mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
e7b884962b
commit
7cc948d096
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ibm-gina-group-add(3166)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3166"
|
||||
},
|
||||
{
|
||||
"name": "19990823 IBM Gina security warning",
|
||||
"refsource": "NTBUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "608",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/608"
|
||||
},
|
||||
{
|
||||
"name" : "ibm-gina-group-add(3166)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/3166"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS98-006",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-006"
|
||||
},
|
||||
{
|
||||
"name": "Q189262",
|
||||
"refsource": "MSKB",
|
||||
"url": "http://support.microsoft.com/support/kb/articles/Q189/2/62.ASP"
|
||||
},
|
||||
{
|
||||
"name": "MS98-006",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-006"
|
||||
},
|
||||
{
|
||||
"name": "iis-passive-ftp(1215)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.w3.org/Security/Faq/wwwsf4.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.w3.org/Security/Faq/wwwsf4.html"
|
||||
"name": "http-cgi-nphpublish(2055)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2055"
|
||||
},
|
||||
{
|
||||
"name": "http://www-genome.wi.mit.edu/WWW/tools/CGI_scripts/server_publish/nph-publish",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www-genome.wi.mit.edu/WWW/tools/CGI_scripts/server_publish/nph-publish"
|
||||
},
|
||||
{
|
||||
"name" : "http-cgi-nphpublish(2055)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/2055"
|
||||
"name": "http://www.w3.org/Security/Faq/wwwsf4.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.w3.org/Security/Faq/wwwsf4.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "8099",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/8099"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX9701-047",
|
||||
"refsource": "HP",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "hp-movemail(2057)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2057"
|
||||
},
|
||||
{
|
||||
"name" : "8099",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/8099"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20000415 (no subject)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-04/0073.html"
|
||||
},
|
||||
{
|
||||
"name" : "20000418 AVM's Statement",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=383085010.956159226625.JavaMail.root@web305-mc.mail.com"
|
||||
"name": "1282",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/1282"
|
||||
},
|
||||
{
|
||||
"name": "1103",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/1103"
|
||||
},
|
||||
{
|
||||
"name" : "1282",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/1282"
|
||||
"name": "20000418 AVM's Statement",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=383085010.956159226625.JavaMail.root@web305-mc.mail.com"
|
||||
},
|
||||
{
|
||||
"name": "20000415 (no subject)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-04/0073.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20000502 spj-003-000 - S0ftPj Advisory",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=200005021736.TAA01991@ALuSSi"
|
||||
},
|
||||
{
|
||||
"name": "1158",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1158"
|
||||
},
|
||||
{
|
||||
"name": "20000502 spj-003-000 - S0ftPj Advisory",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=200005021736.TAA01991@ALuSSi"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20000903 (SRADV00001) Arbitrary file disclosure through PHP file upload",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-08/0455.html"
|
||||
"name": "php-file-upload(5190)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5190"
|
||||
},
|
||||
{
|
||||
"name": "20000904 Re: [PHP-DEV] RE: (SRADV00001) Arbitrary file disclosure through PHP file upload",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0477.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://cvsweb.php.net/viewcvs.cgi/php4/main/rfc1867.c.diff?r1=1.38%3Aphp_4_0_2&tr1=1.1&r2=text&tr2=1.45&diff_format=u",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://cvsweb.php.net/viewcvs.cgi/php4/main/rfc1867.c.diff?r1=1.38%3Aphp_4_0_2&tr1=1.1&r2=text&tr2=1.45&diff_format=u"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2000:048",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-09/0150.html"
|
||||
},
|
||||
{
|
||||
"name": "1649",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1649"
|
||||
},
|
||||
{
|
||||
"name" : "php-file-upload(5190)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5190"
|
||||
"name": "http://cvsweb.php.net/viewcvs.cgi/php4/main/rfc1867.c.diff?r1=1.38%3Aphp_4_0_2&tr1=1.1&r2=text&tr2=1.45&diff_format=u",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cvsweb.php.net/viewcvs.cgi/php4/main/rfc1867.c.diff?r1=1.38%3Aphp_4_0_2&tr1=1.1&r2=text&tr2=1.45&diff_format=u"
|
||||
},
|
||||
{
|
||||
"name": "20000903 (SRADV00001) Arbitrary file disclosure through PHP file upload",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0455.html"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2000:048",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0150.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "A100900-1",
|
||||
"refsource" : "ATSTAKE",
|
||||
"url" : "http://www.atstake.com/research/advisories/2000/a100900-1.txt"
|
||||
},
|
||||
{
|
||||
"name" : "1769",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/1769"
|
||||
"name": "7209",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/7209"
|
||||
},
|
||||
{
|
||||
"name": "ical-csstart-gain-access(5757)",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5757"
|
||||
},
|
||||
{
|
||||
"name" : "7209",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/7209"
|
||||
"name": "1769",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1769"
|
||||
},
|
||||
{
|
||||
"name": "A100900-1",
|
||||
"refsource": "ATSTAKE",
|
||||
"url": "http://www.atstake.com/research/advisories/2000/a100900-1.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20001102 Mantrap By Recourse Technologies - Fate Advisory (11-01-00)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-11/0041.html"
|
||||
},
|
||||
{
|
||||
"name" : "20001107 Vendor Response Re: Mantrap Advisory Vendor Followup - Fate Research Labs",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-11/0100.html"
|
||||
},
|
||||
{
|
||||
"name": "20001105 Mantrap Advisory Vendor Followup - Fate Research Labs",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "mantrap-pwd-reveal-information(5949)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5949"
|
||||
},
|
||||
{
|
||||
"name": "20001102 Mantrap By Recourse Technologies - Fate Advisory (11-01-00)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0041.html"
|
||||
},
|
||||
{
|
||||
"name": "20001107 Vendor Response Re: Mantrap Advisory Vendor Followup - Fate Research Labs",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0100.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "modifyUser.asp in Cool Cafe (Cool Café) Chat 1.2.1 allows remote attackers to obtain the administrator password and email address via a modified nickname value."
|
||||
"value": "modifyUser.asp in Cool Cafe (Cool Caf\u00e9) Chat 1.2.1 allows remote attackers to obtain the administrator password and email address via a modified nickname value."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050616 CoolCafe Chat SQL injection",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/lists/fulldisclosure/2005/Jun/0205.html"
|
||||
"name": "17350",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/17350"
|
||||
},
|
||||
{
|
||||
"name": "http://exploitlabs.com/files/advisories/EXPL-A-2005-009-coolcafe.txt",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://exploitlabs.com/files/advisories/EXPL-A-2005-009-coolcafe.txt"
|
||||
},
|
||||
{
|
||||
"name" : "17350",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/17350"
|
||||
"name": "20050616 CoolCafe Chat SQL injection",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/lists/fulldisclosure/2005/Jun/0205.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3596",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3596"
|
||||
},
|
||||
{
|
||||
"name" : "20070329 iPhotoAlbum v1.1(header.php)Remote File Include Vulnerability",
|
||||
"refsource" : "VIM",
|
||||
"url" : "http://www.attrition.org/pipermail/vim/2007-March/001474.html"
|
||||
},
|
||||
{
|
||||
"name": "14229",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/14229"
|
||||
},
|
||||
{
|
||||
"name" : "23189",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23189"
|
||||
"name": "3596",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3596"
|
||||
},
|
||||
{
|
||||
"name": "1014448",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1014448"
|
||||
},
|
||||
{
|
||||
"name": "20070329 iPhotoAlbum v1.1(header.php)Remote File Include Vulnerability",
|
||||
"refsource": "VIM",
|
||||
"url": "http://www.attrition.org/pipermail/vim/2007-March/001474.html"
|
||||
},
|
||||
{
|
||||
"name": "16031",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/16031"
|
||||
},
|
||||
{
|
||||
"name": "23189",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23189"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2005-2874",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042"
|
||||
"name": "FEDORA-2005-908",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lwn.net/Alerts/152835/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.cups.org/relnotes.php#010123",
|
||||
@ -63,29 +63,29 @@
|
||||
"url": "http://www.cups.org/relnotes.php#010123"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2005-908",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lwn.net/Alerts/152835/"
|
||||
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072"
|
||||
},
|
||||
{
|
||||
"name": "1012811",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1012811"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2005:772",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-772.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:9774",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774"
|
||||
},
|
||||
{
|
||||
"name" : "1012811",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1012811"
|
||||
"name": "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "DSA-902",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2005/dsa-902"
|
||||
},
|
||||
{
|
||||
"name": "20051013 Multiple Vendor XMail 'sendmail' Recipient Buffer Overflow Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://www.idefense.com/application/poi/display?id=321&type=vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.xmailserver.org/ChangeLog.html#oct_12__2005_v_1_22",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.xmailserver.org/ChangeLog.html#oct_12__2005_v_1_22"
|
||||
"name": "15103",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15103"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-902",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2005/dsa-902"
|
||||
"name": "xmail-addressfromatptr-bo(22724)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22724"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200512-05",
|
||||
@ -73,9 +78,19 @@
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200512-05.xml"
|
||||
},
|
||||
{
|
||||
"name" : "15103",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/15103"
|
||||
"name": "18052",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18052"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xmailserver.org/ChangeLog.html#oct_12__2005_v_1_22",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.xmailserver.org/ChangeLog.html#oct_12__2005_v_1_22"
|
||||
},
|
||||
{
|
||||
"name": "81",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/81"
|
||||
},
|
||||
{
|
||||
"name": "20010",
|
||||
@ -92,25 +107,10 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17637"
|
||||
},
|
||||
{
|
||||
"name" : "18052",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18052"
|
||||
},
|
||||
{
|
||||
"name": "17194",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17194"
|
||||
},
|
||||
{
|
||||
"name" : "81",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/81"
|
||||
},
|
||||
{
|
||||
"name" : "xmail-addressfromatptr-bo(22724)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22724"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -54,13 +54,13 @@
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "20050914 Oracle Reports: Generic SQL Injection Vulnerability via Lexical References",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=112681849113948&w=2"
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-September/037156.html"
|
||||
},
|
||||
{
|
||||
"name": "20050914 Oracle Reports: Generic SQL Injection Vulnerability via Lexical References",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-September/037156.html"
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=112681849113948&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.red-database-security.com/wp/sql_injection_reports_us.pdf",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20051103 Buggy blogging",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0091.html"
|
||||
},
|
||||
{
|
||||
"name": "14911",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/14911"
|
||||
},
|
||||
{
|
||||
"name": "20051103 Buggy blogging",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0091.html"
|
||||
},
|
||||
{
|
||||
"name": "16899",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20051101 Cisco IPS MC Malformed Configuration Download Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20051101-ipsmc.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "VU#154883",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/154883"
|
||||
},
|
||||
{
|
||||
"name" : "15269",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/15269"
|
||||
"name": "cisco-ios-ips-bypass-security(22926)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22926"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-2266",
|
||||
@ -77,15 +67,25 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/20444"
|
||||
},
|
||||
{
|
||||
"name": "15269",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15269"
|
||||
},
|
||||
{
|
||||
"name": "VU#154883",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/154883"
|
||||
},
|
||||
{
|
||||
"name": "1015133",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015133"
|
||||
},
|
||||
{
|
||||
"name" : "17397",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/17397"
|
||||
"name": "20051101 Cisco IPS MC Malformed Configuration Download Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20051101-ipsmc.shtml"
|
||||
},
|
||||
{
|
||||
"name": "137",
|
||||
@ -93,9 +93,9 @@
|
||||
"url": "http://securityreason.com/securityalert/137"
|
||||
},
|
||||
{
|
||||
"name" : "cisco-ios-ips-bypass-security(22926)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22926"
|
||||
"name": "17397",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17397"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,16 +62,16 @@
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA05-292A.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#210524",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/210524"
|
||||
},
|
||||
{
|
||||
"name": "15134",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15134"
|
||||
},
|
||||
{
|
||||
"name": "VU#210524",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/210524"
|
||||
},
|
||||
{
|
||||
"name": "17250",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20051129 Opera 8.50 DoS with simple java applet",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/418201/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20051201 Re: Opera 8.50 DoS with simple java applet",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/418274/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.illegalaccess.org/exploit/opera85/OperaApplet.html",
|
||||
"refsource": "MISC",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "15648",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15648"
|
||||
},
|
||||
{
|
||||
"name": "20051129 Opera 8.50 DoS with simple java applet",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/418201/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20051201 Re: Opera 8.50 DoS with simple java applet",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/418274/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://research.microsoft.com/apps/pubs/default.aspx?id=79323",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
|
||||
"name": "safari-httpconnect-code-execution(51202)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51202"
|
||||
},
|
||||
{
|
||||
"name": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/35412"
|
||||
},
|
||||
{
|
||||
"name" : "safari-httpconnect-code-execution(51202)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51202"
|
||||
"name": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323",
|
||||
"refsource": "MISC",
|
||||
"url": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "8997",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/8997"
|
||||
},
|
||||
{
|
||||
"name": "35457",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/35457"
|
||||
},
|
||||
{
|
||||
"name": "8997",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/8997"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1652",
|
||||
"refsource": "VUPEN",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2009-2462",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,50 +53,135 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2009/mfsa2009-34.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2009/mfsa2009-34.html"
|
||||
"name": "265068",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=413085",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=413085"
|
||||
"name": "1020800",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=442227",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=442227"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=445177",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=445177"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=461861",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=461861"
|
||||
"name": "RHSA-2010:0153",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0153.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=463350",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=463350"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=466763",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=466763"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=468211",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=468211"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2009-7961",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html"
|
||||
},
|
||||
{
|
||||
"name": "36145",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36145"
|
||||
},
|
||||
{
|
||||
"name": "35944",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35944"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=461861",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=461861"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0650",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0650"
|
||||
},
|
||||
{
|
||||
"name": "35943",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35943"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=442227",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=442227"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2009:039",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2009:1162",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2009-1162.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2009/mfsa2009-34.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-34.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2010:0154",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0154.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10906",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10906"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=466763",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=466763"
|
||||
},
|
||||
{
|
||||
"name": "35758",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/35758"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-2152",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/2152"
|
||||
},
|
||||
{
|
||||
"name": "36005",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36005"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=445177",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=445177"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2009:1163",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2009-1163.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=472668",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=472668"
|
||||
},
|
||||
{
|
||||
"name": "35947",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35947"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2009:042",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=472950",
|
||||
"refsource": "CONFIRM",
|
||||
@ -107,105 +192,20 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=491134"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2009-7961",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2009:1162",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2009-1162.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2009:1163",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2009-1163.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2010:0153",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0153.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2010:0154",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0154.html"
|
||||
},
|
||||
{
|
||||
"name" : "265068",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1"
|
||||
},
|
||||
{
|
||||
"name" : "1020800",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2009:042",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2009:039",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name" : "35758",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/35758"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10906",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10906"
|
||||
},
|
||||
{
|
||||
"name": "35914",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35914"
|
||||
},
|
||||
{
|
||||
"name" : "35943",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/35943"
|
||||
},
|
||||
{
|
||||
"name" : "35944",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/35944"
|
||||
},
|
||||
{
|
||||
"name" : "35947",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/35947"
|
||||
},
|
||||
{
|
||||
"name" : "36145",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/36145"
|
||||
},
|
||||
{
|
||||
"name" : "36005",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/36005"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1972",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1972"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-2152",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/2152"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-0650",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/0650"
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=413085",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=413085"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3860",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3860"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2009-09-09-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html"
|
||||
"name": "ipod-iphone-exchange-security-bypass(53181)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53181"
|
||||
},
|
||||
{
|
||||
"name": "36342",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/36342"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2009-09-09-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "36677",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36677"
|
||||
},
|
||||
{
|
||||
"name" : "ipod-iphone-exchange-security-bypass(53181)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/53181"
|
||||
"name": "http://support.apple.com/kb/HT3860",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3860"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3860",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3860"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2009-09-09-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html"
|
||||
"name": "ipod-iphone-password-info-disclosure(53185)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53185"
|
||||
},
|
||||
{
|
||||
"name": "36335",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/36335"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2009-09-09-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "36677",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36677"
|
||||
},
|
||||
{
|
||||
"name" : "ipod-iphone-password-info-disclosure(53185)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/53185"
|
||||
"name": "http://support.apple.com/kb/HT3860",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3860"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2009-2909",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,55 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[linux-kernel] 20091002 [071/136] net ax25: Fix signed comparison in the sockopt handler",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://article.gmane.org/gmane.linux.kernel/896907"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20091007 More kernel CVE info (CVE-2009-2909)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=125494119617994&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=b7058842c940ad2c08dd829b21e5c92ebe3b8758",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=b7058842c940ad2c08dd829b21e5c92ebe3b8758"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.2"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=528887",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=528887"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2009-10525",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2009:054",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2009:056",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-864-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-864-1"
|
||||
},
|
||||
{
|
||||
"name" : "36635",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/36635"
|
||||
"name": "37351",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37351"
|
||||
},
|
||||
{
|
||||
"name": "37075",
|
||||
@ -108,9 +73,44 @@
|
||||
"url": "http://secunia.com/advisories/37075"
|
||||
},
|
||||
{
|
||||
"name" : "37351",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/37351"
|
||||
"name": "[oss-security] 20091007 More kernel CVE info (CVE-2009-2909)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=125494119617994&w=2"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2009:056",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "[linux-kernel] 20091002 [071/136] net ax25: Fix signed comparison in the sockopt handler",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://article.gmane.org/gmane.linux.kernel/896907"
|
||||
},
|
||||
{
|
||||
"name": "36635",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/36635"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2009-10525",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.2"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=b7058842c940ad2c08dd829b21e5c92ebe3b8758",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=b7058842c940ad2c08dd829b21e5c92ebe3b8758"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2009:054",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100128_00",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100128_00"
|
||||
"name": "38356",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38356"
|
||||
},
|
||||
{
|
||||
"name": "37953",
|
||||
@ -67,25 +67,25 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/62010"
|
||||
},
|
||||
{
|
||||
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100128_00",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100128_00"
|
||||
},
|
||||
{
|
||||
"name": "1023521",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1023521"
|
||||
},
|
||||
{
|
||||
"name" : "38356",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/38356"
|
||||
"name": "symantec-ans-key-unauth-access(55952)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55952"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0256",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0256"
|
||||
},
|
||||
{
|
||||
"name" : "symantec-ans-key-unauth-access(55952)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55952"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2009-3139",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.bugzilla.org/security/3.0.8/"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=515191",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=515191"
|
||||
},
|
||||
{
|
||||
"name": "36373",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/36373"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=515191",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=515191"
|
||||
},
|
||||
{
|
||||
"name": "36718",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2009-3618",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20091016 Re: viewvc: CVE request: XSS and illegal characters while printing name-value pairs",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2009/10/16/10"
|
||||
"name": "ADV-2009-2257",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/2257"
|
||||
},
|
||||
{
|
||||
"name" : "http://viewvc.tigris.org/source/browse/*checkout*/viewvc/tags/1.1.2/CHANGES?revision=2235&pathrev=HEAD",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://viewvc.tigris.org/source/browse/*checkout*/viewvc/tags/1.1.2/CHANGES?revision=2235&pathrev=HEAD"
|
||||
"name": "36292",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36292"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2009-8501",
|
||||
@ -72,35 +72,35 @@
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00566.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2009:017",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "56997",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/56997"
|
||||
},
|
||||
{
|
||||
"name" : "36292",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/36292"
|
||||
"name": "[oss-security] 20091016 Re: viewvc: CVE request: XSS and illegal characters while printing name-value pairs",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2009/10/16/10"
|
||||
},
|
||||
{
|
||||
"name": "36311",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36311"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-2257",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/2257"
|
||||
},
|
||||
{
|
||||
"name": "viewvc-view-xss(52430)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52430"
|
||||
},
|
||||
{
|
||||
"name": "http://viewvc.tigris.org/source/browse/*checkout*/viewvc/tags/1.1.2/CHANGES?revision=2235&pathrev=HEAD",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://viewvc.tigris.org/source/browse/*checkout*/viewvc/tags/1.1.2/CHANGES?revision=2235&pathrev=HEAD"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2009:017",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2015-0445",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2015-0492",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,26 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "RHSA-2015:0857",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0857.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:0833",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"
|
||||
},
|
||||
{
|
||||
"name": "1032120",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032120"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201603-11",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201603-11"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:0854",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0854.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:0857",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0857.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0773",
|
||||
"refsource": "SUSE",
|
||||
@ -83,19 +88,14 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:0833",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html"
|
||||
"name": "RHSA-2015:0854",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html"
|
||||
},
|
||||
{
|
||||
"name": "74129",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/74129"
|
||||
},
|
||||
{
|
||||
"name" : "1032120",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1032120"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-0775",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150610 Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=39280"
|
||||
},
|
||||
{
|
||||
"name": "1032561",
|
||||
"refsource": "SECTRACK",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1032562",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032562"
|
||||
},
|
||||
{
|
||||
"name": "20150610 Cisco Nexus and Cisco Multilayer Director Switches MOTD Telnet Login Reset Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39280"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2015-0838",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150322 Dulwich security issue",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.launchpad.net/dulwich-users/msg00829.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3206",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3206"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150322 Dulwich security issue",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.launchpad.net/dulwich-users/msg00829.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/535615/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "74846",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/74846"
|
||||
},
|
||||
{
|
||||
"name": "37132",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "http://packetstormsecurity.com/files/132062/WordPress-Free-Counter-1.1-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/132062/WordPress-Free-Counter-1.1-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name" : "74846",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/74846"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security_alert@emc.com",
|
||||
"ID": "CVE-2015-4540",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/132220/Joomla-EQ-Event-Calendar-SQL-Injection.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/132220/Joomla-EQ-Event-Calendar-SQL-Injection.html"
|
||||
},
|
||||
{
|
||||
"name": "75261",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75261"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/132220/Joomla-EQ-Event-Calendar-SQL-Injection.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/132220/Joomla-EQ-Event-Calendar-SQL-Injection.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2015-47.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2015-47.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11794",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11794"
|
||||
},
|
||||
{
|
||||
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=338da1c0ea0b2f8595d3a7b6d6c9548f7da3e27b",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=338da1c0ea0b2f8595d3a7b6d6c9548f7da3e27b"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
|
||||
"name": "79382",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/79382"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3505",
|
||||
@ -83,9 +73,19 @@
|
||||
"url": "https://security.gentoo.org/glsa/201604-05"
|
||||
},
|
||||
{
|
||||
"name" : "79382",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/79382"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11794",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11794"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2015-47.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2015-47.html"
|
||||
},
|
||||
{
|
||||
"name": "1034551",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2015-8964",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc"
|
||||
},
|
||||
{
|
||||
"name": "http://source.android.com/security/bulletin/2016-11-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://source.android.com/security/bulletin/2016-11-01.html"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/torvalds/linux/commit/dd42bf1197144ede075a9d4793123f7689e164bc",
|
||||
"refsource": "CONFIRM",
|
||||
|
@ -52,61 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20160623 Re: CVE for PHP 5.5.37 issues",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/06/23/4"
|
||||
},
|
||||
{
|
||||
"name": "http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://github.com/php/php-src/commit/a44c89e8af7c2410f4bfc5e097be2a5d0639a60c?w=1"
|
||||
},
|
||||
{
|
||||
"name" : "http://php.net/ChangeLog-5.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://php.net/ChangeLog-5.php"
|
||||
},
|
||||
{
|
||||
"name" : "http://php.net/ChangeLog-7.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://php.net/ChangeLog-7.php"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.php.net/bug.php?id=72340",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.php.net/bug.php?id=72340"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207170",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207170"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-09-20",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3618",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3618"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:2750",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:2013",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1761",
|
||||
"refsource": "SUSE",
|
||||
@ -117,10 +72,55 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:2750",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
|
||||
},
|
||||
{
|
||||
"name": "http://php.net/ChangeLog-5.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://php.net/ChangeLog-5.php"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.php.net/bug.php?id=72340",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.php.net/bug.php?id=72340"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20160623 Re: CVE for PHP 5.5.37 issues",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/23/4"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3618",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3618"
|
||||
},
|
||||
{
|
||||
"name": "http://php.net/ChangeLog-7.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://php.net/ChangeLog-7.php"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207170",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207170"
|
||||
},
|
||||
{
|
||||
"name": "91398",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91398"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:2013",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-2186",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -58,15 +58,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
||||
},
|
||||
{
|
||||
"name" : "102664",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/102664"
|
||||
},
|
||||
{
|
||||
"name": "1040214",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040214"
|
||||
},
|
||||
{
|
||||
"name": "102664",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102664"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
|
||||
},
|
||||
{
|
||||
"name": "104828",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104828"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -69,11 +69,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
|
||||
},
|
||||
{
|
||||
"name": "105630",
|
||||
"refsource": "BID",
|
||||
@ -83,6 +78,11 @@
|
||||
"name": "1041897",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041897"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "chrome-cve-admin@google.com",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2018-6081",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,20 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://crbug.com/797525",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://crbug.com/797525"
|
||||
},
|
||||
{
|
||||
"name": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4182",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4182"
|
||||
"name": "103297",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103297"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:0484",
|
||||
@ -74,9 +69,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:0484"
|
||||
},
|
||||
{
|
||||
"name" : "103297",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/103297"
|
||||
"name": "https://crbug.com/797525",
|
||||
"refsource": "MISC",
|
||||
"url": "https://crbug.com/797525"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4182",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4182"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "RHSA-2018:0546",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:0546"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/ceph/ceph/pull/20488",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/ceph/ceph/pull/20488"
|
||||
},
|
||||
{
|
||||
"name": "http://tracker.ceph.com/issues/23039",
|
||||
"refsource": "CONFIRM",
|
||||
@ -63,24 +73,14 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546611"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/ceph/ceph/pull/20488",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/ceph/ceph/pull/20488"
|
||||
"name": "RHSA-2018:0548",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:0548"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2018-ed907ef9a0",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/74VI6EPZ6LD2O4JJXJBTYQ4U4VUO2ZDO/"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:0546",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:0546"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:0548",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:0548"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14428"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66"
|
||||
},
|
||||
{
|
||||
"name": "https://www.wireshark.org/security/wnpa-sec-2018-06.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.wireshark.org/security/wnpa-sec-2018-06.html"
|
||||
},
|
||||
{
|
||||
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66"
|
||||
},
|
||||
{
|
||||
"name": "103158",
|
||||
"refsource": "BID",
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-135-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-135-01"
|
||||
},
|
||||
{
|
||||
"name": "104190",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104190"
|
||||
},
|
||||
{
|
||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-135-01",
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-135-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user