mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5ba87c002b
commit
7c773ee80f
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20001204 Multiple Vulnerabilities in CBOS",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/warp/public/707/CBOS-multiple.shtml"
|
||||
},
|
||||
{
|
||||
"name": "cisco-cbos-invalid-login(5628)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5628"
|
||||
},
|
||||
{
|
||||
"name": "20001204 Multiple Vulnerabilities in CBOS",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/warp/public/707/CBOS-multiple.shtml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBUX0102-143",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://archives.neohapsis.com/archives/hp/2001-q1/0069.html"
|
||||
},
|
||||
{
|
||||
"name": "6033",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/6033"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX0102-143",
|
||||
"refsource": "HP",
|
||||
"url": "http://archives.neohapsis.com/archives/hp/2001-q1/0069.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010214 Security hole in kicq",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0276.html"
|
||||
"name": "kicq-execute-commands(6112)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6112"
|
||||
},
|
||||
{
|
||||
"name": "20010303 Re: Security hole in kicq",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0536.html"
|
||||
},
|
||||
{
|
||||
"name" : "kicq-execute-commands(6112)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6112"
|
||||
"name": "20010214 Security hole in kicq",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0276.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20011017 Mac OS X setuid root security hole",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-10/0121.html"
|
||||
"name": "M-007",
|
||||
"refsource": "CIAC",
|
||||
"url": "http://www.ciac.org/ciac/bulletins/m-007.shtml"
|
||||
},
|
||||
{
|
||||
"name": "20011017 Re: Mac OS X setuid root security hole",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/945747"
|
||||
},
|
||||
{
|
||||
"name" : "M-007",
|
||||
"refsource" : "CIAC",
|
||||
"url" : "http://www.ciac.org/ciac/bulletins/m-007.shtml"
|
||||
"name": "20011017 Mac OS X setuid root security hole",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-10/0121.html"
|
||||
},
|
||||
{
|
||||
"name": "3439",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2006-2162",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,55 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806&forum_id=7890",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806&forum_id=7890"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.nagios.org/development/changelog.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.nagios.org/development/changelog.php"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1072",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1072"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200605-07",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2006:011",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2006_05_19.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-282-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/282-1/"
|
||||
},
|
||||
{
|
||||
"name" : "17879",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/17879"
|
||||
"name": "DSA-1072",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1072"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2006:011",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2006_05_19.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.nagios.org/development/changelog.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.nagios.org/development/changelog.php"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1662",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1662"
|
||||
},
|
||||
{
|
||||
"name": "19998",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19998"
|
||||
},
|
||||
{
|
||||
"name": "19991",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19991"
|
||||
},
|
||||
{
|
||||
"name" : "19998",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19998"
|
||||
"name": "nagios-multiple-scripts-bo(26253)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26253"
|
||||
},
|
||||
{
|
||||
"name": "20013",
|
||||
@ -112,15 +107,20 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20215"
|
||||
},
|
||||
{
|
||||
"name": "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806&forum_id=7890",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806&forum_id=7890"
|
||||
},
|
||||
{
|
||||
"name": "17879",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17879"
|
||||
},
|
||||
{
|
||||
"name": "20247",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20247"
|
||||
},
|
||||
{
|
||||
"name" : "nagios-multiple-scripts-bo(26253)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26253"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2006-2309",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,31 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060531 Secunia Research: Eserv/3 IMAP and HTTP Server MultipleVulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/435415/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://secunia.com/secunia_research/2006-37/advisory/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secunia.com/secunia_research/2006-37/advisory/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.eserv.ru/ru/news/news_detail.php?ID=235",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.eserv.ru/ru/news/news_detail.php?ID=235"
|
||||
},
|
||||
{
|
||||
"name" : "18179",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18179"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-2066",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/2066"
|
||||
},
|
||||
{
|
||||
"name": "20059",
|
||||
"refsource": "SECUNIA",
|
||||
@ -87,10 +62,35 @@
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1006"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2006-37/advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2006-37/advisory/"
|
||||
},
|
||||
{
|
||||
"name": "eserv-file-extension-source-code-disclosure(26741)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26741"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2066",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2066"
|
||||
},
|
||||
{
|
||||
"name": "18179",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18179"
|
||||
},
|
||||
{
|
||||
"name": "20060531 Secunia Research: Eserv/3 IMAP and HTTP Server MultipleVulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/435415/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.eserv.ru/ru/news/news_detail.php?ID=235",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.eserv.ru/ru/news/news_detail.php?ID=235"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=337830",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=337830"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1062",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1062"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:089",
|
||||
"refsource": "MANDRIVA",
|
||||
@ -76,6 +66,16 @@
|
||||
"name": "ADV-2006-1862",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1862"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1062",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1062"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=337830",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=337830"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,36 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:5702",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5702"
|
||||
},
|
||||
{
|
||||
"name": "21140",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21140"
|
||||
},
|
||||
{
|
||||
"name": "20459",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20459"
|
||||
},
|
||||
{
|
||||
"name": "1016135",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016135"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-109.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-109.htm"
|
||||
},
|
||||
{
|
||||
"name": "18057",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18057"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02120",
|
||||
"refsource": "HP",
|
||||
@ -68,44 +93,19 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/434717/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "18057",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18057"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:5702",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5702"
|
||||
"name": "hp-kernel-dos(26593)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26593"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1913",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1913"
|
||||
},
|
||||
{
|
||||
"name" : "1016135",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016135"
|
||||
},
|
||||
{
|
||||
"name": "20227",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20227"
|
||||
},
|
||||
{
|
||||
"name" : "20459",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20459"
|
||||
},
|
||||
{
|
||||
"name" : "21140",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21140"
|
||||
},
|
||||
{
|
||||
"name" : "hp-kernel-dos(26593)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26593"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7352",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7352"
|
||||
},
|
||||
{
|
||||
"name": "33009",
|
||||
"refsource": "SECUNIA",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "merlix-teamworx-information-disclosure(47125)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47125"
|
||||
},
|
||||
{
|
||||
"name": "7352",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7352"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7436",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7436"
|
||||
},
|
||||
{
|
||||
"name" : "33134",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33134"
|
||||
},
|
||||
{
|
||||
"name": "4931",
|
||||
"refsource": "SREASON",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "aspired2blog-blog-info-disclosure(47294)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47294"
|
||||
},
|
||||
{
|
||||
"name": "7436",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7436"
|
||||
},
|
||||
{
|
||||
"name": "33134",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33134"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081211 facto Database Disclosure",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/499125/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "4934",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4934"
|
||||
},
|
||||
{
|
||||
"name": "20081211 facto Database Disclosure",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/499125/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "facto-facto-information-disclosure(47278)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "47771",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/47771"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vupen.com/demos/VUPEN_Pwning_Chrome.php",
|
||||
"refsource": "MISC",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.youtube.com/watch?v=c8cQ0yU89sk"
|
||||
},
|
||||
{
|
||||
"name" : "47771",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/47771"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14099",
|
||||
"refsource": "OVAL",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2011-2332",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "72790",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/72790"
|
||||
},
|
||||
{
|
||||
"name": "chrome-v8-security-bypass(67903)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67903"
|
||||
},
|
||||
{
|
||||
"name": "44829",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/44829"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14242",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14242"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/chromium/issues/detail?id=83275",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,26 +86,6 @@
|
||||
"name": "48129",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48129"
|
||||
},
|
||||
{
|
||||
"name" : "72790",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/72790"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:14242",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14242"
|
||||
},
|
||||
{
|
||||
"name" : "44829",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/44829"
|
||||
},
|
||||
{
|
||||
"name" : "chrome-v8-security-bypass(67903)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67903"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2011-2795",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=87339",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=87339"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name": "74245",
|
||||
"refsource": "OSVDB",
|
||||
@ -72,6 +62,16 @@
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14653"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/chromium/issues/detail?id=87339",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=87339"
|
||||
},
|
||||
{
|
||||
"name": "google-chrome-function-info-disclosure(68957)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-2939",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,29 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20110818 CVE request: heap overflow in perl while decoding Unicode string",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/08/18/8"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110819 Re: CVE request: heap overflow in perl while decoding Unicode string",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/08/19/17"
|
||||
},
|
||||
{
|
||||
"name" : "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5"
|
||||
},
|
||||
{
|
||||
"name" : "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_(CVE-2011-2939)",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_(CVE-2011-2939)"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=731246",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=731246"
|
||||
"name": "46989",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/46989"
|
||||
},
|
||||
{
|
||||
"name": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod",
|
||||
@ -83,14 +63,9 @@
|
||||
"url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2012:008",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:1424",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1424.html"
|
||||
"name": "55314",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/55314"
|
||||
},
|
||||
{
|
||||
"name": "USN-1643-1",
|
||||
@ -103,14 +78,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/49858"
|
||||
},
|
||||
{
|
||||
"name" : "46989",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/46989"
|
||||
"name": "[oss-security] 20110818 CVE request: heap overflow in perl while decoding Unicode string",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/08/18/8"
|
||||
},
|
||||
{
|
||||
"name" : "51457",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51457"
|
||||
"name": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5"
|
||||
},
|
||||
{
|
||||
"name": "46172",
|
||||
@ -118,9 +93,34 @@
|
||||
"url": "http://secunia.com/advisories/46172"
|
||||
},
|
||||
{
|
||||
"name" : "55314",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=731246",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731246"
|
||||
},
|
||||
{
|
||||
"name": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_(CVE-2011-2939)",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_(CVE-2011-2939)"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:008",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:1424",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-1424.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110819 Re: CVE request: heap overflow in perl while decoding Unicode string",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/08/19/17"
|
||||
},
|
||||
{
|
||||
"name": "51457",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/55314"
|
||||
"url": "http://secunia.com/advisories/51457"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2011/mfsa2011-29.html",
|
||||
"name": "oval:org.mitre.oval:def:14458",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14458"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-33.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2011/mfsa2011-29.html"
|
||||
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-33.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=664983",
|
||||
@ -67,20 +72,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=679588"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2011/mfsa2011-33.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2011/mfsa2011-33.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2011:037",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:14458",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14458"
|
||||
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-29.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-29.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2011-3163",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBPI02711",
|
||||
"name": "SSRT100647",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=131914362310845&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT100647",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=131914362310845&w=2"
|
||||
"name": "8479",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/8479"
|
||||
},
|
||||
{
|
||||
"name": "50297",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/50297"
|
||||
},
|
||||
{
|
||||
"name": "HPSBPI02711",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=131914362310845&w=2"
|
||||
},
|
||||
{
|
||||
"name": "46532",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/46532"
|
||||
},
|
||||
{
|
||||
"name" : "8479",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/8479"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2011-3310",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2011-3506",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:1232",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1232.html"
|
||||
},
|
||||
{
|
||||
"name": "46527",
|
||||
"refsource": "SECUNIA",
|
||||
@ -72,10 +62,20 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/46528"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
|
||||
},
|
||||
{
|
||||
"name": "50084",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/50084"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1232",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-0269",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,120 +52,120 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20130211 Denial of Service and Unsafe Object Creation Vulnerability in JSON [CVE-2013-0269]",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/02/11/7"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20130211 Patch update for [CVE-2013-0269]",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/02/11/8"
|
||||
},
|
||||
{
|
||||
"name" : "[rubyonrails-security] 20130211 Denial of Service and Unsafe Object Creation Vulnerability in JSON [CVE-2013-0269]",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection"
|
||||
},
|
||||
{
|
||||
"name" : "http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/"
|
||||
},
|
||||
{
|
||||
"name" : "http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed"
|
||||
},
|
||||
{
|
||||
"name" : "https://puppet.com/security/cve/cve-2013-0269",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://puppet.com/security/cve/cve-2013-0269"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2013-10-22-5",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0686",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0686.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0701",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0701.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1028",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1028.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1147",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1147.html"
|
||||
},
|
||||
{
|
||||
"name" : "SSA:2013-075-01",
|
||||
"refsource" : "SLACKWARE",
|
||||
"url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0603",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0609",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html"
|
||||
"name": "APPLE-SA-2013-10-22-5",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0647",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1733-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1733-1"
|
||||
},
|
||||
{
|
||||
"name" : "57899",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/57899"
|
||||
},
|
||||
{
|
||||
"name" : "90074",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/90074"
|
||||
},
|
||||
{
|
||||
"name" : "52075",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/52075"
|
||||
"name": "SSA:2013-075-01",
|
||||
"refsource": "SLACKWARE",
|
||||
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862"
|
||||
},
|
||||
{
|
||||
"name": "52774",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/52774"
|
||||
},
|
||||
{
|
||||
"name": "http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed"
|
||||
},
|
||||
{
|
||||
"name": "[rubyonrails-security] 20130211 Denial of Service and Unsafe Object Creation Vulnerability in JSON [CVE-2013-0269]",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain"
|
||||
},
|
||||
{
|
||||
"name": "90074",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/90074"
|
||||
},
|
||||
{
|
||||
"name": "https://puppet.com/security/cve/cve-2013-0269",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://puppet.com/security/cve/cve-2013-0269"
|
||||
},
|
||||
{
|
||||
"name": "52902",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/52902"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0686",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0686.html"
|
||||
},
|
||||
{
|
||||
"name": "57899",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/57899"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130211 Denial of Service and Unsafe Object Creation Vulnerability in JSON [CVE-2013-0269]",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/02/11/7"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130211 Patch update for [CVE-2013-0269]",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/02/11/8"
|
||||
},
|
||||
{
|
||||
"name": "USN-1733-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1733-1"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0609",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1028",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html"
|
||||
},
|
||||
{
|
||||
"name": "json-ruby-security-bypass(82010)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82010"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1147",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1147.html"
|
||||
},
|
||||
{
|
||||
"name": "http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/"
|
||||
},
|
||||
{
|
||||
"name": "52075",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/52075"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0647",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-0299",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-0566",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21647750",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21647750"
|
||||
},
|
||||
{
|
||||
"name": "JR46776",
|
||||
"refsource": "AIXAPAR",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "wscommerce-cve20130566-xss(83139)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83139"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg21647750",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg21647750"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-1157",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-1178",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-1289",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS13-035",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-035"
|
||||
},
|
||||
{
|
||||
"name": "TA13-100A",
|
||||
"refsource": "CERT",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "oval:org.mitre.oval:def:16599",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16599"
|
||||
},
|
||||
{
|
||||
"name": "MS13-035",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-035"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2013-1373",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,20 +53,15 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb13-05.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb13-05.html"
|
||||
"name": "SUSE-SU-2013:0296",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0254",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0254.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0296",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0295",
|
||||
"refsource": "SUSE",
|
||||
@ -81,6 +76,11 @@
|
||||
"name": "TA13-043A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb13-05.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb13-05.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20130123 CVE-2013-1393",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2013/Jan/218"
|
||||
},
|
||||
{
|
||||
"name" : "20130123 [Security-news] SA-CONTRIB-2013-008 - CurvyCorners - Cross Site Scripting (XSS) - module unsupported",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2013/Jan/211"
|
||||
},
|
||||
{
|
||||
"name" : "https://drupal.org/node/1896718",
|
||||
"name": "http://packetstormsecurity.com/files/119814/CurvyCorners-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://drupal.org/node/1896718"
|
||||
"url": "http://packetstormsecurity.com/files/119814/CurvyCorners-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/119766/Drupal-CurvyCorners-6.x-7.x-Cross-Site-Scripting.html",
|
||||
@ -73,29 +63,39 @@
|
||||
"url": "http://packetstormsecurity.com/files/119766/Drupal-CurvyCorners-6.x-7.x-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/119814/CurvyCorners-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/119814/CurvyCorners-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.csnc.ch/misc/files/advisories/CVE-2013-1393.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.csnc.ch/misc/files/advisories/CVE-2013-1393.txt"
|
||||
},
|
||||
{
|
||||
"name" : "57526",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/57526"
|
||||
"name": "20130123 CVE-2013-1393",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2013/Jan/218"
|
||||
},
|
||||
{
|
||||
"name": "89571",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/89571"
|
||||
},
|
||||
{
|
||||
"name": "20130123 [Security-news] SA-CONTRIB-2013-008 - CurvyCorners - Cross Site Scripting (XSS) - module unsupported",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2013/Jan/211"
|
||||
},
|
||||
{
|
||||
"name": "57526",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/57526"
|
||||
},
|
||||
{
|
||||
"name": "drupal-curvycorners-unspecified-xss(81499)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81499"
|
||||
},
|
||||
{
|
||||
"name": "http://www.csnc.ch/misc/files/advisories/CVE-2013-1393.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.csnc.ch/misc/files/advisories/CVE-2013-1393.txt"
|
||||
},
|
||||
{
|
||||
"name": "https://drupal.org/node/1896718",
|
||||
"refsource": "MISC",
|
||||
"url": "https://drupal.org/node/1896718"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-1503",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-1557",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,36 +52,111 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "SUSE-SU-2013:0835",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:19294",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19294"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201406-32",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
|
||||
},
|
||||
{
|
||||
"name": "[distro-pkg-dev] 20130417 [SECURITY] IcedTea 1.11.10 for OpenJDK 6 Released!",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022796.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0871",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0758",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0758.html"
|
||||
},
|
||||
{
|
||||
"name": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/76eb3fb80740",
|
||||
"refsource": "MISC",
|
||||
"url": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/76eb3fb80740"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=952648",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=952648"
|
||||
"name": "APPLE-SA-2013-04-16-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
|
||||
"name": "MDVSA-2013:145",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:145"
|
||||
},
|
||||
{
|
||||
"name" : "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/"
|
||||
"name": "oval:org.mitre.oval:def:19672",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19672"
|
||||
},
|
||||
{
|
||||
"name": "TA13-107A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-107A"
|
||||
},
|
||||
{
|
||||
"name": "IV40772",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV40772"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/"
|
||||
},
|
||||
{
|
||||
"name": "SSRT101252",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
|
||||
},
|
||||
{
|
||||
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=952648",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1455",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
|
||||
},
|
||||
{
|
||||
"name": "SSRT101305",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
|
||||
},
|
||||
{
|
||||
"name": "59170",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/59170"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0757",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02922",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21645566",
|
||||
"refsource": "CONFIRM",
|
||||
@ -93,74 +168,34 @@
|
||||
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124"
|
||||
},
|
||||
{
|
||||
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
|
||||
},
|
||||
{
|
||||
"name" : "IV40772",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV40772"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2013-04-16-2",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201406-32",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201406-32.xml"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02889",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101252",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02922",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101305",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:145",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:145"
|
||||
"name": "openSUSE-SU-2013:0777",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:161",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:161"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0964",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0752",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0752.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0757",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
|
||||
"name": "USN-1806-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1806-1"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0758",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0758.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1455",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
|
||||
"name": "oval:org.mitre.oval:def:16688",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16688"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1456",
|
||||
@ -173,19 +208,14 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0777",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0835",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0871",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html"
|
||||
"name": "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0934",
|
||||
@ -193,39 +223,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0964",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1806-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1806-1"
|
||||
},
|
||||
{
|
||||
"name" : "TA13-107A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-107A"
|
||||
},
|
||||
{
|
||||
"name" : "59170",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/59170"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16688",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16688"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:19294",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19294"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:19672",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19672"
|
||||
"name": "HPSBUX02889",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-4594",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "55431",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/55431"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20131118 Re: CVE request for Drupal contributed modules",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2013/q4/317"
|
||||
},
|
||||
{
|
||||
"name" : "https://drupal.org/node/2129373",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://drupal.org/node/2129373"
|
||||
},
|
||||
{
|
||||
"name": "https://drupal.org/node/2128345",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://drupal.org/node/2128345"
|
||||
},
|
||||
{
|
||||
"name" : "55431",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/55431"
|
||||
"name": "https://drupal.org/node/2129373",
|
||||
"refsource": "MISC",
|
||||
"url": "https://drupal.org/node/2129373"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-5340",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-5446",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,6 +57,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg21653546"
|
||||
},
|
||||
{
|
||||
"name": "webspheredp-xc10-cve20135446-logoff(87910)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87910"
|
||||
},
|
||||
{
|
||||
"name": "IC93164",
|
||||
"refsource": "AIXAPAR",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "IC96617",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC96617"
|
||||
},
|
||||
{
|
||||
"name" : "webspheredp-xc10-cve20135446-logoff(87910)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/87910"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0620",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2017-1000002",
|
||||
"REQUESTER": "mattd@bugfuzz.com",
|
||||
"STATE": "PUBLIC"
|
||||
@ -12,18 +12,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "ATutor",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.2.1"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "ATutor"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Directory Traversal"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -54,9 +54,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.atutor.ca/atutor/mantis/changelog_page.php?version_id=55",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.atutor.ca/atutor/mantis/changelog_page.php?version_id=55"
|
||||
"name": "99599",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99599"
|
||||
},
|
||||
{
|
||||
"name": "http://www.atutor.ca/atutor/mantis/view.php?id=5681",
|
||||
@ -64,9 +64,9 @@
|
||||
"url": "http://www.atutor.ca/atutor/mantis/view.php?id=5681"
|
||||
},
|
||||
{
|
||||
"name" : "99599",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/99599"
|
||||
"name": "http://www.atutor.ca/atutor/mantis/changelog_page.php?version_id=55",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.atutor.ca/atutor/mantis/changelog_page.php?version_id=55"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.310507",
|
||||
"ID": "CVE-2017-1000089",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins Pipeline: Build Step Plugin",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.5 and earlier"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins Pipeline: Build Step Plugin"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Incorrect Access Control"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,21 +57,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://openwall.com/lists/oss-security/2017/08/01/1"
|
||||
},
|
||||
{
|
||||
"name" : "http://openwall.com/lists/oss-security/2017/08/01/2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://openwall.com/lists/oss-security/2017/08/01/2"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5"
|
||||
},
|
||||
{
|
||||
"name": "https://mantisbt.org/bugs/view.php?id=23146",
|
||||
"refsource": "CONFIRM",
|
||||
@ -81,6 +66,21 @@
|
||||
"name": "1039030",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039030"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/mantisbt/mantisbt/commit/17f9b94f031ba93ae2a727bca0e68458ecd08fb0"
|
||||
},
|
||||
{
|
||||
"name": "http://openwall.com/lists/oss-security/2017/08/01/2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://openwall.com/lists/oss-security/2017/08/01/2"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/mantisbt/mantisbt/commit/c73ae3d3d4dd4681489a9e697e8ade785e27cba5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-16432",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4723",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4766",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4869",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -63,9 +63,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2017-0008.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2017-0008.html"
|
||||
"name": "1038281",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038281"
|
||||
},
|
||||
{
|
||||
"name": "97921",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://www.securitytracker.com/id/1038280"
|
||||
},
|
||||
{
|
||||
"name" : "1038281",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038281"
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2017-0008.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2017-0008.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user