "[dev] 20120114 Re: Hash collision vectors in APR?",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.mail-archive.com/dev%40apr.apache.org/msg24473.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2012-1327",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,30 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/mac/1162/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/mac/1162/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/unix/1162/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/unix/1162/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/windows/1162/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/windows/1162/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/support/kb/view/1012/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/support/kb/view/1012/"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2012:0610",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html"
|
||||
"name": "http://www.opera.com/docs/changelogs/mac/1162/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/mac/1162/"
|
||||
},
|
||||
{
|
||||
"name": "80622",
|
||||
@ -83,14 +68,29 @@
|
||||
"url": "http://osvdb.org/80622"
|
||||
},
|
||||
{
|
||||
"name" : "48535",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48535"
|
||||
"name": "http://www.opera.com/docs/changelogs/windows/1162/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/windows/1162/"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2012:0610",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/unix/1162/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/unix/1162/"
|
||||
},
|
||||
{
|
||||
"name": "opera-historypushstate-info-disclosure(74351)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74351"
|
||||
},
|
||||
{
|
||||
"name": "48535",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48535"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2012-3690",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5400",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5400"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2012-07-25-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5400",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5400"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/files/112618/WordPress-BulletProof-Security-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/files/112618/WordPress-BulletProof-Security-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://plugins.trac.wordpress.org/changeset?old_path=%2Fbulletproof-security&old=543044&new_path=%2Fbulletproof-security&new=543044",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://plugins.trac.wordpress.org/changeset?old_path=%2Fbulletproof-security&old=543044&new_path=%2Fbulletproof-security&new=543044"
|
||||
},
|
||||
{
|
||||
"name": "http://wordpress.org/extend/plugins/bulletproof-security/changelog/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wordpress.org/extend/plugins/bulletproof-security/changelog/"
|
||||
},
|
||||
{
|
||||
"name": "bulletproofsecurity-admin-xss(75522)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75522"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/files/112618/WordPress-BulletProof-Security-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/files/112618/WordPress-BulletProof-Security-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "53478",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53478"
|
||||
},
|
||||
{
|
||||
"name" : "bulletproofsecurity-admin-xss(75522)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75522"
|
||||
"name": "http://plugins.trac.wordpress.org/changeset?old_path=%2Fbulletproof-security&old=543044&new_path=%2Fbulletproof-security&new=543044",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://plugins.trac.wordpress.org/changeset?old_path=%2Fbulletproof-security&old=543044&new_path=%2Fbulletproof-security&new=543044"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2012-6265",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-2008",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "JVN#42164352",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/en/jp/JVN42164352/index.html"
|
||||
},
|
||||
{
|
||||
"name": "98719",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/98719"
|
||||
},
|
||||
{
|
||||
"name": "JVN#42164352",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN42164352/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "lpardo@redhat.com",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2017-2600",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -65,16 +65,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2600",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2600"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/jenkinsci/jenkins/commit/0f92cd08a19207de2cceb6a2f4e3e9f92fdc0899",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/jenkinsci/jenkins/commit/0f92cd08a19207de2cceb6a2f4e3e9f92fdc0899"
|
||||
},
|
||||
{
|
||||
"name": "https://jenkins.io/security/advisory/2017-02-01/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -84,6 +74,16 @@
|
||||
"name": "95954",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95954"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2600",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2600"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/jenkinsci/jenkins/commit/0f92cd08a19207de2cceb6a2f4e3e9f92fdc0899",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/jenkinsci/jenkins/commit/0f92cd08a19207de2cceb6a2f4e3e9f92fdc0899"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-6212",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://nullku7.github.io/stuff/exposure/dahua/2017/02/24/dahua-nvr.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://nullku7.github.io/stuff/exposure/dahua/2017/02/24/dahua-nvr.html"
|
||||
},
|
||||
{
|
||||
"name": "96449",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96449"
|
||||
},
|
||||
{
|
||||
"name": "https://nullku7.github.io/stuff/exposure/dahua/2017/02/24/dahua-nvr.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://nullku7.github.io/stuff/exposure/dahua/2017/02/24/dahua-nvr.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347"
|
||||
"name": "96571",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96571"
|
||||
},
|
||||
{
|
||||
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=2b3a0909beff8963b390034c594e0b6be6a4e531",
|
||||
@ -67,15 +67,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.wireshark.org/security/wnpa-sec-2017-04.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3811",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3811"
|
||||
},
|
||||
{
|
||||
"name" : "96571",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/96571"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT208112",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT208112"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT208116",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT208116"
|
||||
},
|
||||
{
|
||||
"name": "100991",
|
||||
"refsource": "BID",
|
||||
@ -76,6 +66,16 @@
|
||||
"name": "1039427",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039427"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208112",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT208112"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208116",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT208116"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/devryan/GamePanelX-V3/issues/161",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/devryan/GamePanelX-V3/issues/161"
|
||||
},
|
||||
{
|
||||
"name": "97003",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97003"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/devryan/GamePanelX-V3/issues/161",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/devryan/GamePanelX-V3/issues/161"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://forum.hwbot.org/showpost.php?p=480524",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://forum.hwbot.org/showpost.php?p=480524"
|
||||
},
|
||||
{
|
||||
"name" : "http://forum.hwbot.org/showthread.php?t=167605",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://forum.hwbot.org/showthread.php?t=167605"
|
||||
"name": "97098",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97098"
|
||||
},
|
||||
{
|
||||
"name": "https://news.ycombinator.com/item?id=13924192",
|
||||
"refsource": "MISC",
|
||||
"url": "https://news.ycombinator.com/item?id=13924192"
|
||||
},
|
||||
{
|
||||
"name": "http://forum.hwbot.org/showthread.php?t=167605",
|
||||
"refsource": "MISC",
|
||||
"url": "http://forum.hwbot.org/showthread.php?t=167605"
|
||||
},
|
||||
{
|
||||
"name": "http://forum.hwbot.org/showpost.php?p=480524",
|
||||
"refsource": "MISC",
|
||||
"url": "http://forum.hwbot.org/showpost.php?p=480524"
|
||||
},
|
||||
{
|
||||
"name": "https://www.techpowerup.com/231536/amd-ryzen-machine-crashes-to-a-sequence-of-fma3-instructions",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.techpowerup.com/231536/amd-ryzen-machine-crashes-to-a-sequence-of-fma3-instructions"
|
||||
},
|
||||
{
|
||||
"name" : "97098",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/97098"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://lists.science.uu.nl/pipermail/nix-dev/2017-April/023329.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://lists.science.uu.nl/pipermail/nix-dev/2017-April/023329.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/NixOS/nixpkgs/commit/6c59d851e2967410cc8fb6ba3f374b1d3efa988e",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "https://github.com/NixOS/nixpkgs/commit/fa4fe7110566d8370983fa81f2b04a833339236d",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/NixOS/nixpkgs/commit/fa4fe7110566d8370983fa81f2b04a833339236d"
|
||||
},
|
||||
{
|
||||
"name": "http://lists.science.uu.nl/pipermail/nix-dev/2017-April/023329.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://lists.science.uu.nl/pipermail/nix-dev/2017-April/023329.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "104917",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104917"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.kernel.org/show_bug.cgi?id=199839",
|
||||
"refsource": "MISC",
|
||||
@ -63,9 +68,9 @@
|
||||
"url": "https://patchwork.kernel.org/patch/10503099/"
|
||||
},
|
||||
{
|
||||
"name" : "104917",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/104917"
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,15 +61,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.f5.com/csp/article/K42027747",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.f5.com/csp/article/K42027747"
|
||||
},
|
||||
{
|
||||
"name": "106258",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106258"
|
||||
},
|
||||
{
|
||||
"name": "https://support.f5.com/csp/article/K42027747",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.f5.com/csp/article/K42027747"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-15344",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/roundcube/roundcubemail/issues/6229",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/roundcube/roundcubemail/issues/6229"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/roundcube/roundcubemail/issues/6238",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/roundcube/roundcubemail/issues/6238"
|
||||
},
|
||||
{
|
||||
"name" : "https://medium.com/@ndrbasi/cve-2018-9846-roundcube-303097048b0a",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://medium.com/@ndrbasi/cve-2018-9846-roundcube-303097048b0a"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4181",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4181"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/roundcube/roundcubemail/issues/6229",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/roundcube/roundcubemail/issues/6229"
|
||||
},
|
||||
{
|
||||
"name": "https://medium.com/@ndrbasi/cve-2018-9846-roundcube-303097048b0a",
|
||||
"refsource": "MISC",
|
||||
"url": "https://medium.com/@ndrbasi/cve-2018-9846-roundcube-303097048b0a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user