mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
791e172033
commit
77d4239c0f
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20010409 talkback.cgi vulnerability may allow users to read any file",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0128.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "2547",
|
"name": "2547",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/2547"
|
"url": "http://www.securityfocus.com/bid/2547"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20010409 talkback.cgi vulnerability may allow users to read any file",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0128.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20010630 php breaks safe mode",
|
"name": "RHSA-2003:159",
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://online.securityfocus.com/archive/1/194425"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2002:102",
|
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2002-102.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-159.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2002:129",
|
"name": "RHSA-2002:129",
|
||||||
@ -73,9 +63,9 @@
|
|||||||
"url": "http://www.redhat.com/support/errata/RHSA-2002-129.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2002-129.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2003:159",
|
"name": "php-safemode-elevate-privileges(6787)",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "XF",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2003-159.html"
|
"url": "http://www.iss.net/security_center/static/6787.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "2954",
|
"name": "2954",
|
||||||
@ -83,9 +73,19 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/2954"
|
"url": "http://www.securityfocus.com/bid/2954"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "php-safemode-elevate-privileges(6787)",
|
"name": "20010630 php breaks safe mode",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.iss.net/security_center/static/6787.php"
|
"url": "http://online.securityfocus.com/archive/1/194425"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2002:102",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2002-102.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20010405 Trustix Security Advisory #2001-0003 - kernel",
|
"name": "RHSA-2001:047",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=98653252326445&w=2"
|
"url": "http://www.redhat.com/support/errata/RHSA-2001-047.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20010409 PROGENY-SA-2001-01: execve()/ptrace() exploit in Linux kernels",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=98684172109474&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.linux.org.uk/VERSION/relnotes.2219.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.linux.org.uk/VERSION/relnotes.2219.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "IMNX-2001-70-010-01",
|
|
||||||
"refsource" : "IMMUNIX",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=98575345009963&w=2"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "CSSA-2001-012.0",
|
"name": "CSSA-2001-012.0",
|
||||||
@ -78,9 +63,9 @@
|
|||||||
"url": "http://marc.info/?l=bugtraq&m=98637996127004&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=98637996127004&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "MDKSA-2001:037",
|
"name": "http://www.linux.org.uk/VERSION/relnotes.2219.html",
|
||||||
"refsource" : "MANDRAKE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=98759029811377&w=2"
|
"url": "http://www.linux.org.uk/VERSION/relnotes.2219.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-047",
|
"name": "DSA-047",
|
||||||
@ -88,9 +73,19 @@
|
|||||||
"url": "https://www.debian.org/security/2001/dsa-047"
|
"url": "https://www.debian.org/security/2001/dsa-047"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SuSE-SA:2001:018",
|
"name": "MDKSA-2001:037",
|
||||||
"refsource" : "SUSE",
|
"refsource": "MANDRAKE",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=99013830726309&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=98759029811377&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20010409 PROGENY-SA-2001-01: execve()/ptrace() exploit in Linux kernels",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=98684172109474&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "IMNX-2001-70-010-01",
|
||||||
|
"refsource": "IMMUNIX",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=98575345009963&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "CLA-2001:394",
|
"name": "CLA-2001:394",
|
||||||
@ -98,9 +93,14 @@
|
|||||||
"url": "http://marc.info/?l=bugtraq&m=98775114228203&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=98775114228203&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2001:047",
|
"name": "20010405 Trustix Security Advisory #2001-0003 - kernel",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2001-047.html"
|
"url": "http://marc.info/?l=bugtraq&m=98653252326445&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SuSE-SA:2001:018",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=99013830726309&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20011020 gm4 format strings on OSX",
|
"name": "http://lists.apple.com/mhonarc/security-announce/msg00038.html",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=100368233714229&w=2"
|
"url": "http://lists.apple.com/mhonarc/security-announce/msg00038.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#147587",
|
"name": "VU#147587",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/147587"
|
"url": "http://www.kb.cert.org/vuls/id/147587"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://lists.apple.com/mhonarc/security-announce/msg00038.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://lists.apple.com/mhonarc/security-announce/msg00038.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "macos-gm4-utility-bo(10174)",
|
"name": "macos-gm4-utility-bo(10174)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "http://www.iss.net/security_center/static/10174.php"
|
"url": "http://www.iss.net/security_center/static/10174.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20011020 gm4 format strings on OSX",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=100368233714229&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,20 +53,20 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://pridels0.blogspot.com/2006/06/my-photo-scrapbook-vuln.html",
|
"name": "myphoto-display-xss(27085)",
|
||||||
"refsource" : "MISC",
|
"refsource": "XF",
|
||||||
"url" : "http://pridels0.blogspot.com/2006/06/my-photo-scrapbook-vuln.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27085"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18418",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/18418"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-2244",
|
"name": "ADV-2006-2244",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/2244"
|
"url": "http://www.vupen.com/english/advisories/2006/2244"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://pridels0.blogspot.com/2006/06/my-photo-scrapbook-vuln.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://pridels0.blogspot.com/2006/06/my-photo-scrapbook-vuln.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "26280",
|
"name": "26280",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -78,9 +78,9 @@
|
|||||||
"url": "http://secunia.com/advisories/20554"
|
"url": "http://secunia.com/advisories/20554"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "myphoto-display-xss(27085)",
|
"name": "18418",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27085"
|
"url": "http://www.securityfocus.com/bid/18418"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "29538",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29538"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1206434746.ff.php&page=last",
|
"name": "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1206434746.ff.php&page=last",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -62,20 +67,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.shinnai.altervista.org/xplits/TXT_lyyELAFI8pOPu2p7N6cq.html"
|
"url": "http://www.shinnai.altervista.org/xplits/TXT_lyyELAFI8pOPu2p7N6cq.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "28442",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/28442"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29538",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29538"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "leadtools-multimedia-file-overwrite(41467)",
|
"name": "leadtools-multimedia-file-overwrite(41467)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41467"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41467"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "28442",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/28442"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "7234",
|
"name": "4668",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "SREASON",
|
||||||
"url" : "https://www.exploit-db.com/exploits/7234"
|
"url": "http://securityreason.com/securityalert/4668"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "32477",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/32477"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "50309",
|
"name": "50309",
|
||||||
@ -73,14 +68,19 @@
|
|||||||
"url": "http://secunia.com/advisories/32808"
|
"url": "http://secunia.com/advisories/32808"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "4668",
|
"name": "32477",
|
||||||
"refsource" : "SREASON",
|
"refsource": "BID",
|
||||||
"url" : "http://securityreason.com/securityalert/4668"
|
"url": "http://www.securityfocus.com/bid/32477"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "videogirls-viewsnaps-sql-injection(46872)",
|
"name": "videogirls-viewsnaps-sql-injection(46872)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46872"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46872"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "7234",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/7234"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,210 +52,210 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-484.htm",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-484.htm"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid=",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid="
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200911-02",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-200911-02.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBUX02411",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=123678756409861&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT080111",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=123678756409861&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBMA02486",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=126583436323697&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "SSRT090049",
|
"name": "SSRT090049",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=126583436323697&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=126583436323697&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2008:1018",
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-484.htm",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2008-1018.html"
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-484.htm"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:1025",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2008-1025.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2009:0015",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0015.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2009:0016",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0016.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2009:0445",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0445.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2009:0466",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://rhn.redhat.com/errata/RHSA-2009-0466.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "244986",
|
|
||||||
"refsource" : "SUNALERT",
|
|
||||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-244986-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SA:2009:007",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00009.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2009:006",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SA:2009:018",
|
"name": "SUSE-SA:2009:018",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00004.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00004.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2009:010",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA08-340A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-340A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "32608",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/32608"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:6596",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6596"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1021316",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1021316"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34233",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/34233"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "34259",
|
"name": "34259",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/34259"
|
"url": "http://secunia.com/advisories/34259"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "34605",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/34605"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34889",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/34889"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "35065",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/35065"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34972",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/34972"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "37386",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/37386"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "38539",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/38539"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-3339",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/3339"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "32991",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/32991"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33015",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/33015"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33710",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/33710"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33709",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/33709"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33187",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/33187"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33528",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/33528"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-0672",
|
"name": "ADV-2009-0672",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2009/0672"
|
"url": "http://www.vupen.com/english/advisories/2009/0672"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:1018",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2008-1018.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33015",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/33015"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34889",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/34889"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34233",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/34233"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-200911-02",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "244986",
|
||||||
|
"refsource": "SUNALERT",
|
||||||
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-244986-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SA:2009:007",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00009.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT080111",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=123678756409861&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "38539",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/38539"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:6596",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6596"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34972",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/34972"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2009:0466",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://rhn.redhat.com/errata/RHSA-2009-0466.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2009:006",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "35065",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/35065"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33528",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/33528"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1021316",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1021316"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:1025",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2008-1025.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBMA02486",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=126583436323697&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-3339",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/3339"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBUX02411",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=123678756409861&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "jre-guessable-file-unauth-access(47045)",
|
"name": "jre-guessable-file-unauth-access(47045)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47045"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47045"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2009:0445",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2009-0445.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2009:0016",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2009-0016.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA08-340A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA08-340A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33709",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/33709"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid=",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid="
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34605",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/34605"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2009:010",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2009:0015",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2009-0015.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33187",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/33187"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "32991",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/32991"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "32608",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/32608"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "37386",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/37386"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33710",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/33710"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20081208 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass",
|
"name": "multiple-antivirus-mzheader-code-execution(47435)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/498995/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47435"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20081209 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass -Update-",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/499043/100/0/threaded"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "4723",
|
"name": "4723",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://securityreason.com/securityalert/4723"
|
"url": "http://securityreason.com/securityalert/4723"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "multiple-antivirus-mzheader-code-execution(47435)",
|
"name": "20081209 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass -Update-",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47435"
|
"url": "http://www.securityfocus.com/archive/1/499043/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20081208 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/498995/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2011-2058",
|
"ID": "CVE-2011-2058",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-2929",
|
"ID": "CVE-2011-2929",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,6 +57,16 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
|
"url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2011-11386",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
|
"name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -67,26 +77,31 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
|
"url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2011-11572",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
|
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
|
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
|
"name": "[rubyonrails-security] 20110816 Filter Skipping Vulnerability in Ruby on Rails 3.0",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2011/08/22/13"
|
"url": "http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
|
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
|
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "[rubyonrails-security] 20110816 Filter Skipping Vulnerability in Ruby on Rails 3.0",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6",
|
"name": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -96,21 +111,6 @@
|
|||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=731432",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=731432",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731432"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731432"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2011-11386",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2011-11572",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2011-3246",
|
"ID": "CVE-2011-3246",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,21 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT4999",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT4999"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT5002",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT5002"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT5052",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT5052"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT5130",
|
"name": "http://support.apple.com/kb/HT5130",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -78,9 +63,9 @@
|
|||||||
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
|
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2011-10-12-3",
|
"name": "APPLE-SA-2012-02-01-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
|
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2011-11-10-1",
|
"name": "APPLE-SA-2011-11-10-1",
|
||||||
@ -88,24 +73,39 @@
|
|||||||
"url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html"
|
"url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2012-02-01-1",
|
"name": "APPLE-SA-2011-10-12-3",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
|
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT5052",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT5052"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT4999",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT4999"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "50115",
|
"name": "50115",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/50115"
|
"url": "http://www.securityfocus.com/bid/50115"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "50085",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/50085"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "appleios-http-sec-bypass(70551)",
|
"name": "appleios-http-sec-bypass(70551)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70551"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70551"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT5002",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT5002"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "50085",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/50085"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-3601",
|
"ID": "CVE-2011-3601",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-0584",
|
"ID": "CVE-2013-0584",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2013-0847",
|
"ID": "CVE-2013-0847",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=10416a4d56fa8a89784e4fb62099c3cab17a9952",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=10416a4d56fa8a89784e4fb62099c3cab17a9952"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.ffmpeg.org/security.html",
|
"name": "http://www.ffmpeg.org/security.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.ffmpeg.org/security.html"
|
"url": "http://www.ffmpeg.org/security.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=10416a4d56fa8a89784e4fb62099c3cab17a9952",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=10416a4d56fa8a89784e4fb62099c3cab17a9952"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2013-0895",
|
"ID": "CVE-2013-0895",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://googlechromereleases.blogspot.com/2013/02/stable-channel-update_21.html"
|
"url": "http://googlechromereleases.blogspot.com/2013/02/stable-channel-update_21.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=167840",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=167840"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:0454",
|
"name": "openSUSE-SU-2013:0454",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00045.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00045.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=167840",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=167840"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2013-0917",
|
"ID": "CVE-2013-0917",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_26.html"
|
"url": "http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_26.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=180909",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=180909"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:15892",
|
"name": "oval:org.mitre.oval:def:15892",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15892"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15892"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=180909",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=180909"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2013-1040",
|
"ID": "CVE-2013-1040",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,26 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT5934",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT5934"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT6001",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT6001"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2013-09-18-2",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2013-10-22-2",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2013/Oct/msg00003.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2013-10-22-8",
|
"name": "APPLE-SA-2013-10-22-8",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
@ -82,10 +62,30 @@
|
|||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1029054"
|
"url": "http://www.securitytracker.com/id/1029054"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT6001",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT6001"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2013-10-22-2",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00003.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "54886",
|
"name": "54886",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/54886"
|
"url": "http://secunia.com/advisories/54886"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT5934",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT5934"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2013-09-18-2",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2013-1423",
|
"ID": "CVE-2013-1423",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,24 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20130225 fusionforge CVE-2013-1423 multiple privilege escalations",
|
"name": "58143",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2013/02/25/5"
|
"url": "http://www.securityfocus.com/bid/58143"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=0cc51b3aca51fa915a35195fdf729bcdb903f2af",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=0cc51b3aca51fa915a35195fdf729bcdb903f2af"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=1fc730b97c797e03b89cd37823ab345d35286cf4",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=1fc730b97c797e03b89cd37823ab345d35286cf4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=9937b9d94ab60ff67fe249c1b9a6c8e3fc1778ba",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=9937b9d94ab60ff67fe249c1b9a6c8e3fc1778ba"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-2633",
|
"name": "DSA-2633",
|
||||||
@ -78,14 +63,29 @@
|
|||||||
"url": "http://www.debian.org/security/2013/dsa-2633"
|
"url": "http://www.debian.org/security/2013/dsa-2633"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "58143",
|
"name": "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=9937b9d94ab60ff67fe249c1b9a6c8e3fc1778ba",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/58143"
|
"url": "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=9937b9d94ab60ff67fe249c1b9a6c8e3fc1778ba"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "90605",
|
"name": "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=1fc730b97c797e03b89cd37823ab345d35286cf4",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://osvdb.org/90605"
|
"url": "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=1fc730b97c797e03b89cd37823ab345d35286cf4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=0cc51b3aca51fa915a35195fdf729bcdb903f2af",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=0cc51b3aca51fa915a35195fdf729bcdb903f2af"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20130225 fusionforge CVE-2013-1423 multiple privilege escalations",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2013/02/25/5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "52371",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/52371"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "52318",
|
"name": "52318",
|
||||||
@ -93,9 +93,9 @@
|
|||||||
"url": "http://secunia.com/advisories/52318"
|
"url": "http://secunia.com/advisories/52318"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "52371",
|
"name": "90605",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://secunia.com/advisories/52371"
|
"url": "http://osvdb.org/90605"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2013-1558",
|
"ID": "CVE-2013-1558",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
|
"name": "RHSA-2013:0758",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0758.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2013-04-16-2",
|
"name": "APPLE-SA-2013-04-16-2",
|
||||||
@ -68,15 +63,30 @@
|
|||||||
"url": "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html"
|
"url": "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "HPSBUX02889",
|
"name": "TA13-107A",
|
||||||
"refsource" : "HP",
|
"refsource": "CERT",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
|
"url": "http://www.us-cert.gov/ncas/alerts/TA13-107A"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SSRT101252",
|
"name": "SSRT101252",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2013:0757",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:19158",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19158"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "MDVSA-2013:161",
|
"name": "MDVSA-2013:161",
|
||||||
"refsource": "MANDRIVA",
|
"refsource": "MANDRIVA",
|
||||||
@ -87,40 +97,30 @@
|
|||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0752.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0752.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2013:0757",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2013:0758",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0758.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-1806-1",
|
"name": "USN-1806-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1806-1"
|
"url": "http://www.ubuntu.com/usn/USN-1806-1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "TA13-107A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-107A"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "59219",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/59219"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:16543",
|
"name": "oval:org.mitre.oval:def:16543",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16543"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16543"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oval:org.mitre.oval:def:19158",
|
"name": "59219",
|
||||||
"refsource" : "OVAL",
|
"refsource": "BID",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19158"
|
"url": "http://www.securityfocus.com/bid/59219"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBUX02889",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@mozilla.org",
|
||||||
"ID": "CVE-2013-1673",
|
"ID": "CVE-2013-1673",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@mozilla.org",
|
||||||
"ID": "CVE-2013-1708",
|
"ID": "CVE-2013-1708",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-67.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-67.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=879924",
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=879924",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "oval:org.mitre.oval:def:18803",
|
"name": "oval:org.mitre.oval:def:18803",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18803"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18803"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-67.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-67.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-1814",
|
"ID": "CVE-2013-1814",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20130312 [CVE-2013-1814] Apache Rave exposes User over API",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-03/0078.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "24744",
|
"name": "24744",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/24744/"
|
"url": "http://www.exploit-db.com/exploits/24744/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20130312 [CVE-2013-1814] Apache Rave exposes User over API",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0078.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-3975",
|
"ID": "CVE-2013-3975",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21671201",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21671201"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "sametime-cve20133975-info-disc(84855)",
|
"name": "sametime-cve20133975-info-disc(84855)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84855"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84855"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21671201",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21671201"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-4043",
|
"ID": "CVE-2013-4043",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21661169",
|
"name": "ibm-spss-cve20134043-content(86419)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21661169"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86419"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "PI07828",
|
"name": "PI07828",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI07828"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI07828"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ibm-spss-cve20134043-content(86419)",
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21661169",
|
||||||
"refsource" : "XF",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/86419"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21661169"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-4542",
|
"ID": "CVE-2013-4542",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "RHSA-2014:0743",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0743.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released",
|
"name": "[Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html"
|
"url": "http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2014:0744",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0744.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=3c3ce981423e0d6c18af82ee62f1850c2cda5976",
|
"name": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=3c3ce981423e0d6c18af82ee62f1850c2cda5976",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,16 +76,6 @@
|
|||||||
"name": "FEDORA-2014-6288",
|
"name": "FEDORA-2014-6288",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:0743",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0743.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:0744",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0744.html"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "hp-security-alert@hp.com",
|
||||||
"ID": "CVE-2013-4804",
|
"ID": "CVE-2013-4804",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,12 +53,12 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "HPSBMU02901",
|
"name": "SSRT101197",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03844594"
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03844594"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SSRT101197",
|
"name": "HPSBMU02901",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03844594"
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03844594"
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2013-5050",
|
"ID": "CVE-2013-5050",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2013-5175",
|
"ID": "CVE-2013-5175",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-asa"
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-asa"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "101165",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/101165"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1039503",
|
"name": "1039503",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1039503"
|
"url": "http://www.securitytracker.com/id/1039503"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "101165",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/101165"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-cpcp",
|
"name": "1039711",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-cpcp"
|
"url": "http://www.securitytracker.com/id/1039711"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "101640",
|
"name": "101640",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/101640"
|
"url": "http://www.securityfocus.com/bid/101640"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1039711",
|
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-cpcp",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1039711"
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-cpcp"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1",
|
"name": "https://rt.perl.org/Public/Bug/Display.html?id=131665",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1"
|
"url": "https://rt.perl.org/Public/Bug/Display.html?id=131665"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1",
|
"name": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1"
|
"url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://rt.perl.org/Public/Bug/Display.html?id=131665",
|
"name": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://rt.perl.org/Public/Bug/Display.html?id=131665"
|
"url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20180426-0001/",
|
"name": "https://security.netapp.com/advisory/ntap-20180426-0001/",
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT208225",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT208225"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT208222",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT208222"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "43175",
|
"name": "43175",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -62,26 +72,11 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://support.apple.com/HT208219"
|
"url": "https://support.apple.com/HT208219"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT208222",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT208222"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT208223",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT208223"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://support.apple.com/HT208224",
|
"name": "https://support.apple.com/HT208224",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://support.apple.com/HT208224"
|
"url": "https://support.apple.com/HT208224"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT208225",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT208225"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201712-01",
|
"name": "GLSA-201712-01",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
@ -91,6 +86,11 @@
|
|||||||
"name": "1039703",
|
"name": "1039703",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1039703"
|
"url": "http://www.securitytracker.com/id/1039703"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT208223",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT208223"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "43295",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/43295/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://packetstormsecurity.com/files/145338/Readymade-PHP-Classified-Script-3.3-SQL-Injection.html",
|
"name": "https://packetstormsecurity.com/files/145338/Readymade-PHP-Classified-Script-3.3-SQL-Injection.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://packetstormsecurity.com/files/145338/Readymade-PHP-Classified-Script-3.3-SQL-Injection.html"
|
"url": "https://packetstormsecurity.com/files/145338/Readymade-PHP-Classified-Script-3.3-SQL-Injection.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "43295",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/43295/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4274",
|
"ID": "CVE-2017-4274",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4449",
|
"ID": "CVE-2017-4449",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4597",
|
"ID": "CVE-2017-4597",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4638",
|
"ID": "CVE-2017-4638",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4840",
|
"ID": "CVE-2017-4840",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51113",
|
"name": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51113",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51113"
|
"url": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51113"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -76,15 +76,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10731379",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10731379"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ibm-sterling-cve20181800-info-disc(149607)",
|
"name": "ibm-sterling-cve20181800-info-disc(149607)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/149607"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/149607"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10731379",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10731379"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user