mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
f31c0223fd
commit
832e99e667
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2002-1259",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020704 nn remote format string vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://online.securityfocus.com/archive/1/280639"
|
||||
"name": "27086",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/27086"
|
||||
},
|
||||
{
|
||||
"name": "5160",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5160"
|
||||
},
|
||||
{
|
||||
"name" : "27086",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/27086"
|
||||
},
|
||||
{
|
||||
"name": "nn-error-msg-format-string(9491)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/9491.php"
|
||||
},
|
||||
{
|
||||
"name": "20020704 nn remote format string vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://online.securityfocus.com/archive/1/280639"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20030428 Pi3Web 2.0.1 DoS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=105155818012718&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20030512 Unix Version of the Pi3web DoS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=105275789410250&w=2"
|
||||
"name": "pi3web-get-request-bo(11889)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11889"
|
||||
},
|
||||
{
|
||||
"name": "7555",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/7555"
|
||||
},
|
||||
{
|
||||
"name" : "pi3web-get-request-bo(11889)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/11889"
|
||||
"name": "20030512 Unix Version of the Pi3web DoS",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=105275789410250&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20030428 Pi3Web 2.0.1 DoS",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=105155818012718&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20030627 VMware Workstation 4.0: Possible privilege escalation on the host",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=105673688529147&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1019",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1019"
|
||||
},
|
||||
{
|
||||
"name": "20030627 VMware Workstation 4.0: Possible privilege escalation on the host",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=105673688529147&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "SGI",
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20030701-01-P"
|
||||
},
|
||||
{
|
||||
"name" : "8587",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/8587"
|
||||
},
|
||||
{
|
||||
"name": "irix-nsd-map-dos(12635)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12635"
|
||||
},
|
||||
{
|
||||
"name": "8587",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/8587"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20030724 Integrigy Security Alert - Oracle E-Business Suite AOL/J Setup Test Information Disclosure",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=105906689120237&w=2"
|
||||
"name": "8268",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/8268"
|
||||
},
|
||||
{
|
||||
"name": "http://otn.oracle.com/deploy/security/pdf/2003alert55.pdf",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://otn.oracle.com/deploy/security/pdf/2003alert55.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "8268",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/8268"
|
||||
"name": "20030724 Integrigy Security Alert - Oracle E-Business Suite AOL/J Setup Test Information Disclosure",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=105906689120237&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20030725 Oracle Extproc Buffer Overflow (#NISR25072003)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=105914979629857&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20030725 Oracle Extproc Buffer Overflow (#NISR25072003)",
|
||||
"refsource" : "NTBUGTRAQ",
|
||||
"url" : "http://marc.info/?l=ntbugtraq&m=105915485303327&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20030725 question about oracle advisory",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=105916455814904&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://otn.oracle.com/deploy/security/pdf/2003alert57.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://otn.oracle.com/deploy/security/pdf/2003alert57.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "20030912 Update to the Oracle EXTPROC advisory",
|
||||
"refsource" : "VULNWATCH",
|
||||
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0105.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#936868",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/936868"
|
||||
"name": "20030725 question about oracle advisory",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=105916455814904&w=2"
|
||||
},
|
||||
{
|
||||
"name": "8267",
|
||||
@ -91,6 +71,26 @@
|
||||
"name": "oracle-extproc-bo(12721)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12721"
|
||||
},
|
||||
{
|
||||
"name": "20030912 Update to the Oracle EXTPROC advisory",
|
||||
"refsource": "VULNWATCH",
|
||||
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0105.html"
|
||||
},
|
||||
{
|
||||
"name": "20030725 Oracle Extproc Buffer Overflow (#NISR25072003)",
|
||||
"refsource": "NTBUGTRAQ",
|
||||
"url": "http://marc.info/?l=ntbugtraq&m=105915485303327&w=2"
|
||||
},
|
||||
{
|
||||
"name": "VU#936868",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/936868"
|
||||
},
|
||||
{
|
||||
"name": "20030725 Oracle Extproc Buffer Overflow (#NISR25072003)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=105914979629857&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "8120",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/8120"
|
||||
},
|
||||
{
|
||||
"name": "gosa-plugin-file-include(11408)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11408"
|
||||
},
|
||||
{
|
||||
"name": "20030224 GOnicus System Administrator php injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -71,16 +81,6 @@
|
||||
"name": "1006162",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1006162"
|
||||
},
|
||||
{
|
||||
"name" : "8120",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/8120"
|
||||
},
|
||||
{
|
||||
"name" : "gosa-plugin-file-include(11408)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/11408"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20031022 IE6 CSS-Crash",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/342010"
|
||||
"name": "3295",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3295"
|
||||
},
|
||||
{
|
||||
"name": "8874",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/8874"
|
||||
},
|
||||
{
|
||||
"name" : "3295",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3295"
|
||||
"name": "20031022 IE6 CSS-Crash",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/342010"
|
||||
},
|
||||
{
|
||||
"name": "ie-scrollbarbasecolor-dos(13809)",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.securiteam.com/windowsntfocus/6S0052K8LQ.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.securiteam.com/windowsntfocus/6S0052K8LQ.html"
|
||||
"name": "tinyweb-httpget-dos(13402)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13402"
|
||||
},
|
||||
{
|
||||
"name": "8810",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/8810"
|
||||
},
|
||||
{
|
||||
"name" : "tinyweb-httpget-dos(13402)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/13402"
|
||||
"name": "http://www.securiteam.com/windowsntfocus/6S0052K8LQ.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securiteam.com/windowsntfocus/6S0052K8LQ.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040305 Invision Power Board v1.3 Final Cross Site Scripting Vulnerabillity",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=107851589701916&w=2"
|
||||
},
|
||||
{
|
||||
"name": "9768",
|
||||
"refsource": "BID",
|
||||
@ -67,15 +62,20 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/4154"
|
||||
},
|
||||
{
|
||||
"name" : "11053",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/11053"
|
||||
},
|
||||
{
|
||||
"name": "invision-xss(15403)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15403"
|
||||
},
|
||||
{
|
||||
"name": "20040305 Invision Power Board v1.3 Final Cross Site Scripting Vulnerabillity",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=107851589701916&w=2"
|
||||
},
|
||||
{
|
||||
"name": "11053",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/11053"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,94 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBTU01210",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=112861397904255&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT4743",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=112861397904255&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX01164",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/418882/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT4884",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/418882/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBST02161",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061264",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MS05-019",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019"
|
||||
},
|
||||
{
|
||||
"name" : "MS06-064",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064"
|
||||
},
|
||||
{
|
||||
"name" : "SCOSA-2006.4",
|
||||
"refsource" : "SCO",
|
||||
"url" : "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt"
|
||||
},
|
||||
{
|
||||
"name" : "57746",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1"
|
||||
},
|
||||
{
|
||||
"name" : "101658",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1"
|
||||
},
|
||||
{
|
||||
"name" : "13124",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/13124"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3983",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3983"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:3458",
|
||||
"name": "oval:org.mitre.oval:def:412",
|
||||
"refsource": "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3458"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:1910",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1910"
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A412"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:4804",
|
||||
@ -148,9 +63,19 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4804"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:1177",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1177"
|
||||
"name": "13124",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/13124"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX01164",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/418882/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "SSRT061264",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:176",
|
||||
@ -158,20 +83,115 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A176"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:211",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A211"
|
||||
"name": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:412",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A412"
|
||||
"name": "MS06-064",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:514",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A514"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:1910",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1910"
|
||||
},
|
||||
{
|
||||
"name": "SSRT4743",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=112861397904255&w=2"
|
||||
},
|
||||
{
|
||||
"name": "HPSBTU01210",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=112861397904255&w=2"
|
||||
},
|
||||
{
|
||||
"name": "57746",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1"
|
||||
},
|
||||
{
|
||||
"name": "MS05-019",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019"
|
||||
},
|
||||
{
|
||||
"name": "101658",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1"
|
||||
},
|
||||
{
|
||||
"name": "SCOSA-2006.4",
|
||||
"refsource": "SCO",
|
||||
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:1177",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1177"
|
||||
},
|
||||
{
|
||||
"name": "HPSBST02161",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "18317",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18317"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:3458",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3458"
|
||||
},
|
||||
{
|
||||
"name": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:211",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A211"
|
||||
},
|
||||
{
|
||||
"name": "19",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/19"
|
||||
},
|
||||
{
|
||||
"name": "SSRT4884",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/418882/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "57",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/57"
|
||||
},
|
||||
{
|
||||
"name": "22341",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22341"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3983",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3983"
|
||||
},
|
||||
{
|
||||
"name": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:53",
|
||||
"refsource": "OVAL",
|
||||
@ -181,26 +201,6 @@
|
||||
"name": "oval:org.mitre.oval:def:622",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A622"
|
||||
},
|
||||
{
|
||||
"name" : "18317",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18317"
|
||||
},
|
||||
{
|
||||
"name" : "22341",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22341"
|
||||
},
|
||||
{
|
||||
"name" : "19",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/19"
|
||||
},
|
||||
{
|
||||
"name" : "57",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/57"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.networksecurity.fi/advisories/outlook-bcc.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.networksecurity.fi/advisories/outlook-bcc.html"
|
||||
},
|
||||
{
|
||||
"name" : "843555",
|
||||
"refsource" : "MSKB",
|
||||
"url" : "http://support.microsoft.com/kb/843555"
|
||||
},
|
||||
{
|
||||
"name": "11040",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11040"
|
||||
},
|
||||
{
|
||||
"name" : "9167",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/9167"
|
||||
"name": "http://www.networksecurity.fi/advisories/outlook-bcc.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.networksecurity.fi/advisories/outlook-bcc.html"
|
||||
},
|
||||
{
|
||||
"name": "1011067",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1011067"
|
||||
},
|
||||
{
|
||||
"name": "outlook-email-address-disclosure(17098)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17098"
|
||||
},
|
||||
{
|
||||
"name": "843555",
|
||||
"refsource": "MSKB",
|
||||
"url": "http://support.microsoft.com/kb/843555"
|
||||
},
|
||||
{
|
||||
"name": "12376",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/12376"
|
||||
},
|
||||
{
|
||||
"name" : "outlook-email-address-disclosure(17098)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17098"
|
||||
"name": "9167",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/9167"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,16 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://members.lycos.co.uk/r34ct/main/Caravan/Caravan.txt"
|
||||
},
|
||||
{
|
||||
"name": "10763",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://www.secunia.com/advisories/10763/"
|
||||
},
|
||||
{
|
||||
"name": "caravan-dotdot-directory-traveral(15004)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15004"
|
||||
},
|
||||
{
|
||||
"name": "9555",
|
||||
"refsource": "BID",
|
||||
@ -71,16 +81,6 @@
|
||||
"name": "1008913",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1008913"
|
||||
},
|
||||
{
|
||||
"name" : "10763",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://www.secunia.com/advisories/10763/"
|
||||
},
|
||||
{
|
||||
"name" : "caravan-dotdot-directory-traveral(15004)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15004"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.astaro.org/showflat.php?Cat=&Number=51459&page=0&view=collapsed&sb=5&o=&fpart=1#51459",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.astaro.org/showflat.php?Cat=&Number=51459&page=0&view=collapsed&sb=5&o=&fpart=1#51459"
|
||||
},
|
||||
{
|
||||
"name": "11406",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/11406"
|
||||
},
|
||||
{
|
||||
"name" : "1012065",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1012065"
|
||||
"name": "http://www.astaro.org/showflat.php?Cat=&Number=51459&page=0&view=collapsed&sb=5&o=&fpart=1#51459",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.astaro.org/showflat.php?Cat=&Number=51459&page=0&view=collapsed&sb=5&o=&fpart=1#51459"
|
||||
},
|
||||
{
|
||||
"name": "astaro-pptp-info-disclosure(17959)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17959"
|
||||
},
|
||||
{
|
||||
"name": "13089",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://secunia.com/advisories/13089"
|
||||
},
|
||||
{
|
||||
"name" : "astaro-pptp-info-disclosure(17959)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17959"
|
||||
"name": "1012065",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1012065"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2008-2257",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080812 ZDI-08-050: Microsoft Internet Explorer XHTML Rendering Memory Corruption Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/495430/100/0/threaded"
|
||||
"name": "ADV-2008-2349",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2349"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-050/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-050/"
|
||||
"name": "TA08-225A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html"
|
||||
},
|
||||
{
|
||||
"name": "30613",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30613"
|
||||
},
|
||||
{
|
||||
"name": "1020674",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020674"
|
||||
},
|
||||
{
|
||||
"name": "HPSBST02360",
|
||||
@ -78,34 +88,24 @@
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045"
|
||||
},
|
||||
{
|
||||
"name" : "TA08-225A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-225A.html"
|
||||
"name": "20080812 ZDI-08-050: Microsoft Internet Explorer XHTML Rendering Memory Corruption Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/495430/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "30613",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30613"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:5266",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5266"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2349",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2349"
|
||||
},
|
||||
{
|
||||
"name" : "1020674",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1020674"
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-050/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-050/"
|
||||
},
|
||||
{
|
||||
"name": "31375",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31375"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:5266",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5266"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,19 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/493087/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080604 ZDI-08-035: CA ETrust Secure Content Manager Gateway FTP PASV Stack Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/493084/100/0/threaded"
|
||||
"name": "30518",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30518"
|
||||
},
|
||||
{
|
||||
"name": "http://dvlabs.tippingpoint.com/advisory/TPTI-08-05",
|
||||
"refsource": "MISC",
|
||||
"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-08-05"
|
||||
},
|
||||
{
|
||||
"name": "29528",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29528"
|
||||
},
|
||||
{
|
||||
"name": "20080604 ZDI-08-036: CA ETrust Secure Content Manager Gateway FTP LIST Stack Overflow",
|
||||
@ -73,20 +83,20 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/493124/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://dvlabs.tippingpoint.com/advisory/TPTI-08-05",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://dvlabs.tippingpoint.com/advisory/TPTI-08-05"
|
||||
"name": "ADV-2008-1741",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1741/references"
|
||||
},
|
||||
{
|
||||
"name": "1020167",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020167"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-035/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-035/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-036",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-036"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36408",
|
||||
"refsource": "CONFIRM",
|
||||
@ -98,29 +108,19 @@
|
||||
"url": "https://support.ca.com/irj/portal/anonymous/SolutionResults?aparNo=QO99987&os=NT&actionID=3"
|
||||
},
|
||||
{
|
||||
"name" : "29528",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29528"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-1741",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/1741/references"
|
||||
},
|
||||
{
|
||||
"name" : "1020167",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1020167"
|
||||
},
|
||||
{
|
||||
"name" : "30518",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30518"
|
||||
"name": "20080604 ZDI-08-035: CA ETrust Secure Content Manager Gateway FTP PASV Stack Overflow Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/493084/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ca-etrust-scm-ftp-bo(42821)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42821"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-036",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-036"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2012-0733",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21592188",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21592188"
|
||||
},
|
||||
{
|
||||
"name" : "53247",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/53247"
|
||||
"name": "ae-serviceacct-session-hijacking(74374)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74374"
|
||||
},
|
||||
{
|
||||
"name": "48967",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48967"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg21592188",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg21592188"
|
||||
},
|
||||
{
|
||||
"name": "48968",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48968"
|
||||
},
|
||||
{
|
||||
"name" : "ae-serviceacct-session-hijacking(74374)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/74374"
|
||||
"name": "53247",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53247"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "47896",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/47896"
|
||||
},
|
||||
{
|
||||
"name": "http://service.real.com/realplayer/security/02062012_player/en/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://service.real.com/realplayer/security/02062012_player/en/"
|
||||
},
|
||||
{
|
||||
"name" : "51884",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/51884"
|
||||
},
|
||||
{
|
||||
"name": "78912",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/78912"
|
||||
},
|
||||
{
|
||||
"name" : "47896",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/47896"
|
||||
"name": "51884",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/51884"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://secpod.org/blog/?p=450",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secpod.org/blog/?p=450"
|
||||
},
|
||||
{
|
||||
"name" : "51902",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/51902"
|
||||
"name": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt"
|
||||
},
|
||||
{
|
||||
"name": "apache-struts-multiple-xss(72888)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72888"
|
||||
},
|
||||
{
|
||||
"name": "51902",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/51902"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-1135",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,101 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20120306 Re: CVE Request -- FreeType: Multiple security flaws to be fixed in v2.4.9",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/03/06/16"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=733512",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=733512"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=800593",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=800593"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5503",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5503"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2012-09-19-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201204-04",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201204-04.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2012:057",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2012:0483",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2012:0521",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2012:0484",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2012:0489",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1403-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1403-1"
|
||||
},
|
||||
{
|
||||
"name" : "52318",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/52318"
|
||||
},
|
||||
{
|
||||
"name" : "1026765",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1026765"
|
||||
},
|
||||
{
|
||||
"name" : "48918",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48918"
|
||||
},
|
||||
{
|
||||
"name" : "48951",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48951"
|
||||
},
|
||||
{
|
||||
"name" : "48822",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48822"
|
||||
},
|
||||
{
|
||||
"name" : "48973",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48973"
|
||||
},
|
||||
{
|
||||
"name": "48797",
|
||||
"refsource": "SECUNIA",
|
||||
@ -156,6 +61,101 @@
|
||||
"name": "48508",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48508"
|
||||
},
|
||||
{
|
||||
"name": "48822",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48822"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:057",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2012-09-19-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5503",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5503"
|
||||
},
|
||||
{
|
||||
"name": "52318",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/52318"
|
||||
},
|
||||
{
|
||||
"name": "USN-1403-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1403-1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512"
|
||||
},
|
||||
{
|
||||
"name": "48918",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48918"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120306 Re: CVE Request -- FreeType: Multiple security flaws to be fixed in v2.4.9",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/03/06/16"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:0484",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:0521",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name": "48973",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48973"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:0483",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "1026765",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1026765"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2012:0489",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "48951",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48951"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=800593",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=800593"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201204-04",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201204-04.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS12-071",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-071"
|
||||
},
|
||||
{
|
||||
"name" : "TA12-318A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA12-318A.html"
|
||||
},
|
||||
{
|
||||
"name" : "56421",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/56421"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:15886",
|
||||
"refsource": "OVAL",
|
||||
@ -77,10 +62,25 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1027749"
|
||||
},
|
||||
{
|
||||
"name": "MS12-071",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-071"
|
||||
},
|
||||
{
|
||||
"name": "56421",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/56421"
|
||||
},
|
||||
{
|
||||
"name": "51202",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51202"
|
||||
},
|
||||
{
|
||||
"name": "TA12-318A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA12-318A.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-1607",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "48647",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48647"
|
||||
},
|
||||
{
|
||||
"name": "48622",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48622"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120329 Re: CVE request: TYPO3-CORE-SA-2012-001",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/03/30/4"
|
||||
},
|
||||
{
|
||||
"name": "80761",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/80761"
|
||||
},
|
||||
{
|
||||
"name": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-001/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,21 +86,6 @@
|
||||
"name": "52771",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/52771"
|
||||
},
|
||||
{
|
||||
"name" : "80761",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/80761"
|
||||
},
|
||||
{
|
||||
"name" : "48622",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48622"
|
||||
},
|
||||
{
|
||||
"name" : "48647",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48647"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2012-5062",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2012-5072",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,34 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21616490",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21616490"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21621154",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21621154"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21620037",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21620037"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html"
|
||||
"name": "SUSE-SU-2012:1398",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201406-32",
|
||||
@ -88,44 +63,9 @@
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02832",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101042",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBOV02833",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101043",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:1385",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1385.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:1386",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1386.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:1391",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1391.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:1392",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1392.html"
|
||||
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1466",
|
||||
@ -133,89 +73,149 @@
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1466.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:1467",
|
||||
"name": "RHSA-2012:1386",
|
||||
"refsource": "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1467.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1455",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1456",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2012:1423",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2012:1398",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2012:1595",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html"
|
||||
},
|
||||
{
|
||||
"name" : "56083",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/56083"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16522",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16522"
|
||||
},
|
||||
{
|
||||
"name" : "51028",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51028"
|
||||
},
|
||||
{
|
||||
"name" : "51029",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51029"
|
||||
},
|
||||
{
|
||||
"name" : "51141",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51141"
|
||||
},
|
||||
{
|
||||
"name" : "51326",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51326"
|
||||
},
|
||||
{
|
||||
"name" : "51327",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51327"
|
||||
},
|
||||
{
|
||||
"name" : "51390",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51390"
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1386.html"
|
||||
},
|
||||
{
|
||||
"name": "51438",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51438"
|
||||
},
|
||||
{
|
||||
"name": "51141",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51141"
|
||||
},
|
||||
{
|
||||
"name": "SSRT101043",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21621154",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21621154"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2012:1423",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1455",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
|
||||
},
|
||||
{
|
||||
"name": "56083",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/56083"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1391",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1391.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21620037",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21620037"
|
||||
},
|
||||
{
|
||||
"name": "51029",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51029"
|
||||
},
|
||||
{
|
||||
"name": "HPSBOV02833",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
|
||||
},
|
||||
{
|
||||
"name": "51166",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51166"
|
||||
},
|
||||
{
|
||||
"name": "51390",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51390"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1392",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1392.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:1595",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21616490",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21616490"
|
||||
},
|
||||
{
|
||||
"name": "51327",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51327"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16522",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16522"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1467",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1467.html"
|
||||
},
|
||||
{
|
||||
"name": "SSRT101042",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
|
||||
},
|
||||
{
|
||||
"name": "51028",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51028"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1456",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
|
||||
},
|
||||
{
|
||||
"name": "51326",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51326"
|
||||
},
|
||||
{
|
||||
"name": "javaruntimeenvironment-security-info-disc(79434)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79434"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1385",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1385.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02832",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-5505",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/11/10/1"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt"
|
||||
},
|
||||
{
|
||||
"name" : "https://plone.org/products/plone-hotfix/releases/20121106",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://plone.org/products/plone-hotfix/releases/20121106"
|
||||
"name": "[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/11/10/1"
|
||||
},
|
||||
{
|
||||
"name": "https://plone.org/products/plone/security/advisories/20121106/21",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://plone.org/products/plone/security/advisories/20121106/21"
|
||||
},
|
||||
{
|
||||
"name": "https://plone.org/products/plone-hotfix/releases/20121106",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://plone.org/products/plone-hotfix/releases/20121106"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-5517",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,80 +52,80 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20121113 Re: CVE request -- Linux kernel: mm/hotplug: failure in propagating hot-added memory to other nodes",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/11/13/11"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=08dff7b7d629807dbb1f398c68dd9cd58dd657a1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=08dff7b7d629807dbb1f398c68dd9cd58dd657a1"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=875374",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=875374"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:1580",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1580.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2012:1679",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0925",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1678-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1678-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1671-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1671-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1673-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1673-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1677-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1677-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-1679-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1679-1"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1580",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1580.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:1679",
|
||||
"refsource": "SUSE",
|
||||
"url": "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-1673-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1673-1"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20121113 Re: CVE request -- Linux kernel: mm/hotplug: failure in propagating hot-added memory to other nodes",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/11"
|
||||
},
|
||||
{
|
||||
"name": "USN-1678-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1678-1"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=08dff7b7d629807dbb1f398c68dd9cd58dd657a1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=08dff7b7d629807dbb1f398c68dd9cd58dd657a1"
|
||||
},
|
||||
{
|
||||
"name": "56527",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/56527"
|
||||
},
|
||||
{
|
||||
"name": "USN-1671-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1671-1"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0925",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-1677-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1677-1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=875374",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875374"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html"
|
||||
"name": "1038228",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038228"
|
||||
},
|
||||
{
|
||||
"name": "97556",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/97556"
|
||||
},
|
||||
{
|
||||
"name" : "1038228",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038228"
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html"
|
||||
"name": "1038228",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038228"
|
||||
},
|
||||
{
|
||||
"name": "97556",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/97556"
|
||||
},
|
||||
{
|
||||
"name" : "1038228",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038228"
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb17-17.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201707-15",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201707-15"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1439",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1439"
|
||||
},
|
||||
{
|
||||
"name": "99023",
|
||||
"refsource": "BID",
|
||||
@ -76,6 +66,16 @@
|
||||
"name": "1038655",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038655"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1439",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1439"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201707-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201707-15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20170320 CVE-2017-7183 ExtraPuTTY v029_RC2 TFTP Denial Of Service",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/540300/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "41639",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/41639/"
|
||||
"name": "96973",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96973"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/141705/ExtraPuTTY-029_rc2-Denial-Of-Service.html",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://packetstormsecurity.com/files/141705/ExtraPuTTY-029_rc2-Denial-Of-Service.html"
|
||||
},
|
||||
{
|
||||
"name" : "96973",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/96973"
|
||||
"name": "41639",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/41639/"
|
||||
},
|
||||
{
|
||||
"name": "20170320 CVE-2017-7183 ExtraPuTTY v029_RC2 TFTP Denial Of Service",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/540300/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://x-stream.github.io/CVE-2017-7957.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://x-stream.github.io/CVE-2017-7957.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www-prd-trops.events.ibm.com/node/715749",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www-prd-trops.events.ibm.com/node/715749"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3841",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2017/dsa-3841"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2888",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2888"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2889",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2889"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1832",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1832"
|
||||
},
|
||||
{
|
||||
"name" : "100687",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/100687"
|
||||
"name": "RHSA-2017:2889",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2889"
|
||||
},
|
||||
{
|
||||
"name": "1039499",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039499"
|
||||
},
|
||||
{
|
||||
"name": "https://www-prd-trops.events.ibm.com/node/715749",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www-prd-trops.events.ibm.com/node/715749"
|
||||
},
|
||||
{
|
||||
"name": "xstream-cve20177957-dos(125800)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/125800"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3841",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3841"
|
||||
},
|
||||
{
|
||||
"name": "http://x-stream.github.io/CVE-2017-7957.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://x-stream.github.io/CVE-2017-7957.html"
|
||||
},
|
||||
{
|
||||
"name": "100687",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/100687"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-13260",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/CoinToken",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/CoinToken"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/TeamSeri0us/pocs/tree/master/soundtouch/2018_09_03",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/TeamSeri0us/pocs/tree/master/soundtouch/2018_09_03"
|
||||
},
|
||||
{
|
||||
"name": "https://gitlab.com/soundtouch/soundtouch/issues/14",
|
||||
"refsource": "MISC",
|
||||
"url": "https://gitlab.com/soundtouch/soundtouch/issues/14"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/TeamSeri0us/pocs/tree/master/soundtouch/2018_09_03",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/TeamSeri0us/pocs/tree/master/soundtouch/2018_09_03"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/44444/"
|
||||
},
|
||||
{
|
||||
"name" : "https://wordpress.org/plugins/wp-file-upload/#developers",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://wordpress.org/plugins/wp-file-upload/#developers"
|
||||
},
|
||||
{
|
||||
"name": "https://www.iptanus.com/new-version-4-3-4-of-wordpress-file-upload-plugin/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.iptanus.com/new-version-4-3-4-of-wordpress-file-upload-plugin/"
|
||||
},
|
||||
{
|
||||
"name": "https://wordpress.org/plugins/wp-file-upload/#developers",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wordpress.org/plugins/wp-file-upload/#developers"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user