mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
ae274a3c64
commit
856935b7e3
@ -53,45 +53,45 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060126 [eVuln] \"my little homepage\" products [link] BBCode XSS Vulnerability",
|
"name": "20060130 My Little Homepage - source verify of different products",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "VIM",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/423167/100/0/threaded"
|
"url": "http://attrition.org/pipermail/vim/2006-January/000520.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18628",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/18628"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://evuln.com/vulns/51/summary.html",
|
"name": "http://evuln.com/vulns/51/summary.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://evuln.com/vulns/51/summary.html"
|
"url": "http://evuln.com/vulns/51/summary.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20060130 My Little Homepage - source verify of different products",
|
|
||||||
"refsource" : "VIM",
|
|
||||||
"url" : "http://attrition.org/pipermail/vim/2006-January/000520.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://evuln.com/vulns/51/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://evuln.com/vulns/51/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "16395",
|
"name": "16395",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/16395"
|
"url": "http://www.securityfocus.com/bid/16395"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20060126 [eVuln] \"my little homepage\" products [link] BBCode XSS Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/423167/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-0349",
|
"name": "ADV-2006-0349",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/0349"
|
"url": "http://www.vupen.com/english/advisories/2006/0349"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://evuln.com/vulns/51/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://evuln.com/vulns/51/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "22855",
|
"name": "22855",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/22855"
|
"url": "http://www.osvdb.org/22855"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "18628",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/18628"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "mylittlehomepage-link-tag-xss(24310)",
|
"name": "mylittlehomepage-link-tag-xss(24310)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "http://fuzzymonkey.net/forum/viewtopic.php?t=856",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://fuzzymonkey.net/forum/viewtopic.php?t=856"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20060215 [eVuln] My Blog BBCode XSS Vulnerabilities",
|
"name": "20060215 [eVuln] My Blog BBCode XSS Vulnerabilities",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -62,65 +67,60 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://evuln.com/vulns/79/summary.html"
|
"url": "http://evuln.com/vulns/79/summary.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20060215 [eVuln] M. Blom HTML::BBCode perl module XSS Vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/425113/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.evuln.com/vulns/80/summary.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.evuln.com/vulns/80/summary.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://menno.b10m.net/perl/HTML-BBCode/Changes",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://menno.b10m.net/perl/HTML-BBCode/Changes"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://menno.b10m.net/perl/dists/HTML-BBCode-1.05.tar.gz",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://menno.b10m.net/perl/dists/HTML-BBCode-1.05.tar.gz"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://fuzzymonkey.net/forum/viewtopic.php?t=856",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://fuzzymonkey.net/forum/viewtopic.php?t=856"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://evuln.com/vulns/80/summary.html",
|
"name": "http://evuln.com/vulns/80/summary.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://evuln.com/vulns/80/summary.html"
|
"url": "http://evuln.com/vulns/80/summary.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "16659",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/16659"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-0614",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/0614"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-0642",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/0642"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "18905",
|
"name": "18905",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/18905"
|
"url": "http://secunia.com/advisories/18905"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "myblog-bbcode-xss(24668)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24668"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-0642",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/0642"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "16659",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/16659"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.evuln.com/vulns/80/summary.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.evuln.com/vulns/80/summary.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://menno.b10m.net/perl/dists/HTML-BBCode-1.05.tar.gz",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://menno.b10m.net/perl/dists/HTML-BBCode-1.05.tar.gz"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "18925",
|
"name": "18925",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/18925"
|
"url": "http://secunia.com/advisories/18925"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "myblog-bbcode-xss(24668)",
|
"name": "20060215 [eVuln] M. Blom HTML::BBCode perl module XSS Vulnerabilities",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24668"
|
"url": "http://www.securityfocus.com/archive/1/425113/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-0614",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/0614"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://menno.b10m.net/perl/HTML-BBCode/Changes",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://menno.b10m.net/perl/HTML-BBCode/Changes"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,49 +53,49 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060215 [BuHa-Security] Multiple Vulnerabilities in Mantis 1.00rc4",
|
"name": "16657",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/425046/100/0/threaded"
|
"url": "http://www.securityfocus.com/bid/16657"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://morph3us.org/advisories/20060214-mantis-100rc4.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://morph3us.org/advisories/20060214-mantis-100rc4.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://sourceforge.net/project/showfiles.php?group_id=14963&package_id=12175&release_id=386059",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://sourceforge.net/project/showfiles.php?group_id=14963&package_id=12175&release_id=386059"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=386059&group_id=14963",
|
"name": "http://sourceforge.net/project/shownotes.php?release_id=386059&group_id=14963",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=386059&group_id=14963"
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=386059&group_id=14963"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "21400",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21400"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-1133",
|
"name": "DSA-1133",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2006/dsa-1133"
|
"url": "http://www.debian.org/security/2006/dsa-1133"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "16657",
|
"name": "20060215 [BuHa-Security] Multiple Vulnerabilities in Mantis 1.00rc4",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/16657"
|
"url": "http://www.securityfocus.com/archive/1/425046/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "23248",
|
"name": "23248",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/23248"
|
"url": "http://www.osvdb.org/23248"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://morph3us.org/advisories/20060214-mantis-100rc4.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://morph3us.org/advisories/20060214-mantis-100rc4.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "22487",
|
"name": "22487",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/22487"
|
"url": "http://www.osvdb.org/22487"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "21400",
|
"name": "http://sourceforge.net/project/showfiles.php?group_id=14963&package_id=12175&release_id=386059",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url" : "http://secunia.com/advisories/21400"
|
"url": "http://sourceforge.net/project/showfiles.php?group_id=14963&package_id=12175&release_id=386059"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.joomla.org/content/view/938/78/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.joomla.org/content/view/938/78/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-0818",
|
"name": "ADV-2006-0818",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/0818"
|
"url": "http://www.vupen.com/english/advisories/2006/0818"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "23822",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/23822"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "19105",
|
"name": "19105",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -76,6 +66,16 @@
|
|||||||
"name": "joomla-multiple-bypass-security(25033)",
|
"name": "joomla-multiple-bypass-security(25033)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25033"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25033"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.joomla.org/content/view/938/78/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.joomla.org/content/view/938/78/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23822",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/23822"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2006-1171",
|
"ID": "CVE-2006-1171",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,26 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060306 link bank code execution and xss",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/426932/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17004",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/17004"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-0885",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/0885"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "23750",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/23750"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "19154",
|
"name": "19154",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -81,6 +61,26 @@
|
|||||||
"name": "553",
|
"name": "553",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/553"
|
"url": "http://securityreason.com/securityalert/553"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23750",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/23750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "17004",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/17004"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060306 link bank code execution and xss",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/426932/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-0885",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/0885"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,19 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.security-protocols.com/sp-x24-advisory.php",
|
"name": "17951",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "http://www.security-protocols.com/sp-x24-advisory.php"
|
"url": "http://www.securityfocus.com/bid/17951"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-1779",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/1779"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA06-132A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA06-132A.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://docs.info.apple.com/article.html?artnum=303411",
|
"name": "http://docs.info.apple.com/article.html?artnum=303411",
|
||||||
@ -67,35 +77,30 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233"
|
"url": "http://www.security-protocols.com/modules.php?name=News&file=article&sid=3233"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.security-protocols.com/sp-x24-advisory.php",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.security-protocols.com/sp-x24-advisory.php"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2006-05-11",
|
"name": "APPLE-SA-2006-05-11",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2006/May/msg00003.html"
|
"url": "http://lists.apple.com/archives/security-announce/2006/May/msg00003.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "TA06-132A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-132A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17634",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/17634"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17951",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/17951"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-1452",
|
"name": "ADV-2006-1452",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/1452"
|
"url": "http://www.vupen.com/english/advisories/2006/1452"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-1779",
|
"name": "17634",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "BID",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/1779"
|
"url": "http://www.securityfocus.com/bid/17634"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20077",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/20077"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "31837",
|
"name": "31837",
|
||||||
@ -106,11 +111,6 @@
|
|||||||
"name": "19686",
|
"name": "19686",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/19686"
|
"url": "http://secunia.com/advisories/19686"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20077",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/20077"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[security-announce] 20060815 Proxy Generation Tool Vulnerability",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.globus.org/mail_archive/security-announce/2006/08/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "19549",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/19549"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-3290",
|
"name": "ADV-2006-3290",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/3290"
|
"url": "http://www.vupen.com/english/advisories/2006/3290"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "globus-grid-proxy-race-condition(28408)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28408"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[security-announce] 20060815 Proxy Generation Tool Vulnerability",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.globus.org/mail_archive/security-announce/2006/08/msg00000.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "21516",
|
"name": "21516",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/21516"
|
"url": "http://secunia.com/advisories/21516"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "globus-grid-proxy-race-condition(28408)",
|
"name": "19549",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28408"
|
"url": "http://www.securityfocus.com/bid/19549"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060916 PHP-Post Multiple Input Validation Vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/446318/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20061",
|
"name": "20061",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -67,16 +62,16 @@
|
|||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/3688"
|
"url": "http://www.vupen.com/english/advisories/2006/3688"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "28965",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/28965"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "28966",
|
"name": "28966",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/28966"
|
"url": "http://www.osvdb.org/28966"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1607",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/1607"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "28967",
|
"name": "28967",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -88,9 +83,14 @@
|
|||||||
"url": "http://secunia.com/advisories/22014"
|
"url": "http://secunia.com/advisories/22014"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1607",
|
"name": "20060916 PHP-Post Multiple Input Validation Vulnerabilities",
|
||||||
"refsource" : "SREASON",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://securityreason.com/securityalert/1607"
|
"url": "http://www.securityfocus.com/archive/1/446318/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "28965",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/28965"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "2389",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/2389"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20088",
|
"name": "20088",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/3684"
|
"url": "http://www.vupen.com/english/advisories/2006/3684"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "2389",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/2389"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "21961",
|
"name": "21961",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
|
@ -57,21 +57,11 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/449248/100/200/threaded"
|
"url": "http://www.securityfocus.com/archive/1/449248/100/200/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://csirt.fe.up.pt/docs/TORQUE-audit.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://csirt.fe.up.pt/docs/TORQUE-audit.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-200611-14",
|
"name": "GLSA-200611-14",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "http://security.gentoo.org/glsa/glsa-200611-14.xml"
|
"url": "http://security.gentoo.org/glsa/glsa-200611-14.xml"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20632",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/20632"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-4651",
|
"name": "ADV-2006-4651",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -81,6 +71,16 @@
|
|||||||
"name": "1820",
|
"name": "1820",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/1820"
|
"url": "http://securityreason.com/securityalert/1820"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20632",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/20632"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://csirt.fe.up.pt/docs/TORQUE-audit.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://csirt.fe.up.pt/docs/TORQUE-audit.pdf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://packetstormsecurity.org/1002-exploits/esmile-sql.txt",
|
"name": "62272",
|
||||||
"refsource" : "MISC",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://packetstormsecurity.org/1002-exploits/esmile-sql.txt"
|
"url": "http://osvdb.org/62272"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "11382",
|
"name": "11382",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.exploit-db.com/exploits/11382"
|
"url": "http://www.exploit-db.com/exploits/11382"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "62272",
|
"name": "esmile-index-sql-injection(56206)",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "XF",
|
||||||
"url" : "http://osvdb.org/62272"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56206"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "38548",
|
"name": "38548",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://secunia.com/advisories/38548"
|
"url": "http://secunia.com/advisories/38548"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "esmile-index-sql-injection(56206)",
|
"name": "http://packetstormsecurity.org/1002-exploits/esmile-sql.txt",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56206"
|
"url": "http://packetstormsecurity.org/1002-exploits/esmile-sql.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=16535",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=16535"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://googlechromereleases.blogspot.com/2010/05/stable-channel-update.html",
|
"name": "http://googlechromereleases.blogspot.com/2010/05/stable-channel-update.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://googlechromereleases.blogspot.com/2010/05/stable-channel-update.html"
|
"url": "http://googlechromereleases.blogspot.com/2010/05/stable-channel-update.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://code.google.com/p/chromium/issues/detail?id=16535",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://code.google.com/p/chromium/issues/detail?id=16535"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:11644",
|
"name": "oval:org.mitre.oval:def:11644",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2010-2972",
|
"ID": "CVE-2010-2972",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/514995/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
|
"name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -72,6 +67,11 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/45169"
|
"url": "http://www.securityfocus.com/bid/45169"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "69596",
|
"name": "69596",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/514995/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
|
"name": "[security-announce] 20101202 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html"
|
"url": "http://lists.vmware.com/pipermail/security-announce/2010/000112.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "69585",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/69585"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html",
|
"name": "http://www.vmware.com/security/advisories/VMSA-2010-0018.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -73,25 +73,20 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/45167"
|
"url": "http://www.securityfocus.com/bid/45167"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "69585",
|
"name": "20101203 VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://osvdb.org/69585"
|
"url": "http://www.securityfocus.com/archive/1/514995/100/0/threaded"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1024819",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1024819"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1024820",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1024820"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "42453",
|
"name": "42453",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/42453"
|
"url": "http://secunia.com/advisories/42453"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1024819",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1024819"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "42482",
|
"name": "42482",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -101,6 +96,11 @@
|
|||||||
"name": "ADV-2010-3116",
|
"name": "ADV-2010-3116",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2010/3116"
|
"url": "http://www.vupen.com/english/advisories/2010/3116"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1024820",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1024820"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20101210 Novell Vibe 3 BETA OnPrem Stored Cross-site Scripting Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/515147/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.solutionary.com/index/SERT/Vuln-Disclosures/Novell-Vibe-Beta-3-XSS-vulnerability.html",
|
"name": "http://www.solutionary.com/index/SERT/Vuln-Disclosures/Novell-Vibe-Beta-3-XSS-vulnerability.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.solutionary.com/index/SERT/Vuln-Disclosures/Novell-Vibe-Beta-3-XSS-vulnerability.html"
|
"url": "http://www.solutionary.com/index/SERT/Vuln-Disclosures/Novell-Vibe-Beta-3-XSS-vulnerability.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20101210 Novell Vibe 3 BETA OnPrem Stored Cross-site Scripting Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/515147/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2014-3022",
|
"ID": "CVE-2014-3022",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,25 +53,15 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21681249",
|
"name": "PI09594",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "AIXAPAR",
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21681249"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI09594"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676091",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676091"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092",
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676092"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "PI09594",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PI09594"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "68211",
|
"name": "68211",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -81,6 +71,16 @@
|
|||||||
"name": "ibm-was-cve20143022-info-disc(93060)",
|
"name": "ibm-was-cve20143022-info-disc(93060)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93060"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93060"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21681249",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681249"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2014-3466",
|
"ID": "CVE-2014-3466",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,45 +52,45 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.gnutls.org/security.html",
|
"name": "http://www.gnutls.org/security.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.gnutls.org/security.html"
|
"url": "http://www.gnutls.org/security.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1101932",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1101932"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://linux.oracle.com/errata/ELSA-2014-0595.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://linux.oracle.com/errata/ELSA-2014-0595.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://linux.oracle.com/errata/ELSA-2014-0594.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://linux.oracle.com/errata/ELSA-2014-0594.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776",
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155",
|
"name": "DSA-2944",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155"
|
"url": "http://www.debian.org/security/2014/dsa-2944"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "58340",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/58340"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2014:0595",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0595.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2229-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2229-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "58642",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/58642"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "67741",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/67741"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.novell.com/support/kb/doc.php?id=7015302",
|
"name": "http://www.novell.com/support/kb/doc.php?id=7015302",
|
||||||
@ -98,29 +98,29 @@
|
|||||||
"url": "http://www.novell.com/support/kb/doc.php?id=7015302"
|
"url": "http://www.novell.com/support/kb/doc.php?id=7015302"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.novell.com/support/kb/doc.php?id=7015303",
|
"name": "59057",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/59057"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://linux.oracle.com/errata/ELSA-2014-0595.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.novell.com/support/kb/doc.php?id=7015303"
|
"url": "http://linux.oracle.com/errata/ELSA-2014-0595.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-2944",
|
"name": "59086",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-2944"
|
"url": "http://secunia.com/advisories/59086"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2014:0594",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0594.html"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2014:0815",
|
"name": "SUSE-SU-2014:0758",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "SUSE",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0815.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:0595",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0595.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2014:0684",
|
"name": "RHSA-2014:0684",
|
||||||
@ -133,39 +133,29 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2014:0767",
|
"name": "59021",
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2014:0758",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2014:0788",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2229-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2229-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "67741",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/67741"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1030314",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1030314"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "58340",
|
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/58340"
|
"url": "http://secunia.com/advisories/59021"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2014:0815",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.novell.com/support/kb/doc.php?id=7015303",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.novell.com/support/kb/doc.php?id=7015303"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://linux.oracle.com/errata/ELSA-2014-0594.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://linux.oracle.com/errata/ELSA-2014-0594.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "58598",
|
"name": "58598",
|
||||||
@ -173,49 +163,59 @@
|
|||||||
"url": "http://secunia.com/advisories/58598"
|
"url": "http://secunia.com/advisories/58598"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "58601",
|
"name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/58601"
|
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "58642",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/58642"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "59016",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/59016"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "59057",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/59057"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "59086",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/59086"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "59021",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/59021"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "59838",
|
"name": "59838",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/59838"
|
"url": "http://secunia.com/advisories/59838"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2014:0788",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "60384",
|
"name": "60384",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/60384"
|
"url": "http://secunia.com/advisories/60384"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2014:0594",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "59016",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/59016"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2014:0767",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "58601",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/58601"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "59408",
|
"name": "59408",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/59408"
|
"url": "http://secunia.com/advisories/59408"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1030314",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1030314"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2014-3909",
|
"ID": "CVE-2014-3909",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://service.falconsc.com/service/product/patch/index.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://service.falconsc.com/service/product/patch/index.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "JVN#49672671",
|
"name": "JVN#49672671",
|
||||||
"refsource": "JVN",
|
"refsource": "JVN",
|
||||||
"url": "http://jvn.jp/en/jp/JVN49672671/index.html"
|
"url": "http://jvn.jp/en/jp/JVN49672671/index.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://service.falconsc.com/service/product/patch/index.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://service.falconsc.com/service/product/patch/index.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "JVNDB-2014-000084",
|
"name": "JVNDB-2014-000084",
|
||||||
"refsource": "JVNDB",
|
"refsource": "JVNDB",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2014-4479",
|
"ID": "CVE-2014-4479",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://support.apple.com/HT204243",
|
"name": "1031647",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://support.apple.com/HT204243"
|
"url": "http://www.securitytracker.com/id/1031647"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/HT204245",
|
"name": "http://support.apple.com/HT204245",
|
||||||
@ -68,14 +68,14 @@
|
|||||||
"url": "http://support.apple.com/HT204246"
|
"url": "http://support.apple.com/HT204246"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://support.apple.com/kb/HT204949",
|
"name": "APPLE-SA-2015-06-30-6",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "APPLE",
|
||||||
"url" : "https://support.apple.com/kb/HT204949"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2015-01-27-1",
|
"name": "http://support.apple.com/HT204243",
|
||||||
"refsource" : "APPLE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html"
|
"url": "http://support.apple.com/HT204243"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2015-01-27-2",
|
"name": "APPLE-SA-2015-01-27-2",
|
||||||
@ -88,9 +88,9 @@
|
|||||||
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00002.html"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00002.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2015-06-30-6",
|
"name": "https://support.apple.com/kb/HT204949",
|
||||||
"refsource" : "APPLE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html"
|
"url": "https://support.apple.com/kb/HT204949"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "72330",
|
"name": "72330",
|
||||||
@ -98,9 +98,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/72330"
|
"url": "http://www.securityfocus.com/bid/72330"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1031647",
|
"name": "APPLE-SA-2015-01-27-1",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "APPLE",
|
||||||
"url" : "http://www.securitytracker.com/id/1031647"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,60 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20140627 Re: CVE request -- Linux kernel: sctp: sk_ack_backlog wrap-around problem",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2014/06/27/11"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d3217b15a19a4779c39b212358a5c71d725822ee",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d3217b15a19a4779c39b212358a5c71d725822ee"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1113967",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1113967"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee",
|
"name": "https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee"
|
"url": "https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://linux.oracle.com/errata/ELSA-2014-3068.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://linux.oracle.com/errata/ELSA-2014-3068.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://linux.oracle.com/errata/ELSA-2014-3069.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://linux.oracle.com/errata/ELSA-2014-3069.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2992",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-2992"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2014:1316",
|
"name": "SUSE-SU-2014:1316",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2014:1319",
|
"name": "[oss-security] 20140627 Re: CVE request -- Linux kernel: sctp: sk_ack_backlog wrap-around problem",
|
||||||
"refsource" : "SUSE",
|
"refsource": "MLIST",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"
|
"url": "http://www.openwall.com/lists/oss-security/2014/06/27/11"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2015:0812",
|
"name": "59790",
|
||||||
"refsource" : "SUSE",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"
|
"url": "http://secunia.com/advisories/59790"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2335-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2335-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2334-1",
|
"name": "USN-2334-1",
|
||||||
@ -113,9 +83,14 @@
|
|||||||
"url": "http://www.ubuntu.com/usn/USN-2334-1"
|
"url": "http://www.ubuntu.com/usn/USN-2334-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-2335-1",
|
"name": "SUSE-SU-2014:1319",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2335-1"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "60564",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/60564"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "68224",
|
"name": "68224",
|
||||||
@ -127,20 +102,45 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/59777"
|
"url": "http://secunia.com/advisories/59777"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "60564",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/60564"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "59790",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/59790"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "60596",
|
"name": "60596",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/60596"
|
"url": "http://secunia.com/advisories/60596"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://linux.oracle.com/errata/ELSA-2014-3068.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://linux.oracle.com/errata/ELSA-2014-3068.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://linux.oracle.com/errata/ELSA-2014-3069.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://linux.oracle.com/errata/ELSA-2014-3069.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1113967",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113967"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-2992",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2014/dsa-2992"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d3217b15a19a4779c39b212358a5c71d725822ee",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d3217b15a19a4779c39b212358a5c71d725822ee"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:0812",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20141120 CVE-2014-8349 LIFERAY Portal Stored XSS",
|
"name": "1031255",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://seclists.org/fulldisclosure/2014/Nov/61"
|
"url": "http://www.securitytracker.com/id/1031255"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/129199/Liferay-Portal-6.2-EE-SP8-Cross-Site-Scripting.html",
|
"name": "http://packetstormsecurity.com/files/129199/Liferay-Portal-6.2-EE-SP8-Cross-Site-Scripting.html",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://packetstormsecurity.com/files/129199/Liferay-Portal-6.2-EE-SP8-Cross-Site-Scripting.html"
|
"url": "http://packetstormsecurity.com/files/129199/Liferay-Portal-6.2-EE-SP8-Cross-Site-Scripting.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1031255",
|
"name": "20141120 CVE-2014-8349 LIFERAY Portal Stored XSS",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "FULLDISC",
|
||||||
"url" : "http://www.securitytracker.com/id/1031255"
|
"url": "http://seclists.org/fulldisclosure/2014/Nov/61"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2014-8448",
|
"ID": "CVE-2014-8448",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2014-8862",
|
"ID": "CVE-2014-8862",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-9248",
|
"ID": "CVE-2014-9248",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#449452",
|
"name": "VU#449452",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/449452"
|
"url": "http://www.kb.cert.org/vuls/id/449452"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "35463",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/35463"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/129390/Advertise-With-Pleasure-AWP-6.6-SQL-Injection.html",
|
"name": "http://packetstormsecurity.com/files/129390/Advertise-With-Pleasure-AWP-6.6-SQL-Injection.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/129390/Advertise-With-Pleasure-AWP-6.6-SQL-Injection.html"
|
"url": "http://packetstormsecurity.com/files/129390/Advertise-With-Pleasure-AWP-6.6-SQL-Injection.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "35463",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "http://www.exploit-db.com/exploits/35463"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "115317",
|
"name": "115317",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2014-9951",
|
"ID": "CVE-2014-9951",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://source.android.com/security/bulletin/2017-05-01",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.android.com/security/bulletin/2017-05-01"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "98252",
|
"name": "98252",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/98252"
|
"url": "http://www.securityfocus.com/bid/98252"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.android.com/security/bulletin/2017-05-01",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.android.com/security/bulletin/2017-05-01"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2016-2222",
|
"ID": "CVE-2016-2222",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,25 +53,30 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://hackerone.com/reports/110801",
|
"name": "https://codex.wordpress.org/Version_4.4.2",
|
||||||
"refsource" : "MISC",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://hackerone.com/reports/110801"
|
"url": "https://codex.wordpress.org/Version_4.4.2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1034933",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1034933"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://wpvulndb.com/vulnerabilities/8376",
|
"name": "https://wpvulndb.com/vulnerabilities/8376",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://wpvulndb.com/vulnerabilities/8376"
|
"url": "https://wpvulndb.com/vulnerabilities/8376"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://codex.wordpress.org/Version_4.4.2",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://codex.wordpress.org/Version_4.4.2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://core.trac.wordpress.org/changeset/36435",
|
"name": "https://core.trac.wordpress.org/changeset/36435",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://core.trac.wordpress.org/changeset/36435"
|
"url": "https://core.trac.wordpress.org/changeset/36435"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "82454",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/82454"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/",
|
"name": "https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -83,14 +88,9 @@
|
|||||||
"url": "http://www.debian.org/security/2016/dsa-3472"
|
"url": "http://www.debian.org/security/2016/dsa-3472"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "82454",
|
"name": "https://hackerone.com/reports/110801",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/82454"
|
"url": "https://hackerone.com/reports/110801"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1034933",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1034933"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||||
"ID": "CVE-2016-2298",
|
"ID": "CVE-2016-2298",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,70 +52,70 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20160724 Re: Fwd: CVE for PHP 5.5.38 issues",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://openwall.com/lists/oss-security/2016/07/24/2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://php.net/ChangeLog-5.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://php.net/ChangeLog-5.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://php.net/ChangeLog-7.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://php.net/ChangeLog-7.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugs.php.net/72520",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugs.php.net/72520"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT207170",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT207170"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2016-09-20",
|
"name": "APPLE-SA-2016-09-20",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
|
"url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-3631",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3631"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201611-22",
|
"name": "GLSA-201611-22",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201611-22"
|
"url": "https://security.gentoo.org/glsa/201611-22"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.php.net/72520",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugs.php.net/72520"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2750",
|
"name": "RHSA-2016:2750",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2750.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "92099",
|
"name": "http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/92099"
|
"url": "http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://php.net/ChangeLog-5.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://php.net/ChangeLog-5.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1036430",
|
"name": "1036430",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1036430"
|
"url": "http://www.securitytracker.com/id/1036430"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3631",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3631"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://php.net/ChangeLog-7.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://php.net/ChangeLog-7.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20160724 Re: Fwd: CVE for PHP 5.5.38 issues",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://openwall.com/lists/oss-security/2016/07/24/2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT207170",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT207170"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "92099",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/92099"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -63,9 +63,9 @@
|
|||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363710"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363710"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71",
|
"name": "92277",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71"
|
"url": "http://www.securityfocus.com/bid/92277"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201701-05",
|
"name": "GLSA-201701-05",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "https://security.gentoo.org/glsa/201701-05"
|
"url": "https://security.gentoo.org/glsa/201701-05"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "92277",
|
"name": "https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/92277"
|
"url": "https://git.busybox.net/busybox/commit/?id=150dc7a2b483b8338a3e185c478b4b23ee884e71"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "40196",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/40196/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases",
|
"name": "[oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://openwall.com/lists/oss-security/2016/07/28/3"
|
"url": "http://openwall.com/lists/oss-security/2016/07/28/3"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "92162",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/92162"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.wireshark.org/security/wnpa-sec-2016-39.html",
|
"name": "http://www.wireshark.org/security/wnpa-sec-2016-39.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -77,15 +77,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=581a17af40b84ef0c9e7f41ed0795af345b61ce1"
|
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=581a17af40b84ef0c9e7f41ed0795af345b61ce1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "92162",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/92162"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1036480",
|
"name": "1036480",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1036480"
|
"url": "http://www.securitytracker.com/id/1036480"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "40196",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/40196/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,6 +53,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "93773",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/93773"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://struts.apache.org/docs/s2-042.html",
|
"name": "https://struts.apache.org/docs/s2-042.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -62,11 +67,6 @@
|
|||||||
"name": "https://security.netapp.com/advisory/ntap-20180629-0003/",
|
"name": "https://security.netapp.com/advisory/ntap-20180629-0003/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20180629-0003/"
|
"url": "https://security.netapp.com/advisory/ntap-20180629-0003/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "93773",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/93773"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2016-6971",
|
"ID": "CVE-2016-6971",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html",
|
"name": "1036986",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html"
|
"url": "http://www.securitytracker.com/id/1036986"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "93491",
|
"name": "93491",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/93491"
|
"url": "http://www.securityfocus.com/bid/93491"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1036986",
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1036986"
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-33.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "MS16-144",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-144"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MS16-145",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-145"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "94724",
|
"name": "94724",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/94724"
|
"url": "http://www.securityfocus.com/bid/94724"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "MS16-144",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-144"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1037444",
|
"name": "1037444",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1037444"
|
"url": "http://www.securitytracker.com/id/1037444"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MS16-145",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-145"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user