mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
426b0aaf83
commit
8567cca1fe
@ -53,19 +53,19 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20010325 MDaemon IMAP Denial Of Service ",
|
"name": "mdaemon-imap-command-dos(6279)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6279"
|
||||||
|
},
|
||||||
|
{
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
|
"name": "20010325 MDaemon IMAP Denial Of Service",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0365.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0365.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "2508",
|
"name": "2508",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/2508"
|
"url": "http://www.securityfocus.com/bid/2508"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "mdaemon-imap-command-dos(6279)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6279"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20011128 A Vulnerability in IOS Firewall Feature Set",
|
"name": "ios-cbac-bypass-acl(7614)",
|
||||||
"refsource" : "CISCO",
|
"refsource": "XF",
|
||||||
"url" : "http://www.cisco.com/warp/public/707/IOS-cbac-dynacl-pub.shtml"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7614"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#362483",
|
"name": "VU#362483",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://www.osvdb.org/808"
|
"url": "http://www.osvdb.org/808"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ios-cbac-bypass-acl(7614)",
|
"name": "20011128 A Vulnerability in IOS Firewall Feature Set",
|
||||||
"refsource" : "XF",
|
"refsource": "CISCO",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7614"
|
"url": "http://www.cisco.com/warp/public/707/IOS-cbac-dynacl-pub.shtml"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20011130 ASI Oracle Security Alert: Oracle Home Environment Variable Buffer Overflow",
|
"name": "3138",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=100716693806967&w=2"
|
"url": "http://www.securityfocus.com/bid/3138"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://otn.oracle.com/deploy/security/pdf/dbsmp_alert.pdf",
|
"name": "http://otn.oracle.com/deploy/security/pdf/dbsmp_alert.pdf",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://otn.oracle.com/deploy/security/pdf/dbsmp_alert.pdf"
|
"url": "http://otn.oracle.com/deploy/security/pdf/dbsmp_alert.pdf"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3138",
|
"name": "20011130 ASI Oracle Security Alert: Oracle Home Environment Variable Buffer Overflow",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/3138"
|
"url": "http://marc.info/?l=bugtraq&m=100716693806967&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oracle-dbsnmp-home-bo(7643)",
|
"name": "oracle-dbsnmp-home-bo(7643)",
|
||||||
|
@ -52,26 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20011009 Cisco CDP attacks",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/219257"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20011009 Cisco Systems - Vulnerability in CDP",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/219305"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#139491",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/139491"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "3412",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/3412"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1969",
|
"name": "1969",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -81,6 +61,26 @@
|
|||||||
"name": "cisco-ios-cdp-dos(7242)",
|
"name": "cisco-ios-cdp-dos(7242)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7242"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7242"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#139491",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/139491"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20011009 Cisco CDP attacks",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/219257"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "3412",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/3412"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20011009 Cisco Systems - Vulnerability in CDP",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/219305"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20010627 Active Web Classifieds failure to authenticate leads to arbitrary code execution",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0386.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "2942",
|
"name": "2942",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/2942"
|
"url": "http://www.securityfocus.com/bid/2942"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "12326",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/12326"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "active-classifieds-admin-access(6754)",
|
"name": "active-classifieds-admin-access(6754)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6754"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6754"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20010627 Active Web Classifieds failure to authenticate leads to arbitrary code execution",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0386.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "12326",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/12326"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "VU#25309",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/25309"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ssh-rc4-modify-packets(6449)",
|
"name": "ssh-rc4-modify-packets(6449)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6449"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6449"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#25309",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/25309"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "1723",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/1723"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1725",
|
"name": "1725",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/1725"
|
"url": "https://www.exploit-db.com/exploits/1725"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "17745",
|
"name": "adv-guestbook-addentry-file-include(26217)",
|
||||||
"refsource" : "BID",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/bid/17745"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26217"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1723",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/1723"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-1600",
|
"name": "ADV-2006-1600",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/1600"
|
"url": "http://www.vupen.com/english/advisories/2006/1600"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "17745",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/17745"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "19905",
|
"name": "19905",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/19905"
|
"url": "http://secunia.com/advisories/19905"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "adv-guestbook-addentry-file-include(26217)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26217"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||||
"ID": "CVE-2006-2311",
|
"ID": "CVE-2006-2311",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://secunia.com/secunia_research/2006-18/advisory",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://secunia.com/secunia_research/2006-18/advisory"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "18623",
|
"name": "18623",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/18623"
|
"url": "http://www.securityfocus.com/bid/18623"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2006-2502",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/2502"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "19180",
|
"name": "19180",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/19180"
|
"url": "http://secunia.com/advisories/19180"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://secunia.com/secunia_research/2006-18/advisory",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://secunia.com/secunia_research/2006-18/advisory"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-2502",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/2502"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "32402",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/32402"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[debian-devel] 20080813 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages",
|
"name": "[debian-devel] 20080813 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -62,21 +67,16 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://uvw.ru/report.sid.txt"
|
"url": "http://uvw.ru/report.sid.txt"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-1724",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2009/dsa-1724"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "32402",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/32402"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "33955",
|
"name": "33955",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/33955"
|
"url": "http://secunia.com/advisories/33955"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1724",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2009/dsa-1724"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "moodle-spellchecklogic-symlink(46708)",
|
"name": "moodle-spellchecklogic-symlink(46708)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,6 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "50902",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/50902"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "4836",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/4836"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33274",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/33274"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "7543",
|
"name": "7543",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -62,21 +77,6 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/32966"
|
"url": "http://www.securityfocus.com/bid/32966"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "50902",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/50902"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33274",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/33274"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "4836",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/4836"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "pageflipimagegal-getconfig-dir-traversal(47568)",
|
"name": "pageflipimagegal-getconfig-dir-traversal(47568)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[dovecot] 20110511 v2.0.13 released",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://dovecot.org/pipermail/dovecot/2011-May/059085.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20110518 Dovecot releases",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://openwall.com/lists/oss-security/2011/05/18/4"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.dovecot.org/doc/NEWS-2.0",
|
"name": "http://www.dovecot.org/doc/NEWS-2.0",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.dovecot.org/doc/NEWS-2.0"
|
"url": "http://www.dovecot.org/doc/NEWS-2.0"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[dovecot] 20110511 v2.0.13 released",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://dovecot.org/pipermail/dovecot/2011-May/059085.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:0520",
|
"name": "RHSA-2013:0520",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0520.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0520.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "52311",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/52311"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "48003",
|
"name": "48003",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/48003"
|
"url": "http://www.securityfocus.com/bid/48003"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "52311",
|
"name": "[oss-security] 20110518 Dovecot releases",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MLIST",
|
||||||
"url" : "http://secunia.com/advisories/52311"
|
"url": "http://openwall.com/lists/oss-security/2011/05/18/4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "dovecot-scriptlogin-sec-bypass(67675)",
|
"name": "dovecot-scriptlogin-sec-bypass(67675)",
|
||||||
|
@ -52,41 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[netfilter-devel] 20110317 [PATCH v2] ipv4: netfilter: ipt_CLUSTERIP: fix buffer overflow",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://marc.info/?l=netfilter-devel&m=130036157327564&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[netfilter] 20110310 [PATCH] ipv4: netfilter: ipt_CLUSTERIP: fix buffer overflow",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://marc.info/?l=netfilter&m=129978077509888&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks",
|
"name": "[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2011/03/18/15"
|
"url": "http://www.openwall.com/lists/oss-security/2011/03/18/15"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2011/03/21/4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2011/03/21/1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=961ed183a9fd080cf306c659b8736007e44065a5",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=961ed183a9fd080cf306c659b8736007e44065a5"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689337",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689337",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -97,10 +67,40 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/46921"
|
"url": "http://www.securityfocus.com/bid/46921"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[netfilter-devel] 20110317 [PATCH v2] ipv4: netfilter: ipt_CLUSTERIP: fix buffer overflow",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://marc.info/?l=netfilter-devel&m=130036157327564&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "8284",
|
"name": "8284",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/8284"
|
"url": "http://securityreason.com/securityalert/8284"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=961ed183a9fd080cf306c659b8736007e44065a5",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=961ed183a9fd080cf306c659b8736007e44065a5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[netfilter] 20110310 [PATCH] ipv4: netfilter: ipt_CLUSTERIP: fix buffer overflow",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://marc.info/?l=netfilter&m=129978077509888&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2011/03/21/1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||||
"ID": "CVE-2011-2593",
|
"ID": "CVE-2011-2593",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "45299",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/45299"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://secunia.com/secunia_research/2012-26",
|
"name": "http://secunia.com/secunia_research/2012-26",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -62,11 +67,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.citrix.com/article/CTX134303"
|
"url": "http://support.citrix.com/article/CTX134303"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "45299",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/45299"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "citrix-activex-bo(77317)",
|
"name": "citrix-activex-bo(77317)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "VU#440219",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/440219"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "scriptftp-getlist-bo(69962)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69962"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "17876",
|
"name": "17876",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -62,25 +72,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.digital-echidna.org/2011/09/scriptftp-3-3-remote-buffer-overflow-exploit-0day/"
|
"url": "http://www.digital-echidna.org/2011/09/scriptftp-3-3-remote-buffer-overflow-exploit-0day/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "VU#440219",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/440219"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "49707",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/49707"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "46099",
|
"name": "46099",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/46099"
|
"url": "http://secunia.com/advisories/46099"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "scriptftp-getlist-bo(69962)",
|
"name": "49707",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69962"
|
"url": "http://www.securityfocus.com/bid/49707"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2013-0124",
|
"ID": "CVE-2013-0124",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-0200",
|
"ID": "CVE-2013-0200",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://hplipopensource.com/hplip-web/release_notes.html",
|
"name": "55083",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://hplipopensource.com/hplip-web/release_notes.html"
|
"url": "http://secunia.com/advisories/55083"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-1981-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-1981-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ftp://ftp.scientificlinux.org/linux/scientific/6x/SRPMS/vendor/hplip-3.12.4-4.el6.src.rpm",
|
"name": "ftp://ftp.scientificlinux.org/linux/scientific/6x/SRPMS/vendor/hplip-3.12.4-4.el6.src.rpm",
|
||||||
@ -67,11 +72,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=902163"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=902163"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0072",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0072"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-2829",
|
"name": "DSA-2829",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
@ -83,14 +83,14 @@
|
|||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:088"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:088"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-1981-1",
|
"name": "http://hplipopensource.com/hplip-web/release_notes.html",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1981-1"
|
"url": "http://hplipopensource.com/hplip-web/release_notes.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "55083",
|
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0072",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/55083"
|
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0072"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||||
"ID": "CVE-2013-0675",
|
"ID": "CVE-2013-0675",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf",
|
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf"
|
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2013-1188",
|
"ID": "CVE-2013-1188",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2013-1304",
|
"ID": "CVE-2013-1304",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "MS13-028",
|
"name": "oval:org.mitre.oval:def:16515",
|
||||||
"refsource" : "MS",
|
"refsource": "OVAL",
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-028"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16515"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "TA13-100A",
|
"name": "TA13-100A",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-100A"
|
"url": "http://www.us-cert.gov/ncas/alerts/TA13-100A"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oval:org.mitre.oval:def:16515",
|
"name": "MS13-028",
|
||||||
"refsource" : "OVAL",
|
"refsource": "MS",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16515"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-028"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2013-1567",
|
"ID": "CVE-2013-1567",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
|
"name": "53372",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
|
"url": "http://secunia.com/advisories/53372"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201308-06",
|
"name": "GLSA-201308-06",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "MDVSA-2013:150",
|
"name": "MDVSA-2013:150",
|
||||||
"refsource": "MANDRIVA",
|
"refsource": "MANDRIVA",
|
||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "53372",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/53372"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-1787",
|
"ID": "CVE-2013-1787",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20130227 Re: CVE Request for Drupal Contributed Modules",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2013/02/28/3"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://drupal.org/node/1929514",
|
"name": "http://drupal.org/node/1929514",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://drupal.org/node/1730786"
|
"url": "http://drupal.org/node/1730786"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20130227 Re: CVE Request for Drupal Contributed Modules",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2013/02/28/3"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://drupalcode.org/project/corporate.git/commitdiff/679a1d3",
|
"name": "http://drupalcode.org/project/corporate.git/commitdiff/679a1d3",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-1828",
|
"ID": "CVE-2013-1828",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,26 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "http://twitter.com/grsecurity/statuses/309805924749541376",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://twitter.com/grsecurity/statuses/309805924749541376"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "24747",
|
"name": "24747",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/24747"
|
"url": "http://www.exploit-db.com/exploits/24747"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=919315",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=919315"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130307 Re: CVE Request -- Linux kernel: sctp: SCTP_GET_ASSOC_STATS stack overflow",
|
"name": "[oss-security] 20130307 Re: CVE Request -- Linux kernel: sctp: SCTP_GET_ASSOC_STATS stack overflow",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/08/2"
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/08/2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://grsecurity.net/~spender/sctp.c",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://grsecurity.net/~spender/sctp.c"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://twitter.com/grsecurity/statuses/309805924749541376",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://twitter.com/grsecurity/statuses/309805924749541376"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=726bc6b092da4c093eb74d13c07184b18c1af0f1",
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=726bc6b092da4c093eb74d13c07184b18c1af0f1",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -83,9 +83,9 @@
|
|||||||
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
|
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=919315",
|
"name": "http://grsecurity.net/~spender/sctp.c",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=919315"
|
"url": "http://grsecurity.net/~spender/sctp.c"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0f1",
|
"name": "https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0f1",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-5431",
|
"ID": "CVE-2013-5431",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,11 +57,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21654114"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21654114"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "IV50639",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV50639"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#596990",
|
"name": "VU#596990",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "tfim-cve20135431-redirect(87616)",
|
"name": "tfim-cve20135431-redirect(87616)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87616"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87616"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "IV50639",
|
||||||
|
"refsource": "AIXAPAR",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV50639"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20131028 CVE-2013-5695 Multilple Cross Site Scripting (XSS) Attacks in Ops View",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-10/0141.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes",
|
"name": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes"
|
"url": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20131028 CVE-2013-5695 Multilple Cross Site Scripting (XSS) Attacks in Ops View",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-10/0141.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2013-5808",
|
"ID": "CVE-2013-5808",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "64758",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/64758"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "64827",
|
"name": "64827",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -76,6 +66,16 @@
|
|||||||
"name": "1029630",
|
"name": "1029630",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1029630"
|
"url": "http://www.securitytracker.com/id/1029630"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "64758",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/64758"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2013-5813",
|
"ID": "CVE-2013-5813",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/123652/Microweber-0.8-Arbitrary-File-Deletion.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/123652/Microweber-0.8-Arbitrary-File-Deletion.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.htbridge.com/advisory/HTB23175",
|
"name": "https://www.htbridge.com/advisory/HTB23175",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://www.htbridge.com/advisory/HTB23175"
|
"url": "https://www.htbridge.com/advisory/HTB23175"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/123652/Microweber-0.8-Arbitrary-File-Deletion.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/123652/Microweber-0.8-Arbitrary-File-Deletion.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/microweber/microweber/commit/9177d134960c24cb642d5cf3b42a1fba286219cc",
|
"name": "https://github.com/microweber/microweber/commit/9177d134960c24cb642d5cf3b42a1fba286219cc",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2014-2140",
|
"ID": "CVE-2014-2140",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -53,34 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://wiki.postgresql.org/wiki/20140220securityrelease",
|
"name": "RHSA-2014:0221",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://wiki.postgresql.org/wiki/20140220securityrelease"
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0221.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.postgresql.org/about/news/1506/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.postgresql.org/about/news/1506/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.postgresql.org/support/security/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.postgresql.org/support/security/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2864",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-2864"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2865",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-2865"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2014:0469",
|
"name": "RHSA-2014:0469",
|
||||||
@ -88,9 +63,34 @@
|
|||||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0469.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0469.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2014:0221",
|
"name": "https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0221.html"
|
"url": "https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://wiki.postgresql.org/wiki/20140220securityrelease",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://wiki.postgresql.org/wiki/20140220securityrelease"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-2864",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2014/dsa-2864"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.postgresql.org/support/security/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.postgresql.org/support/security/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.postgresql.org/about/news/1506/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.postgresql.org/about/news/1506/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-2865",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2014/dsa-2865"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2017-0611",
|
"ID": "CVE-2017-0611",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.452896",
|
"DATE_ASSIGNED": "2017-08-22T17:29:33.452896",
|
||||||
"ID": "CVE-2017-1000223",
|
"ID": "CVE-2017-1000223",
|
||||||
"REQUESTER": "jason@modx.com",
|
"REQUESTER": "jason@modx.com",
|
||||||
@ -13,18 +13,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "MODX Revolution CMS",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "2.5.6 and older"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "MODX"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -46,7 +46,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "Cross Site Scripting (XSS)"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,6 +53,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "DSA-4000",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "https://www.debian.org/security/2017/dsa-4000"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update",
|
"name": "[debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -63,20 +68,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509219"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509219"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-4000",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "https://www.debian.org/security/2017/dsa-4000"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201711-05",
|
"name": "GLSA-201711-05",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201711-05"
|
"url": "https://security.gentoo.org/glsa/201711-05"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,15 +53,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://nodesecurity.io/advisories/388",
|
"name": "https://nodesecurity.io/advisories/388",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://nodesecurity.io/advisories/388"
|
"url": "https://nodesecurity.io/advisories/388"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/channelcat/sanic/issues/633",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/channelcat/sanic/issues/633"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/channelcat/sanic/releases/tag/0.5.1",
|
"name": "https://github.com/channelcat/sanic/releases/tag/0.5.1",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/channelcat/sanic/releases/tag/0.5.1"
|
"url": "https://github.com/channelcat/sanic/releases/tag/0.5.1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/channelcat/sanic/issues/633",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/channelcat/sanic/issues/633"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4139",
|
"ID": "CVE-2017-4139",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4522",
|
"ID": "CVE-2017-4522",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4615",
|
"ID": "CVE-2017-4615",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user