mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
dc62da86c0
commit
89c0651f7c
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "oracle-appserver-webcachemanager-dos(10284)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "http://www.iss.net/security_center/static/10284.php"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "A102802-1",
|
"name": "A102802-1",
|
||||||
"refsource": "ATSTAKE",
|
"refsource": "ATSTAKE",
|
||||||
"url": "http://www.atstake.com/research/advisories/2002/a102802-1.txt"
|
"url": "http://www.atstake.com/research/advisories/2002/a102802-1.txt"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://otn.oracle.com/deploy/security/pdf/2002alert43rev1.pdf",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://otn.oracle.com/deploy/security/pdf/2002alert43rev1.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "5902",
|
"name": "5902",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/5902"
|
"url": "http://www.securityfocus.com/bid/5902"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oracle-appserver-webcachemanager-dos(10284)",
|
"name": "http://otn.oracle.com/deploy/security/pdf/2002alert43rev1.pdf",
|
||||||
"refsource" : "XF",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.iss.net/security_center/static/10284.php"
|
"url": "http://otn.oracle.com/deploy/security/pdf/2002alert43rev1.pdf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "xtux-server-dos(8422)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "http://www.iss.net/security_center/static/8422.php"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20020309 xtux server DoS.",
|
"name": "20020309 xtux server DoS.",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://online.securityfocus.com/archive/1/260912"
|
"url": "http://online.securityfocus.com/archive/1/260912"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://sourceforge.net/tracker/index.php?func=detail&aid=529046&group_id=206&atid=100206",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://sourceforge.net/tracker/index.php?func=detail&aid=529046&group_id=206&atid=100206"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "4260",
|
"name": "4260",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/4260"
|
"url": "http://www.securityfocus.com/bid/4260"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "xtux-server-dos(8422)",
|
"name": "https://sourceforge.net/tracker/index.php?func=detail&aid=529046&group_id=206&atid=100206",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.iss.net/security_center/static/8422.php"
|
"url": "https://sourceforge.net/tracker/index.php?func=detail&aid=529046&group_id=206&atid=100206"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,65 +53,20 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20021003 iDEFENSE Security Advisory 10.03.2002: Apache 1.3.x shared memory scoreboard vulnerabilities",
|
"name": "DSA-188",
|
||||||
"refsource" : "VULNWATCH",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0012.html"
|
"url": "http://www.debian.org/security/2002/dsa-188"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.apacheweek.com/issues/02-10-04",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.apacheweek.com/issues/02-10-04"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://marc.info/?l=apache-httpd-announce&m=103367938230488&w=2",
|
"name": "http://marc.info/?l=apache-httpd-announce&m=103367938230488&w=2",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://marc.info/?l=apache-httpd-announce&m=103367938230488&w=2"
|
"url": "http://marc.info/?l=apache-httpd-announce&m=103367938230488&w=2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "CLA-2002:530",
|
|
||||||
"refsource" : "CONECTIVA",
|
|
||||||
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000530"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ESA-20021007-024",
|
"name": "ESA-20021007-024",
|
||||||
"refsource": "ENGARDE",
|
"refsource": "ENGARDE",
|
||||||
"url": "http://www.linuxsecurity.com/advisories/other_advisory-2414.html"
|
"url": "http://www.linuxsecurity.com/advisories/other_advisory-2414.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "HPSBOV02683",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT090208",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2002:068",
|
|
||||||
"refsource" : "MANDRAKE",
|
|
||||||
"url" : "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-068.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-187",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2002/dsa-187"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-188",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2002/dsa-188"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-195",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2002/dsa-195"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20021003 [OpenPKG-SA-2002.009] OpenPKG Security Advisory (apache)",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=103376585508776&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20021105-01-I",
|
"name": "20021105-01-I",
|
||||||
"refsource": "SGI",
|
"refsource": "SGI",
|
||||||
@ -123,24 +78,69 @@
|
|||||||
"url": "http://online.securityfocus.com/advisories/4617"
|
"url": "http://online.securityfocus.com/advisories/4617"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20021015 GLSA: apache",
|
"name": "DSA-187",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-10/0195.html"
|
"url": "http://www.debian.org/security/2002/dsa-187"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20021017 TSLSA-2002-0069-apache",
|
"name": "SSRT090208",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "HP",
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-10/0254.html"
|
"url": "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20021003 iDEFENSE Security Advisory 10.03.2002: Apache 1.3.x shared memory scoreboard vulnerabilities",
|
||||||
|
"refsource": "VULNWATCH",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0012.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.apacheweek.com/issues/02-10-04",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.apacheweek.com/issues/02-10-04"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "5884",
|
"name": "5884",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/5884"
|
"url": "http://www.securityfocus.com/bid/5884"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-195",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2002/dsa-195"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20021003 [OpenPKG-SA-2002.009] OpenPKG Security Advisory (apache)",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=103376585508776&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "apache-scorecard-memory-overwrite(10280)",
|
"name": "apache-scorecard-memory-overwrite(10280)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "http://www.iss.net/security_center/static/10280.php"
|
"url": "http://www.iss.net/security_center/static/10280.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2002:068",
|
||||||
|
"refsource": "MANDRAKE",
|
||||||
|
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-068.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBOV02683",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "CLA-2002:530",
|
||||||
|
"refsource": "CONECTIVA",
|
||||||
|
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000530"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20021017 TSLSA-2002-0069-apache",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0254.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20021015 GLSA: apache",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0195.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "cisco-ids-directory-traversal(9174)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "http://www.iss.net/security_center/static/9174.php"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20020524 Cisco IDS Device Manager 3.1.1 Advisory",
|
"name": "20020524 Cisco IDS Device Manager 3.1.1 Advisory",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "4760",
|
"name": "4760",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/4760"
|
"url": "http://www.securityfocus.com/bid/4760"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "cisco-ids-directory-traversal(9174)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "http://www.iss.net/security_center/static/9174.php"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,24 +58,24 @@
|
|||||||
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0087.html"
|
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0087.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20020604 [DER #11] - Remotey exploitable fmt string bug in squid",
|
"name": "msntauth-squid-format-string(9248)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://online.securityfocus.com/archive/1/275347"
|
"url": "http://www.iss.net/security_center/static/9248.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.squid-cache.org/Versions/v2/2.4/diff-2.4.STABLE6-2.4.STABLE7.gz",
|
"name": "http://www.squid-cache.org/Versions/v2/2.4/diff-2.4.STABLE6-2.4.STABLE7.gz",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.squid-cache.org/Versions/v2/2.4/diff-2.4.STABLE6-2.4.STABLE7.gz"
|
"url": "http://www.squid-cache.org/Versions/v2/2.4/diff-2.4.STABLE6-2.4.STABLE7.gz"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20020604 [DER #11] - Remotey exploitable fmt string bug in squid",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://online.securityfocus.com/archive/1/275347"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "4929",
|
"name": "4929",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/4929"
|
"url": "http://www.securityfocus.com/bid/4929"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "msntauth-squid-format-string(9248)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "http://www.iss.net/security_center/static/9248.php"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CISCO",
|
"refsource": "CISCO",
|
||||||
"url": "http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml"
|
"url": "http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "cisco-vpn-xml-filter(10023)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "http://www.iss.net/security_center/static/10023.php"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "5614",
|
"name": "5614",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/5614"
|
"url": "http://www.securityfocus.com/bid/5614"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "cisco-vpn-xml-filter(10023)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "http://www.iss.net/security_center/static/10023.php"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20021112 EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
|
"name": "6122",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html"
|
"url": "http://www.securityfocus.com/bid/6122"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
|
|
||||||
"refsource" : "VULNWATCH",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
|
"name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
|
||||||
@ -73,14 +68,19 @@
|
|||||||
"url": "http://www.eeye.com/html/Research/Advisories/AD20021112.html"
|
"url": "http://www.eeye.com/html/Research/Advisories/AD20021112.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "6122",
|
"name": "20021112 EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/6122"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "jrun-long-url-bo(10568)",
|
"name": "jrun-long-url-bo(10568)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10568"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10568"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
|
||||||
|
"refsource": "VULNWATCH",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.nextgenss.com/papers/hpoas.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.nextgenss.com/papers/hpoas.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oracle-htpprint-xss(10687)",
|
"name": "oracle-htpprint-xss(10687)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10687"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10687"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.nextgenss.com/papers/hpoas.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.nextgenss.com/papers/hpoas.pdf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20021016 NSSI-2002-zonealarm3: ZoneAlarm Pro Denial of Service Vulnerability",
|
"name": "5975",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/295434"
|
"url": "http://www.securityfocus.com/bid/5975"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20021017 Re: NSSI-2002-zonealarm3: ZoneAlarm Pro Denial of Service Vulnerability",
|
"name": "20021017 Re: NSSI-2002-zonealarm3: ZoneAlarm Pro Denial of Service Vulnerability",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0238.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0238.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "5975",
|
"name": "20021016 NSSI-2002-zonealarm3: ZoneAlarm Pro Denial of Service Vulnerability",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/5975"
|
"url": "http://www.securityfocus.com/archive/1/295434"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "zonealarm-synflood-dos(10379)",
|
"name": "zonealarm-synflood-dos(10379)",
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20021006 phpSecurePages & Killer Protection ( PHP )",
|
"name": "killer-protection-vars-password(10315)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://online.securityfocus.com/archive/1/294208"
|
"url": "http://www.iss.net/security_center/static/10315.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "5905",
|
"name": "5905",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/5905"
|
"url": "http://www.securityfocus.com/bid/5905"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "killer-protection-vars-password(10315)",
|
"name": "20021006 phpSecurePages & Killer Protection ( PHP )",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.iss.net/security_center/static/10315.php"
|
"url": "http://online.securityfocus.com/archive/1/294208"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,124 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20050712 MITKRB5-SA-2005-002: buffer overflow, heap corruption in KDC",
|
"name": "kerberos-kdc-krb5-udp-tcp-bo(21328)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=112122123211974&w=2"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21328"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "IY85474",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2005-08-15",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2005-08-17",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-757",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2005/dsa-757"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2005:562",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-562.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2005:567",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-567.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20050703-01-U",
|
|
||||||
"refsource" : "SGI",
|
|
||||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "101809",
|
|
||||||
"refsource" : "SUNALERT",
|
|
||||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2005:017",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2005_17_sr.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TLSA-2005-78",
|
|
||||||
"refsource" : "TURBO",
|
|
||||||
"url" : "http://www.turbolinux.com/security/2005/TLSA-2005-78.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "2005-0036",
|
|
||||||
"refsource" : "TRUSTIX",
|
|
||||||
"url" : "http://www.trustix.org/errata/2005/0036"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-224-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "https://usn.ubuntu.com/224-1/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#885830",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/885830"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "14236",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/14236"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:9902",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2005-1066",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2005/1066"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-2074",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/2074"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:736",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A736"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1014460",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1014460"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "16041",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/16041"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17899",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/17899"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17135",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/17135"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20364",
|
"name": "20364",
|
||||||
@ -178,9 +63,124 @@
|
|||||||
"url": "http://secunia.com/advisories/20364"
|
"url": "http://secunia.com/advisories/20364"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "kerberos-kdc-krb5-udp-tcp-bo(21328)",
|
"name": "RHSA-2005:567",
|
||||||
"refsource" : "XF",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/21328"
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-567.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:736",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A736"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2005:017",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/2005_17_sr.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "14236",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/14236"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20050712 MITKRB5-SA-2005-002: buffer overflow, heap corruption in KDC",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=112122123211974&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1014460",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1014460"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-2074",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/2074"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2005:562",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-562.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "101809",
|
||||||
|
"refsource": "SUNALERT",
|
||||||
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TLSA-2005-78",
|
||||||
|
"refsource": "TURBO",
|
||||||
|
"url": "http://www.turbolinux.com/security/2005/TLSA-2005-78.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "IY85474",
|
||||||
|
"refsource": "AIXAPAR",
|
||||||
|
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:9902",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20050703-01-U",
|
||||||
|
"refsource": "SGI",
|
||||||
|
"url": "ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "16041",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/16041"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-224-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "https://usn.ubuntu.com/224-1/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-757",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2005/dsa-757"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2005-08-15",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "17135",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/17135"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "17899",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/17899"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2005-1066",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2005/1066"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2005-08-17",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#885830",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/885830"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "2005-0036",
|
||||||
|
"refsource": "TRUSTIX",
|
||||||
|
"url": "http://www.trustix.org/errata/2005/0036"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,30 +53,20 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "PK77505",
|
"name": "ADV-2009-0854",
|
||||||
"refsource" : "AIXAPAR",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PK77505"
|
"url": "http://www.vupen.com/english/advisories/2009/0854"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "PK81212",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PK81212"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "PK82988",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PK82988"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "34001",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/34001"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "34259",
|
"name": "34259",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/34259"
|
"url": "http://www.securityfocus.com/bid/34259"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2009-0607",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2009/0607"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "34131",
|
"name": "34131",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -88,14 +78,24 @@
|
|||||||
"url": "http://secunia.com/advisories/34461"
|
"url": "http://secunia.com/advisories/34461"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2009-0607",
|
"name": "PK81212",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "AIXAPAR",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/0607"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK81212"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2009-0854",
|
"name": "PK77505",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "AIXAPAR",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/0854"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK77505"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "34001",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/34001"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "PK82988",
|
||||||
|
"refsource": "AIXAPAR",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK82988"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2009-1168",
|
"ID": "CVE-2009-1168",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,21 +57,11 @@
|
|||||||
"refsource": "CISCO",
|
"refsource": "CISCO",
|
||||||
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml"
|
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "35862",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/35862"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:6697",
|
"name": "oval:org.mitre.oval:def:6697",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6697"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6697"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1022619",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1022619"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "36046",
|
"name": "36046",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -81,6 +71,16 @@
|
|||||||
"name": "ADV-2009-2082",
|
"name": "ADV-2009-2082",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2009/2082"
|
"url": "http://www.vupen.com/english/advisories/2009/2082"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1022619",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1022619"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "35862",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/35862"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2009-1537",
|
"ID": "CVE-2009-1537",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,69 +53,69 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://isc.sans.org/diary.html?storyid=6481",
|
"name": "MS09-028",
|
||||||
"refsource" : "MISC",
|
"refsource": "MS",
|
||||||
"url" : "http://isc.sans.org/diary.html?storyid=6481"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://blogs.technet.com/msrc/archive/2009/05/28/microsoft-security-advisory-971778-vulnerability-in-microsoft-directshow-released.aspx",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://blogs.technet.com/msrc/archive/2009/05/28/microsoft-security-advisory-971778-vulnerability-in-microsoft-directshow-released.aspx"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://blogs.technet.com/srd/archive/2009/05/28/new-vulnerability-in-quicktime-parsing.aspx",
|
"name": "http://blogs.technet.com/srd/archive/2009/05/28/new-vulnerability-in-quicktime-parsing.aspx",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://blogs.technet.com/srd/archive/2009/05/28/new-vulnerability-in-quicktime-parsing.aspx"
|
"url": "http://blogs.technet.com/srd/archive/2009/05/28/new-vulnerability-in-quicktime-parsing.aspx"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.microsoft.com/technet/security/advisory/971778.mspx",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.microsoft.com/technet/security/advisory/971778.mspx"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MS09-028",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA09-195A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-195A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "35139",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/35139"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "54797",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/54797"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:6237",
|
"name": "oval:org.mitre.oval:def:6237",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6237"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6237"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1022299",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1022299"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "35268",
|
"name": "35268",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/35268"
|
"url": "http://secunia.com/advisories/35268"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2009-1445",
|
"name": "1022299",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/1445"
|
"url": "http://www.securitytracker.com/id?1022299"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-1886",
|
"name": "ADV-2009-1886",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2009/1886"
|
"url": "http://www.vupen.com/english/advisories/2009/1886"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2009-1445",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2009/1445"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "54797",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/54797"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "35139",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/35139"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA09-195A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA09-195A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://isc.sans.org/diary.html?storyid=6481",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://isc.sans.org/diary.html?storyid=6481"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.microsoft.com/technet/security/advisory/971778.mspx",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.microsoft.com/technet/security/advisory/971778.mspx"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://blogs.technet.com/msrc/archive/2009/05/28/microsoft-security-advisory-971778-vulnerability-in-microsoft-directshow-released.aspx",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://blogs.technet.com/msrc/archive/2009/05/28/microsoft-security-advisory-971778-vulnerability-in-microsoft-directshow-released.aspx"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20090518 CVE id request: slim",
|
"name": "54583",
|
||||||
"refsource" : "MLIST",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2009/05/18/2"
|
"url": "http://osvdb.org/54583"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529306",
|
"name": "slim-xauthority-info-disclosure(50611)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529306"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50611"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2009-13551",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2009-13552",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00009.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "35015",
|
"name": "35015",
|
||||||
@ -78,14 +68,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/35015"
|
"url": "http://www.securityfocus.com/bid/35015"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "54583",
|
"name": "FEDORA-2009-13551",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://osvdb.org/54583"
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00000.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "35132",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/35132"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "38070",
|
"name": "38070",
|
||||||
@ -93,9 +78,24 @@
|
|||||||
"url": "http://secunia.com/advisories/38070"
|
"url": "http://secunia.com/advisories/38070"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "slim-xauthority-info-disclosure(50611)",
|
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529306",
|
||||||
"refsource" : "XF",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50611"
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529306"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2009-13552",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00009.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20090518 CVE id request: slim",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2009/05/18/2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "35132",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/35132"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "Directory traversal vulnerability in gastbuch.php in Gästebuch (Gastebuch) 1.6 allows remote attackers to read arbitrary files via a .. (dot dot) in the start parameter."
|
"value": "Directory traversal vulnerability in gastbuch.php in G\u00e4stebuch (Gastebuch) 1.6 allows remote attackers to read arbitrary files via a .. (dot dot) in the start parameter."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "8027",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/8027"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "33707",
|
"name": "33707",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/33707"
|
"url": "http://www.securityfocus.com/bid/33707"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "8027",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "http://www.exploit-db.com/exploits/8027"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "gastbuch-gastbuch-file-include(48644)",
|
"name": "gastbuch-gastbuch-file-include(48644)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2012-0042",
|
"ID": "CVE-2012-0042",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,30 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20120111 Re: CVE request: Wireshark multiple vulnerabilities",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2012/01/11/7"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=40194",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=40194"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.wireshark.org/security/wnpa-sec-2012-02.html",
|
"name": "http://www.wireshark.org/security/wnpa-sec-2012-02.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.wireshark.org/security/wnpa-sec-2012-02.html"
|
"url": "http://www.wireshark.org/security/wnpa-sec-2012-02.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6634",
|
"name": "54425",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6634"
|
"url": "http://secunia.com/advisories/54425"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201308-05",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:0125",
|
"name": "RHSA-2013:0125",
|
||||||
@ -83,29 +68,44 @@
|
|||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0125.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0125.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oval:org.mitre.oval:def:15368",
|
"name": "48947",
|
||||||
"refsource" : "OVAL",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15368"
|
"url": "http://secunia.com/advisories/48947"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20120111 Re: CVE request: Wireshark multiple vulnerabilities",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2012/01/11/7"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1026507",
|
"name": "1026507",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1026507"
|
"url": "http://www.securitytracker.com/id?1026507"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "48947",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/48947"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "47494",
|
"name": "47494",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/47494"
|
"url": "http://secunia.com/advisories/47494"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "54425",
|
"name": "GLSA-201308-05",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://secunia.com/advisories/54425"
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=40194",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=40194"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:15368",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15368"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6634",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6634"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "hp-security-alert@hp.com",
|
||||||
"ID": "CVE-2012-0122",
|
"ID": "CVE-2012-0122",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,12 +53,12 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "HPSBMU02746",
|
"name": "SSRT100781",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://www.securityfocus.com/archive/1/521944"
|
"url": "http://www.securityfocus.com/archive/1/521944"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SSRT100781",
|
"name": "HPSBMU02746",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://www.securityfocus.com/archive/1/521944"
|
"url": "http://www.securityfocus.com/archive/1/521944"
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2012-0553",
|
"ID": "CVE-2012-0553",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,25 +57,25 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html"
|
"url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "53372",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/53372"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow",
|
"name": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow"
|
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "GLSA-201308-06",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "52445",
|
"name": "52445",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/52445"
|
"url": "http://secunia.com/advisories/52445"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "53372",
|
"name": "GLSA-201308-06",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://secunia.com/advisories/53372"
|
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2012-2748",
|
"ID": "CVE-2012-2748",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,40 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20120619 Re: Joomla! Security News 2012-06-19",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2012/06/19/2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://developer.joomla.org/security/news/471-20120602-core-information-disclosure",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://developer.joomla.org/security/news/471-20120602-core-information-disclosure"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.joomla.org/announcements/release-news/5427-joomla-255-released.html",
|
"name": "http://www.joomla.org/announcements/release-news/5427-joomla-255-released.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.joomla.org/announcements/release-news/5427-joomla-255-released.html"
|
"url": "http://www.joomla.org/announcements/release-news/5427-joomla-255-released.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "54073",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/54073"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "83069",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/83069"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "49605",
|
"name": "49605",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/49605"
|
"url": "http://secunia.com/advisories/49605"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20120619 Re: Joomla! Security News 2012-06-19",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2012/06/19/2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "83069",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/83069"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "54073",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/54073"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "joomla-unspecified1-information-disclosure(76414)",
|
"name": "joomla-unspecified1-information-disclosure(76414)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76414"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76414"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://developer.joomla.org/security/news/471-20120602-core-information-disclosure",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://developer.joomla.org/security/news/471-20120602-core-information-disclosure"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2012-2840",
|
"ID": "CVE-2012-2840",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,39 +53,39 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[libexif-devel] 20120712 libexif project security advisory July 12, 2012",
|
"name": "54437",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "http://sourceforge.net/mailarchive/message.php?msg_id=29534027"
|
"url": "http://www.securityfocus.com/bid/54437"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-2559",
|
"name": "DSA-2559",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2012/dsa-2559"
|
"url": "http://www.debian.org/security/2012/dsa-2559"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2012:1255",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1255.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2012:0903",
|
"name": "SUSE-SU-2012:0903",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-1513-1",
|
"name": "[libexif-devel] 20120712 libexif project security advisory July 12, 2012",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1513-1"
|
"url": "http://sourceforge.net/mailarchive/message.php?msg_id=29534027"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "54437",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/54437"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "49988",
|
"name": "49988",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/49988"
|
"url": "http://secunia.com/advisories/49988"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2012:1255",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-1255.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-1513-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-1513-1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2012-3378",
|
"ID": "CVE-2012-3378",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20120705 Three CVE requests: at-spi2-atk, as31, naxsi",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2012/07/05/1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20120706 Re: Three CVE requests: at-spi2-atk, as31, naxsi",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2012/07/06/3"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026",
|
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026"
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20120705 Three CVE requests: at-spi2-atk, as31, naxsi",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2012/07/05/1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=678348",
|
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=678348",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=678348"
|
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=678348"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20120706 Re: Three CVE requests: at-spi2-atk, as31, naxsi",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2012/07/06/3"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2012-3428",
|
"ID": "CVE-2012-3428",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,24 +58,29 @@
|
|||||||
"url": "https://issues.jboss.org/browse/JBPAPP-9584"
|
"url": "https://issues.jboss.org/browse/JBPAPP-9584"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=843358",
|
"name": "RHSA-2012:1594",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=843358"
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-1594.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://issues.jboss.org/browse/JBJCA-864",
|
"name": "https://issues.jboss.org/browse/JBJCA-864",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://issues.jboss.org/browse/JBJCA-864"
|
"url": "https://issues.jboss.org/browse/JBJCA-864"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "51607",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/51607"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522",
|
"name": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522"
|
"url": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2012:1591",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=843358",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1591.html"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=843358"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2012:1592",
|
"name": "RHSA-2012:1592",
|
||||||
@ -83,14 +88,9 @@
|
|||||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1592.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-1592.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2012:1594",
|
"name": "RHSA-2012:1591",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1594.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-1591.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "51607",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/51607"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2012-3523",
|
"ID": "CVE-2012-3523",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MANDRIVA",
|
"refsource": "MANDRIVA",
|
||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:156"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:156"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2012:1171",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2012-09/msg00058.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "50661",
|
"name": "50661",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/50661"
|
"url": "http://secunia.com/advisories/50661"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2012:1171",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00058.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2012-3683",
|
"ID": "CVE-2012-3683",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT5400",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT5400"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT5485",
|
"name": "http://support.apple.com/kb/HT5485",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.apple.com/kb/HT5485"
|
"url": "http://support.apple.com/kb/HT5485"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2012-09-19-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT5503",
|
"name": "http://support.apple.com/kb/HT5503",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.apple.com/kb/HT5503"
|
"url": "http://support.apple.com/kb/HT5503"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2012-07-25-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2012-09-12-1",
|
"name": "APPLE-SA-2012-09-12-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
|
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2012-09-19-1",
|
"name": "APPLE-SA-2012-07-25-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT5400",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT5400"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://www.httpcs.com/advisories",
|
"name": "http://www.phplist.com/?lid=579",
|
||||||
"refsource" : "MISC",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://www.httpcs.com/advisories"
|
"url": "http://www.phplist.com/?lid=579"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.httpcs.com/advisory/httpcs1",
|
"name": "https://www.httpcs.com/advisory/httpcs1",
|
||||||
@ -63,9 +63,14 @@
|
|||||||
"url": "https://www.httpcs.com/advisory/httpcs1"
|
"url": "https://www.httpcs.com/advisory/httpcs1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://www.httpcs.com/advisory/httpcs2",
|
"name": "https://www.httpcs.com/advisories",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "https://www.httpcs.com/advisory/httpcs2"
|
"url": "https://www.httpcs.com/advisories"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.httpcs.com/advisory/httpcs4",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.httpcs.com/advisory/httpcs4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.httpcs.com/advisory/httpcs3",
|
"name": "https://www.httpcs.com/advisory/httpcs3",
|
||||||
@ -73,9 +78,9 @@
|
|||||||
"url": "https://www.httpcs.com/advisory/httpcs3"
|
"url": "https://www.httpcs.com/advisory/httpcs3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://www.httpcs.com/advisory/httpcs4",
|
"name": "https://www.httpcs.com/advisory/httpcs2",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "https://www.httpcs.com/advisory/httpcs4"
|
"url": "https://www.httpcs.com/advisory/httpcs2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.httpcs.com/advisory/httpcs6",
|
"name": "https://www.httpcs.com/advisory/httpcs6",
|
||||||
@ -86,11 +91,6 @@
|
|||||||
"name": "https://www.httpcs.com/advisory/httpcs7",
|
"name": "https://www.httpcs.com/advisory/httpcs7",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://www.httpcs.com/advisory/httpcs7"
|
"url": "https://www.httpcs.com/advisory/httpcs7"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.phplist.com/?lid=579",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.phplist.com/?lid=579"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,36 +52,36 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.vbulletin.com/forum/showthread.php/400162-vBulletin-3-x-MAPI-Plugin-1-4-3-released-with-security-patch-04-23-2012",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.vbulletin.com/forum/showthread.php/400162-vBulletin-3-x-MAPI-Plugin-1-4-3-released-with-security-patch-04-23-2012"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.vbulletin.com/forum/showthread.php/400164-vBulletin-Security-Patch-for-vBulletin-4-1-2-4-1-11-for-Suite-amp-Forum-04-23-2012",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.vbulletin.com/forum/showthread.php/400164-vBulletin-Security-Patch-for-vBulletin-4-1-2-4-1-11-for-Suite-amp-Forum-04-23-2012"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.vbulletin.com/forum/showthread.php/400165-vBulletin-Security-Patch-for-vBulletin-4-1-12-for-Suite-amp-Forum-04-23-2012",
|
"name": "https://www.vbulletin.com/forum/showthread.php/400165-vBulletin-Security-Patch-for-vBulletin-4-1-12-for-Suite-amp-Forum-04-23-2012",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://www.vbulletin.com/forum/showthread.php/400165-vBulletin-Security-Patch-for-vBulletin-4-1-12-for-Suite-amp-Forum-04-23-2012"
|
"url": "https://www.vbulletin.com/forum/showthread.php/400165-vBulletin-Security-Patch-for-vBulletin-4-1-12-for-Suite-amp-Forum-04-23-2012"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "53226",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/53226"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "81474",
|
"name": "81474",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/81474"
|
"url": "http://osvdb.org/81474"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.vbulletin.com/forum/showthread.php/400164-vBulletin-Security-Patch-for-vBulletin-4-1-2-4-1-11-for-Suite-amp-Forum-04-23-2012",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.vbulletin.com/forum/showthread.php/400164-vBulletin-Security-Patch-for-vBulletin-4-1-2-4-1-11-for-Suite-amp-Forum-04-23-2012"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "48917",
|
"name": "48917",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/48917"
|
"url": "http://secunia.com/advisories/48917"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "53226",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/53226"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.vbulletin.com/forum/showthread.php/400162-vBulletin-3-x-MAPI-Plugin-1-4-3-released-with-security-patch-04-23-2012",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.vbulletin.com/forum/showthread.php/400162-vBulletin-3-x-MAPI-Plugin-1-4-3-released-with-security-patch-04-23-2012"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "vbulletin-mapi-unspecified(75160)",
|
"name": "vbulletin-mapi-unspecified(75160)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://technet.microsoft.com/security/msvr/msvr12-014",
|
"name": "50656",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://technet.microsoft.com/security/msvr/msvr12-014"
|
"url": "http://secunia.com/advisories/50656"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt",
|
"name": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt"
|
"url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "50656",
|
"name": "http://technet.microsoft.com/security/msvr/msvr12-014",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url" : "http://secunia.com/advisories/50656"
|
"url": "http://technet.microsoft.com/security/msvr/msvr12-014"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,16 +57,16 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/18912"
|
"url": "http://www.exploit-db.com/exploits/18912"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.henryhoggard.co.uk/security/197",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.henryhoggard.co.uk/security/197"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "53637",
|
"name": "53637",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/53637"
|
"url": "http://www.securityfocus.com/bid/53637"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.henryhoggard.co.uk/security/197",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.henryhoggard.co.uk/security/197"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "49215",
|
"name": "49215",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "JVN#51274854",
|
|
||||||
"refsource" : "JVN",
|
|
||||||
"url" : "http://jvn.jp/en/jp/JVN51274854/index.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "99290",
|
"name": "99290",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/99290"
|
"url": "http://www.securityfocus.com/bid/99290"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "JVN#51274854",
|
||||||
|
"refsource": "JVN",
|
||||||
|
"url": "http://jvn.jp/en/jp/JVN51274854/index.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "41801",
|
"name": "1038137",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://www.exploit-db.com/exploits/41801/"
|
"url": "http://www.securitytracker.com/id/1038137"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT207600",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT207600"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://support.apple.com/HT207601",
|
"name": "https://support.apple.com/HT207601",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "https://support.apple.com/HT207601"
|
"url": "https://support.apple.com/HT207601"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://support.apple.com/HT207617",
|
"name": "97130",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "https://support.apple.com/HT207617"
|
"url": "http://www.securityfocus.com/bid/97130"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "41801",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/41801/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201706-15",
|
"name": "GLSA-201706-15",
|
||||||
@ -78,14 +78,14 @@
|
|||||||
"url": "https://security.gentoo.org/glsa/201706-15"
|
"url": "https://security.gentoo.org/glsa/201706-15"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "97130",
|
"name": "https://support.apple.com/HT207600",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/97130"
|
"url": "https://support.apple.com/HT207600"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1038137",
|
"name": "https://support.apple.com/HT207617",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1038137"
|
"url": "https://support.apple.com/HT207617"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/radare/radare2/commit/252afb1cff9676f3ae1f341a28448bf2c8b6e308",
|
"name": "96523",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "https://github.com/radare/radare2/commit/252afb1cff9676f3ae1f341a28448bf2c8b6e308"
|
"url": "http://www.securityfocus.com/bid/96523"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/radare/radare2/issues/6872",
|
"name": "https://github.com/radare/radare2/issues/6872",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://github.com/radare/radare2/issues/6872"
|
"url": "https://github.com/radare/radare2/issues/6872"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "96523",
|
"name": "https://github.com/radare/radare2/commit/252afb1cff9676f3ae1f341a28448bf2c8b6e308",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/96523"
|
"url": "https://github.com/radare/radare2/commit/252afb1cff9676f3ae1f341a28448bf2c8b6e308"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc1",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "98951",
|
"name": "98951",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/98951"
|
"url": "http://www.securityfocus.com/bid/98951"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,50 +52,50 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "42955",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/42955/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT208112",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT208112"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT208113",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT208113"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT208116",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT208116"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://support.apple.com/HT208141",
|
"name": "https://support.apple.com/HT208141",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://support.apple.com/HT208141"
|
"url": "https://support.apple.com/HT208141"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT208142",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT208142"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "101006",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/101006"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1039384",
|
"name": "1039384",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1039384"
|
"url": "http://www.securitytracker.com/id/1039384"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "42955",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/42955/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT208142",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT208142"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT208113",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT208113"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "101006",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/101006"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT208112",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT208112"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1039428",
|
"name": "1039428",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1039428"
|
"url": "http://www.securitytracker.com/id/1039428"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT208116",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT208116"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -60,6 +60,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1041689",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1041689"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20180919 Cisco Webex Network Recording Player Remote Code Execution Vulnerabilities",
|
"name": "20180919 Cisco Webex Network Recording Player Remote Code Execution Vulnerabilities",
|
||||||
"refsource": "CISCO",
|
"refsource": "CISCO",
|
||||||
@ -69,11 +74,6 @@
|
|||||||
"name": "105374",
|
"name": "105374",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/105374"
|
"url": "http://www.securityfocus.com/bid/105374"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1041689",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1041689"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "chrome-cve-admin@google.com",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2018-20070",
|
"ID": "CVE-2018-20070",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,15 +53,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://crbug.com/895885",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://crbug.com/895885"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
|
"name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
|
"url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://crbug.com/895885",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://crbug.com/895885"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://github.com/mate-desktop/mate-screensaver/pull/167",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/mate-desktop/mate-screensaver/pull/167"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/mate-desktop/mate-screensaver/issues/170",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/mate-desktop/mate-screensaver/issues/170"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/mate-desktop/mate-screensaver/issues/152",
|
"name": "https://github.com/mate-desktop/mate-screensaver/issues/152",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,16 +71,6 @@
|
|||||||
"name": "https://github.com/mate-desktop/mate-screensaver/issues/155",
|
"name": "https://github.com/mate-desktop/mate-screensaver/issues/155",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/mate-desktop/mate-screensaver/issues/155"
|
"url": "https://github.com/mate-desktop/mate-screensaver/issues/155"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/mate-desktop/mate-screensaver/issues/170",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/mate-desktop/mate-screensaver/issues/170"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/mate-desktop/mate-screensaver/pull/167",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/mate-desktop/mate-screensaver/pull/167"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://github.com/Cacti/cacti/issues/2212",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/Cacti/cacti/issues/2212"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/Cacti/cacti/blob/develop/CHANGELOG",
|
"name": "https://github.com/Cacti/cacti/blob/develop/CHANGELOG",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "https://github.com/Cacti/cacti/commit/1f42478506d83d188f68ce5ff41728a7bd159f53",
|
"name": "https://github.com/Cacti/cacti/commit/1f42478506d83d188f68ce5ff41728a7bd159f53",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/Cacti/cacti/commit/1f42478506d83d188f68ce5ff41728a7bd159f53"
|
"url": "https://github.com/Cacti/cacti/commit/1f42478506d83d188f68ce5ff41728a7bd159f53"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/Cacti/cacti/issues/2212",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/Cacti/cacti/issues/2212"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2018-9522",
|
"ID": "CVE-2018-9522",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://source.android.com/security/bulletin/2018-11-01",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.android.com/security/bulletin/2018-11-01"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "105848",
|
"name": "105848",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/105848"
|
"url": "http://www.securityfocus.com/bid/105848"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.android.com/security/bulletin/2018-11-01",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.android.com/security/bulletin/2018-11-01"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user