mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
ca5333b894
commit
78984c676e
@ -52,50 +52,50 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20061008 SQL injection - moodle",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/448023/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20061009 Re: [Full-disclosure] SQL injection - moodle",
|
"name": "20061009 Re: [Full-disclosure] SQL injection - moodle",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/448018/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/448018/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20061008 SQL injection - moodle",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://marc.info/?l=full-disclosure&m=116034301209228&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://cvs.moodle.com/blog/index.php?r1=1.18.2.2&r2=1.18.2.3",
|
"name": "http://cvs.moodle.com/blog/index.php?r1=1.18.2.2&r2=1.18.2.3",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://cvs.moodle.com/blog/index.php?r1=1.18.2.2&r2=1.18.2.3"
|
"url": "http://cvs.moodle.com/blog/index.php?r1=1.18.2.2&r2=1.18.2.3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20395",
|
"name": "moodle-index-sql-injection(29377)",
|
||||||
"refsource" : "BID",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/bid/20395"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29377"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-3957",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/3957"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "22309",
|
"name": "22309",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/22309"
|
"url": "http://secunia.com/advisories/22309"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-3957",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/3957"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20061008 SQL injection - moodle",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://marc.info/?l=full-disclosure&m=116034301209228&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20395",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/20395"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1699",
|
"name": "1699",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/1699"
|
"url": "http://securityreason.com/securityalert/1699"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "moodle-index-sql-injection(29377)",
|
"name": "20061008 SQL injection - moodle",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29377"
|
"url": "http://www.securityfocus.com/archive/1/448023/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20061112 infinicart [ multiples injection sql & xss (post) ]",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/451322/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20061206 Vendor dispute: infinicart (CVE-2006-5957)",
|
|
||||||
"refsource" : "VIM",
|
|
||||||
"url" : "http://www.attrition.org/pipermail/vim/2006-December/001162.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "21043",
|
"name": "21043",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/21043"
|
"url": "http://www.securityfocus.com/bid/21043"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20061112 infinicart [ multiples injection sql & xss (post) ]",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/451322/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-4501",
|
"name": "ADV-2006-4501",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -77,6 +72,11 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/22865"
|
"url": "http://secunia.com/advisories/22865"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20061206 Vendor dispute: infinicart (CVE-2006-5957)",
|
||||||
|
"refsource": "VIM",
|
||||||
|
"url": "http://www.attrition.org/pipermail/vim/2006-December/001162.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1881",
|
"name": "1881",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20070606 FLEA-2007-0021-2: madwifi",
|
"name": "USN-479-1",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/470674/100/100/threaded"
|
"url": "http://www.ubuntu.com/usn/usn-479-1"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://madwifi.org/ticket/1335",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://madwifi.org/ticket/1335"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://madwifi.org/wiki/Security",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://madwifi.org/wiki/Security"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-200706-04",
|
"name": "GLSA-200706-04",
|
||||||
@ -73,19 +63,9 @@
|
|||||||
"url": "http://security.gentoo.org/glsa/glsa-200706-04.xml"
|
"url": "http://security.gentoo.org/glsa/glsa-200706-04.xml"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "MDKSA-2007:132",
|
"name": "25339",
|
||||||
"refsource" : "MANDRIVA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:132"
|
"url": "http://secunia.com/advisories/25339"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2007:014",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-479-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/usn-479-1"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "24114",
|
"name": "24114",
|
||||||
@ -93,44 +73,64 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/24114"
|
"url": "http://www.securityfocus.com/bid/24114"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "36635",
|
"name": "26083",
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/36635"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-1919",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/1919"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25339",
|
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/25339"
|
"url": "http://secunia.com/advisories/26083"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "25622",
|
"name": "25622",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/25622"
|
"url": "http://secunia.com/advisories/25622"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2007:014",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "25763",
|
"name": "25763",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/25763"
|
"url": "http://secunia.com/advisories/25763"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2007:132",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:132"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://madwifi.org/wiki/Security",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://madwifi.org/wiki/Security"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "36635",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/36635"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "25861",
|
"name": "25861",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/25861"
|
"url": "http://secunia.com/advisories/25861"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "26083",
|
"name": "ADV-2007-1919",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://secunia.com/advisories/26083"
|
"url": "http://www.vupen.com/english/advisories/2007/1919"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070606 FLEA-2007-0021-2: madwifi",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/470674/100/100/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "madwifi-fastframe-dos(34455)",
|
"name": "madwifi-fastframe-dos(34455)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34455"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34455"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://madwifi.org/ticket/1335",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://madwifi.org/ticket/1335"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1018260",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1018260"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20070618 ShAnKaR: Simle machines forum CAPTCHA bypass and PHP injection",
|
"name": "20070618 ShAnKaR: Simle machines forum CAPTCHA bypass and PHP injection",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/471641/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/471641/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "smf-forummessage-code-execution(34908)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34908"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://securityvulns.ru/Rdocument271.html",
|
"name": "http://securityvulns.ru/Rdocument271.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -66,16 +76,6 @@
|
|||||||
"name": "40433",
|
"name": "40433",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/40433"
|
"url": "http://osvdb.org/40433"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1018260",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1018260"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "smf-forummessage-code-execution(34908)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34908"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,6 +57,16 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/471933/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/471933/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:14744",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14744"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "38992",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/38992"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.isecpartners.com/advisories/2007-001-vlc.txt",
|
"name": "http://www.isecpartners.com/advisories/2007-001-vlc.txt",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -67,16 +77,6 @@
|
|||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2007/dsa-1332"
|
"url": "http://www.debian.org/security/2007/dsa-1332"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "38992",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/38992"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:14744",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14744"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "25980",
|
"name": "25980",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
|
@ -52,36 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/473785/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064666.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://escarpment.net/exlibris.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://escarpment.net/exlibris.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24978",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/24978"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "36877",
|
"name": "36877",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/36877"
|
"url": "http://osvdb.org/36877"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "26162",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/26162"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "2889",
|
"name": "2889",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
@ -91,6 +66,31 @@
|
|||||||
"name": "metalib-keywordsearch-xss(35431)",
|
"name": "metalib-keywordsearch-xss(35431)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35431"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35431"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064666.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "26162",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/26162"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "24978",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/24978"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/473785/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://escarpment.net/exlibris.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://escarpment.net/exlibris.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.packetstormsecurity.org/0711-exploits/ossigeno22-rfi.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.packetstormsecurity.org/0711-exploits/ossigeno22-rfi.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "26654",
|
"name": "26654",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/26654"
|
"url": "http://www.securityfocus.com/bid/26654"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "44312",
|
"name": "http://www.packetstormsecurity.org/0711-exploits/ossigeno22-rfi.txt",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "MISC",
|
||||||
"url" : "http://osvdb.org/44312"
|
"url": "http://www.packetstormsecurity.org/0711-exploits/ossigeno22-rfi.txt"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "44313",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/44313"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "44314",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/44314"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "44315",
|
"name": "44315",
|
||||||
@ -87,10 +72,25 @@
|
|||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/44316"
|
"url": "http://osvdb.org/44316"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "44314",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/44314"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "44317",
|
"name": "44317",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/44317"
|
"url": "http://osvdb.org/44317"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "44313",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/44313"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "44312",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/44312"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "30037",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/30037"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1019955",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1019955"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20080430 Akamai Download Manager Arbitrary Program Execution Vulnerability",
|
"name": "20080430 Akamai Download Manager Arbitrary Program Execution Vulnerability",
|
||||||
"refsource": "IDEFENSE",
|
"refsource": "IDEFENSE",
|
||||||
@ -62,25 +72,15 @@
|
|||||||
"refsource": "FULLDISC",
|
"refsource": "FULLDISC",
|
||||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-April/061923.html"
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-April/061923.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "28993",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/28993"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-1408",
|
"name": "ADV-2008-1408",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/1408/references"
|
"url": "http://www.vupen.com/english/advisories/2008/1408/references"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1019955",
|
"name": "28993",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securitytracker.com/id?1019955"
|
"url": "http://www.securityfocus.com/bid/28993"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "30037",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/30037"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "akamai-download-code-execution(42117)",
|
"name": "akamai-download-code-execution(42117)",
|
||||||
|
@ -52,45 +52,45 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://jira.jboss.com/jira/browse/JBSEAM-2084",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://jira.jboss.com/jira/browse/JBSEAM-2084"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=549490&group_id=22866",
|
"name": "http://sourceforge.net/project/shownotes.php?release_id=549490&group_id=22866",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=549490&group_id=22866"
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=549490&group_id=22866"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0158",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0158.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0151",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0151.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2008:0213",
|
"name": "RHSA-2008:0213",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0213.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0213.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:0151",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0151.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://jira.jboss.com/jira/browse/JBSEAM-2084",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://jira.jboss.com/jira/browse/JBSEAM-2084"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "26850",
|
"name": "26850",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/26850"
|
"url": "http://www.securityfocus.com/bid/26850"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "42631",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/42631"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-4215",
|
"name": "ADV-2007-4215",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/4215"
|
"url": "http://www.vupen.com/english/advisories/2007/4215"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "42631",
|
"name": "RHSA-2008:0158",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://osvdb.org/42631"
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0158.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "28077",
|
"name": "28077",
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://svnweb.freebsd.org/base?view=revision&revision=167872",
|
"name": "http://svnweb.freebsd.org/base?view=revision&revision=167872",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://svnweb.freebsd.org/base?view=revision&revision=167872"
|
"url": "http://svnweb.freebsd.org/base?view=revision&revision=167872"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,24 +58,9 @@
|
|||||||
"url": "http://www.mozilla.org/security/announce/2010/mfsa2010-24.html"
|
"url": "http://www.mozilla.org/security/announce/2010/mfsa2010-24.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=490790",
|
"name": "39397",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=490790"
|
"url": "http://secunia.com/advisories/39397"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.avaya.com/css/P8/documents/100091069",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.avaya.com/css/P8/documents/100091069"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2010:070",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:070"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2010:0500",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0500.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2010:0501",
|
"name": "RHSA-2010:0501",
|
||||||
@ -83,34 +68,49 @@
|
|||||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0501.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2010-0501.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SR:2010:013",
|
"name": "ADV-2010-1557",
|
||||||
"refsource" : "SUSE",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
|
"url": "http://www.vupen.com/english/advisories/2010/1557"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-921-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://ubuntu.com/usn/usn-921-1"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "39479",
|
"name": "39479",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/39479"
|
"url": "http://www.securityfocus.com/bid/39479"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-921-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://ubuntu.com/usn/usn-921-1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:7618",
|
"name": "oval:org.mitre.oval:def:7618",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7618"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7618"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oval:org.mitre.oval:def:9375",
|
"name": "SUSE-SR:2010:013",
|
||||||
"refsource" : "OVAL",
|
"refsource": "SUSE",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9375"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "39397",
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=490790",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/39397"
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=490790"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2010:0500",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2010-0500.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2010:070",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:070"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "firefox-xmldocumentload-weak-security(57396)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57396"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2010-0748",
|
"name": "ADV-2010-0748",
|
||||||
@ -123,14 +123,14 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2010/0849"
|
"url": "http://www.vupen.com/english/advisories/2010/0849"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2010-1557",
|
"name": "oval:org.mitre.oval:def:9375",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "OVAL",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2010/1557"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9375"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "firefox-xmldocumentload-weak-security(57396)",
|
"name": "http://support.avaya.com/css/P8/documents/100091069",
|
||||||
"refsource" : "XF",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57396"
|
"url": "http://support.avaya.com/css/P8/documents/100091069"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2010-0516",
|
"ID": "CVE-2010-0516",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,21 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:7062",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7062"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20100402 ZDI-10-040: Apple QuickTime RLE Bit Depth Remote Code Execution Vulnerability",
|
"name": "20100402 ZDI-10-040: Apple QuickTime RLE Bit Depth Remote Code Execution Vulnerability",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/510513/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/510513/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-040",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-040"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT4077",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT4077"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2010-03-29-1",
|
"name": "APPLE-SA-2010-03-29-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
@ -78,9 +73,14 @@
|
|||||||
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00002.html"
|
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00002.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oval:org.mitre.oval:def:7062",
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-040",
|
||||||
"refsource" : "OVAL",
|
"refsource": "MISC",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7062"
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-040"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT4077",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT4077"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "38976",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/38976"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.org/1003-exploits/joomlackforms-lfisql.txt",
|
"name": "http://packetstormsecurity.org/1003-exploits/joomlackforms-lfisql.txt",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -62,25 +67,20 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/11785"
|
"url": "http://www.exploit-db.com/exploits/11785"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "38785",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/38785"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "63032",
|
"name": "63032",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/63032"
|
"url": "http://www.osvdb.org/63032"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "38976",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/38976"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ckforms-index-sql-injection(56988)",
|
"name": "ckforms-index-sql-injection(56988)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56988"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56988"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "38785",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/38785"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2010-1399",
|
"ID": "CVE-2010-1399",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT4196",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT4196"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT4220",
|
"name": "http://support.apple.com/kb/HT4220",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.apple.com/kb/HT4220"
|
"url": "http://support.apple.com/kb/HT4220"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "43068",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/43068"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2011-0212",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2011/0212"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT4225",
|
"name": "http://support.apple.com/kb/HT4225",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -73,64 +78,59 @@
|
|||||||
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html"
|
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2010-06-16-1",
|
"name": "40196",
|
||||||
"refsource" : "APPLE",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html"
|
"url": "http://secunia.com/advisories/40196"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2010-06-21-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2011:002",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "40620",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/40620"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:6709",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6709"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1024067",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1024067"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "40105",
|
"name": "40105",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/40105"
|
"url": "http://secunia.com/advisories/40105"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "40196",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/40196"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "43068",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/43068"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2010-1373",
|
"name": "ADV-2010-1373",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2010/1373"
|
"url": "http://www.vupen.com/english/advisories/2010/1373"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:6709",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6709"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2010-06-16-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2011:002",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2010-1512",
|
"name": "ADV-2010-1512",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2010/1512"
|
"url": "http://www.vupen.com/english/advisories/2010/1512"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2011-0212",
|
"name": "40620",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "BID",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/0212"
|
"url": "http://www.securityfocus.com/bid/40620"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1024067",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1024067"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT4196",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT4196"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2010-06-21-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||||
"ID": "CVE-2010-1509",
|
"ID": "CVE-2010-1509",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20100512 Secunia Research: IrfanView PSD Image Parsing Sign-Extension Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/511274/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://secunia.com/secunia_research/2010-41",
|
"name": "http://secunia.com/secunia_research/2010-41",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://secunia.com/secunia_research/2010-41"
|
"url": "http://secunia.com/secunia_research/2010-41"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://irfanview.com/main_history.htm",
|
"name": "20100512 Secunia Research: IrfanView PSD Image Parsing Sign-Extension Vulnerability",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://irfanview.com/main_history.htm"
|
"url": "http://www.securityfocus.com/archive/1/511274/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "40104",
|
"name": "39036",
|
||||||
"refsource" : "BID",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/bid/40104"
|
"url": "http://secunia.com/advisories/39036"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "64627",
|
"name": "64627",
|
||||||
@ -83,9 +78,14 @@
|
|||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6705"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6705"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "39036",
|
"name": "40104",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BID",
|
||||||
"url" : "http://secunia.com/advisories/39036"
|
"url": "http://www.securityfocus.com/bid/40104"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://irfanview.com/main_history.htm",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://irfanview.com/main_history.htm"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "irfanview-psd-bo(58548)",
|
"name": "irfanview-psd-bo(58548)",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2014-0019",
|
"ID": "CVE-2014-0019",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,41 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20140128 Socat security advisory 5 - PROXY-CONNECT address overflow",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://seclists.org/oss-sec/2014/q1/159"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.dest-unreach.org/socat",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.dest-unreach.org/socat"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2014-1795",
|
"name": "FEDORA-2014-1795",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "FEDORA-2014-1811",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "MDVSA-2014:033",
|
"name": "MDVSA-2014:033",
|
||||||
"refsource": "MANDRIVA",
|
"refsource": "MANDRIVA",
|
||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:0760",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "65201",
|
"name": "65201",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -96,6 +71,31 @@
|
|||||||
"name": "102612",
|
"name": "102612",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/102612"
|
"url": "http://osvdb.org/102612"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140128 Socat security advisory 5 - PROXY-CONNECT address overflow",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://seclists.org/oss-sec/2014/q1/159"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.dest-unreach.org/socat",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.dest-unreach.org/socat"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:0760",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2014-1811",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2014-0129",
|
"ID": "CVE-2014-0129",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2014-0382",
|
"ID": "CVE-2014-0382",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
"name": "56484",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
"url": "http://secunia.com/advisories/56484"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "56535",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/56535"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2014:0030",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "56485",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/56485"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oracle-cpujan2014-cve20140382(90355)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90355"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT101454",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777",
|
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777",
|
||||||
@ -68,20 +93,20 @@
|
|||||||
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SSRT101454",
|
"name": "1029608",
|
||||||
"refsource" : "HP",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
|
"url": "http://www.securitytracker.com/id/1029608"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:0030",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "64758",
|
"name": "64758",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/64758"
|
"url": "http://www.securityfocus.com/bid/64758"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "64936",
|
"name": "64936",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -91,31 +116,6 @@
|
|||||||
"name": "102026",
|
"name": "102026",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/102026"
|
"url": "http://osvdb.org/102026"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1029608",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1029608"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "56484",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/56484"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "56485",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/56485"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "56535",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/56535"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oracle-cpujan2014-cve20140382(90355)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90355"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2014-0512",
|
"ID": "CVE-2014-0512",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://twitter.com/thezdi/statuses/443827076580122624",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://twitter.com/thezdi/statuses/443827076580122624"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.pwn2own.com/2014/03/pwn2own-results-for-wednesday-day-one/",
|
"name": "http://www.pwn2own.com/2014/03/pwn2own-results-for-wednesday-day-one/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "http://helpx.adobe.com/security/products/reader/apsb14-15.html",
|
"name": "http://helpx.adobe.com/security/products/reader/apsb14-15.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://helpx.adobe.com/security/products/reader/apsb14-15.html"
|
"url": "http://helpx.adobe.com/security/products/reader/apsb14-15.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://twitter.com/thezdi/statuses/443827076580122624",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://twitter.com/thezdi/statuses/443827076580122624"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2014-0682",
|
"ID": "CVE-2014-0682",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=32618",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=32618"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20140128 Cisco WebEx Meetings Server Unauthorized Meeting Actions Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0682"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "65198",
|
"name": "65198",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/65198"
|
"url": "http://www.securityfocus.com/bid/65198"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "102590",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/102590"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1029700",
|
"name": "1029700",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1029700"
|
"url": "http://www.securitytracker.com/id/1029700"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "102590",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/102590"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20140128 Cisco WebEx Meetings Server Unauthorized Meeting Actions Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0682"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "56668",
|
"name": "56668",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/56668"
|
"url": "http://secunia.com/advisories/56668"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32618",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32618"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20140207 Re: Xen Security Advisory 84 - integer overflow in several XSM/Flask hypercalls",
|
"name": "SUSE-SU-2014:0373",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2014/02/07/4"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20140207 Re: Xen Security Advisory 84 - integer overflow in several XSM/Flask hypercalls",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2014/02/07/12"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20140210 Xen Security Advisory 84 (CVE-2014-1891,CVE-2014-1892,CVE-2014-1893,CVE-2014-1894) - integer overflow in several XSM/Flask hypercalls",
|
"name": "[oss-security] 20140210 Xen Security Advisory 84 (CVE-2014-1891,CVE-2014-1892,CVE-2014-1893,CVE-2014-1894) - integer overflow in several XSM/Flask hypercalls",
|
||||||
@ -72,6 +67,11 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://xenbits.xen.org/xsa/advisory-84.html"
|
"url": "http://xenbits.xen.org/xsa/advisory-84.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140207 Re: Xen Security Advisory 84 - integer overflow in several XSM/Flask hypercalls",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2014/02/07/4"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201407-03",
|
"name": "GLSA-201407-03",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
@ -82,15 +82,15 @@
|
|||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2014:0373",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2014:0446",
|
"name": "SUSE-SU-2014:0446",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140207 Re: Xen Security Advisory 84 - integer overflow in several XSM/Flask hypercalls",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2014/02/07/12"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2014-4482",
|
"ID": "CVE-2014-4482",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "34594",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/34594"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20140831 [The ManageOwnage Series, part III]: Multiple vulnerabilities / RCE in ManageEngine Desktop Central",
|
"name": "20140831 [The ManageOwnage Series, part III]: Multiple vulnerabilities / RCE in ManageEngine Desktop Central",
|
||||||
"refsource": "FULLDISC",
|
"refsource": "FULLDISC",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "110643",
|
"name": "110643",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/show/osvdb/110643"
|
"url": "http://osvdb.org/show/osvdb/110643"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34594",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "http://www.exploit-db.com/exploits/34594"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-5913",
|
"ID": "CVE-2014-5913",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "VU#972337",
|
"name": "VU#972337",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/972337"
|
"url": "http://www.kb.cert.org/vuls/id/972337"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20170101 Re: Re: libtiff: multiple heap-based buffer overflow",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2017/01/01/12"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20170101 Re: libtiff: multiple heap-based buffer overflow",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2017/01/01/10"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/",
|
"name": "https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -72,20 +62,30 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2610"
|
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2610"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20170101 Re: Re: libtiff: multiple heap-based buffer overflow",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2017/01/01/12"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/vadz/libtiff/commit/787c0ee906430b772f33ca50b97b8b5ca070faec",
|
"name": "https://github.com/vadz/libtiff/commit/787c0ee906430b772f33ca50b97b8b5ca070faec",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/vadz/libtiff/commit/787c0ee906430b772f33ca50b97b8b5ca070faec"
|
"url": "https://github.com/vadz/libtiff/commit/787c0ee906430b772f33ca50b97b8b5ca070faec"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-3762",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2017/dsa-3762"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "95215",
|
"name": "95215",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/95215"
|
"url": "http://www.securityfocus.com/bid/95215"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20170101 Re: libtiff: multiple heap-based buffer overflow",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2017/01/01/10"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3762",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2017/dsa-3762"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2016-3294",
|
"ID": "CVE-2016-3294",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "MS16-105",
|
"name": "1036789",
|
||||||
"refsource" : "MS",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-105"
|
"url": "http://www.securitytracker.com/id/1036789"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "92789",
|
"name": "92789",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/92789"
|
"url": "http://www.securityfocus.com/bid/92789"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1036789",
|
"name": "MS16-105",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MS",
|
||||||
"url" : "http://www.securitytracker.com/id/1036789"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-105"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2016-3300",
|
"ID": "CVE-2016-3300",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "MS16-101",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-101"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "92296",
|
"name": "92296",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/92296"
|
"url": "http://www.securityfocus.com/bid/92296"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "MS16-101",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-101"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1036576",
|
"name": "1036576",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2016-3870",
|
"ID": "CVE-2016-3870",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://source.android.com/security/bulletin/2016-09-01.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://source.android.com/security/bulletin/2016-09-01.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://android.googlesource.com/platform/frameworks/av/+/1e9801783770917728b7edbdeff3d0ec09c621ac",
|
"name": "https://android.googlesource.com/platform/frameworks/av/+/1e9801783770917728b7edbdeff3d0ec09c621ac",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/1e9801783770917728b7edbdeff3d0ec09c621ac"
|
"url": "https://android.googlesource.com/platform/frameworks/av/+/1e9801783770917728b7edbdeff3d0ec09c621ac"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://source.android.com/security/bulletin/2016-09-01.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://source.android.com/security/bulletin/2016-09-01.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1036763",
|
"name": "1036763",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-16-320-01",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-16-320-01"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "94344",
|
"name": "94344",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/94344"
|
"url": "http://www.securityfocus.com/bid/94344"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-320-01",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-320-01"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2016-8438",
|
"ID": "CVE-2016-8438",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -53,25 +53,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1281071",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1281071"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2016-89/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2016-89/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "94337",
|
"name": "94337",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/94337"
|
"url": "http://www.securityfocus.com/bid/94337"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1281071",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1281071"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1037298",
|
"name": "1037298",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1037298"
|
"url": "http://www.securitytracker.com/id/1037298"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.mozilla.org/security/advisories/mfsa2016-89/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.mozilla.org/security/advisories/mfsa2016-89/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-9232",
|
"ID": "CVE-2016-9232",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,6 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:3035",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201701-16",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201701-16"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "94420",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/94420"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20161118 Re: CVE-2016-9297 LibTIFF regression",
|
"name": "[oss-security] 20161118 Re: CVE-2016-9297 LibTIFF regression",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -66,21 +81,6 @@
|
|||||||
"name": "DSA-3762",
|
"name": "DSA-3762",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2017/dsa-3762"
|
"url": "http://www.debian.org/security/2017/dsa-3762"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201701-16",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201701-16"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:3035",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "94420",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/94420"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,36 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013",
|
"name": "https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013"
|
"url": "https://github.com/nextcloud/server/commit/5dd211cc8845fd4533966bf8d7a7f2a6359ea013"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1",
|
"name": "https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1"
|
"url": "https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14",
|
"name": "https://nextcloud.com/security/advisory/?id=nc-sa-2016-010",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14"
|
"url": "https://nextcloud.com/security/advisory/?id=nc-sa-2016-010"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071",
|
"name": "https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071"
|
"url": "https://github.com/nextcloud/server/commit/df50e967dbd27b13875625b7dd3189294619b071"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/nextcloud/server/commit/ed0f0db5fa0aff04594cb0f973ae4c22b17a175a"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2d",
|
"name": "https://github.com/owncloud/core/commit/768221fcf3c526c65d85f62b0efa2da5ea00bf2d",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -92,15 +82,25 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/owncloud/core/commit/e7acbce27fa0ef1c6fe216ca67c72d86484919a4"
|
"url": "https://github.com/owncloud/core/commit/e7acbce27fa0ef1c6fe216ca67c72d86484919a4"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/nextcloud/server/commit/c3ae21fef2880c9fe44e8fdbe1262ac7f9716f14"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://hackerone.com/reports/154827",
|
"name": "https://hackerone.com/reports/154827",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://hackerone.com/reports/154827"
|
"url": "https://hackerone.com/reports/154827"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://nextcloud.com/security/advisory/?id=nc-sa-2016-010",
|
"name": "https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "https://nextcloud.com/security/advisory/?id=nc-sa-2016-010"
|
"url": "https://github.com/nextcloud/server/commit/1352365e8bf5ea49da3dc82b1ccf7ddb659ae960"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/nextcloud/server/commit/778ae8abd54c378fc4781394bbedc7a2ee3095e1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://owncloud.org/security/advisory/?id=oc-sa-2016-020",
|
"name": "https://owncloud.org/security/advisory/?id=oc-sa-2016-020",
|
||||||
|
@ -53,15 +53,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "106580",
|
"name": "106580",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/106580"
|
"url": "http://www.securityfocus.com/bid/106580"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user