mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3ccf9564eb
commit
9081ef56ee
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010112 Trustix Security Advisory - diffutils squid",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0212.html"
|
||||
},
|
||||
{
|
||||
"name": "20010110 Immunix OS Security update for lots of temp file problems",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=97916374410647&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2001:003",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-003.php3"
|
||||
"name": "2184",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2184"
|
||||
},
|
||||
{
|
||||
"name": "DSA-019",
|
||||
@ -78,9 +73,14 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5921"
|
||||
},
|
||||
{
|
||||
"name" : "2184",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/2184"
|
||||
"name": "MDKSA-2001:003",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-003.php3"
|
||||
},
|
||||
{
|
||||
"name": "20010112 Trustix Security Advisory - diffutils squid",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-01/0212.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MDKSA-2001:012",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-012.php3?dis=7.2"
|
||||
},
|
||||
{
|
||||
"name": "SuSE-SA:2001:01",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2001_001_glibc_txt.html"
|
||||
},
|
||||
{
|
||||
"name" : "CSSA-2001-007",
|
||||
"refsource" : "CALDERA",
|
||||
"url" : "http://www.calderasystems.com/support/security/advisories/CSSA-2001-007.0.txt"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2001:002",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2001-002.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-039",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2001/dsa-039"
|
||||
},
|
||||
{
|
||||
"name" : "TLSA2000021-2",
|
||||
"refsource" : "TURBO",
|
||||
"url" : "http://archives.neohapsis.com/archives/linux/turbolinux/2001-q1/0004.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010121 Trustix Security Advisory - glibc",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/157650"
|
||||
"name": "linux-glibc-preload-overwrite(5971)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5971"
|
||||
},
|
||||
{
|
||||
"name": "2223",
|
||||
@ -93,9 +73,29 @@
|
||||
"url": "http://www.securityfocus.com/bid/2223"
|
||||
},
|
||||
{
|
||||
"name" : "linux-glibc-preload-overwrite(5971)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5971"
|
||||
"name": "20010121 Trustix Security Advisory - glibc",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/157650"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2001:012",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-012.php3?dis=7.2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2001:002",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2001-002.html"
|
||||
},
|
||||
{
|
||||
"name": "TLSA2000021-2",
|
||||
"refsource": "TURBO",
|
||||
"url": "http://archives.neohapsis.com/archives/linux/turbolinux/2001-q1/0004.html"
|
||||
},
|
||||
{
|
||||
"name": "CSSA-2001-007",
|
||||
"refsource": "CALDERA",
|
||||
"url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-007.0.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "20010409 BINTEC X1200",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=98697054804197&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20010404 BinTec X4000 Access Router DoS Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=98644414226344&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20010406 X4000 DoS: Details and workaround",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=98659862317070&w=2"
|
||||
"name": "bintec-x4000-nmap-dos(6323)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6323"
|
||||
},
|
||||
{
|
||||
"name": "20010410 BinTec Router DoS: Workaround and Details",
|
||||
@ -68,14 +73,9 @@
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0145.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010409 BINTEC X1200",
|
||||
"name": "20010406 X4000 DoS: Details and workaround",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=98697054804197&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "bintec-x4000-nmap-dos(6323)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6323"
|
||||
"url": "http://marc.info/?l=bugtraq&m=98659862317070&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010618 Multiple Vulnerabilities In AMLServer",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0228.html"
|
||||
},
|
||||
{
|
||||
"name": "2883",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2883"
|
||||
},
|
||||
{
|
||||
"name": "20010618 Multiple Vulnerabilities In AMLServer",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0228.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.greenepa.net/~averett/cerberus-releasenotes.htm#ReleaseNotes"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.securiteam.com/windowsntfocus/5SP0M0055W.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.securiteam.com/windowsntfocus/5SP0M0055W.html"
|
||||
},
|
||||
{
|
||||
"name": "cerberus-ftp-directory-traversal(7004)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/7004.php"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securiteam.com/windowsntfocus/5SP0M0055W.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securiteam.com/windowsntfocus/5SP0M0055W.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "Q241352",
|
||||
"refsource" : "MSKB",
|
||||
"url" : "http://support.microsoft.com/default.aspx?scid=KB;en-us;q241352"
|
||||
},
|
||||
{
|
||||
"name" : "VU#109475",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/109475"
|
||||
"name": "nt-ms-dns-cachepollution(3675)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3675"
|
||||
},
|
||||
{
|
||||
"name": "6791",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/6791"
|
||||
},
|
||||
{
|
||||
"name" : "nt-ms-dns-cachepollution(3675)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/3675"
|
||||
"name": "VU#109475",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/109475"
|
||||
},
|
||||
{
|
||||
"name": "Q241352",
|
||||
"refsource": "MSKB",
|
||||
"url": "http://support.microsoft.com/default.aspx?scid=KB;en-us;q241352"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/01-e.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/01-e.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/index-e.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/index-e.html"
|
||||
"name": "hitachi-groupmax-client-dos(26099)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26099"
|
||||
},
|
||||
{
|
||||
"name": "JVN#89344424",
|
||||
@ -68,9 +63,9 @@
|
||||
"url": "http://jvn.jp/jp/JVN%2389344424/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1539",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1539"
|
||||
"name": "19840",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19840"
|
||||
},
|
||||
{
|
||||
"name": "24969",
|
||||
@ -78,14 +73,19 @@
|
||||
"url": "http://www.osvdb.org/24969"
|
||||
},
|
||||
{
|
||||
"name" : "19840",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19840"
|
||||
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/01-e.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/01-e.html"
|
||||
},
|
||||
{
|
||||
"name" : "hitachi-groupmax-client-dos(26099)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26099"
|
||||
"name": "ADV-2006-1539",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1539"
|
||||
},
|
||||
{
|
||||
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/index-e.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/index-e.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://evuln.com/vulns/131/summary.html"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1603",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1603"
|
||||
},
|
||||
{
|
||||
"name": "19899",
|
||||
"refsource": "SECUNIA",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "advancedpoll-header-spoofing(26154)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26154"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1603",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1603"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060608 cms-bandits 2.5, Remote command execution",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/436430/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2211",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2211"
|
||||
},
|
||||
{
|
||||
"name": "20060608 cms-bandits 2.5, Remote command execution",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/436430/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "26241",
|
||||
"refsource": "OSVDB",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://www.osvdb.org/26242"
|
||||
},
|
||||
{
|
||||
"name" : "20507",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20507"
|
||||
"name": "cmsbandits-spawroot-file-include(27001)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27001"
|
||||
},
|
||||
{
|
||||
"name": "1068",
|
||||
@ -83,9 +83,9 @@
|
||||
"url": "http://securityreason.com/securityalert/1068"
|
||||
},
|
||||
{
|
||||
"name" : "cmsbandits-spawroot-file-include(27001)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27001"
|
||||
"name": "20507",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20507"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-devel] 20080811 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.debian.org/debian-devel/2008/08/msg00285.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2009-1366",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00187.html"
|
||||
},
|
||||
{
|
||||
"name": "31694",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31694"
|
||||
},
|
||||
{
|
||||
"name": "33825",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33825"
|
||||
},
|
||||
{
|
||||
"name" : "31694",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31694"
|
||||
"name": "[debian-devel] 20080811 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.debian.org/debian-devel/2008/08/msg00285.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1021493",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021493"
|
||||
},
|
||||
{
|
||||
"name": "20081223 PGP Desktop 9.0.6 Denial Of Service - ZeroDay",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/499572/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "7556",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7556"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service.php",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service.php"
|
||||
},
|
||||
{
|
||||
"name": "http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service_POC.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service_POC.php"
|
||||
},
|
||||
{
|
||||
"name": "33310",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33310"
|
||||
},
|
||||
{
|
||||
"name": "7556",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7556"
|
||||
},
|
||||
{
|
||||
"name": "32991",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32991"
|
||||
},
|
||||
{
|
||||
"name": "4811",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4811"
|
||||
},
|
||||
{
|
||||
"name": "50914",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/50914"
|
||||
},
|
||||
{
|
||||
"name" : "1021493",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1021493"
|
||||
},
|
||||
{
|
||||
"name" : "33310",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33310"
|
||||
},
|
||||
{
|
||||
"name" : "4811",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4811"
|
||||
"name": "http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MDVSA-2011:059",
|
||||
"name": "MDVSA-2011:088",
|
||||
"refsource": "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:059"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2011:060",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:060"
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:088"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:061",
|
||||
@ -72,15 +67,20 @@
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:062"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2011:088",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:088"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:089",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:089"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:059",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:059"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:060",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:060"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-2196",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,25 +53,15 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=712283",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=712283"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:0945",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0945.html"
|
||||
"name": "48716",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48716"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0946",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0946.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:0947",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0947.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0948",
|
||||
"refsource": "REDHAT",
|
||||
@ -82,25 +72,35 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0949.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:0950",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0950.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0951",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0951.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0945",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0945.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=712283",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=712283"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0950",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0950.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0947",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0947.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0952",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0952.html"
|
||||
},
|
||||
{
|
||||
"name" : "48716",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/48716"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-2443",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "17918",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/17918/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5049.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5049.php"
|
||||
},
|
||||
{
|
||||
"name": "8410",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/8410"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/advisories/apsa11-03.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/advisories/apsa11-03.html"
|
||||
},
|
||||
{
|
||||
"name" : "8410",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/8410"
|
||||
"name": "17918",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/17918/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ibm.com/software/lotus/symphony/buzz.nsf/web_DisPlayPlugin?open&unid=9717F6F587AAA939852578D300404BCF&category=announcements",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/software/lotus/symphony/buzz.nsf/web_DisPlayPlugin?open&unid=9717F6F587AAA939852578D300404BCF&category=announcements"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ibm.com/software/lotus/symphony/idcontents/releasenotes/en/readme_fixpack3_standalone_long.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/software/lotus/symphony/idcontents/releasenotes/en/readme_fixpack3_standalone_long.htm"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21505448",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21505448"
|
||||
},
|
||||
{
|
||||
"name" : "https://www-304.ibm.com/jct03001c/software/lotus/symphony/idcontents/releasenotes/en/readme_embedded_in_fixpack3_long.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www-304.ibm.com/jct03001c/software/lotus/symphony/idcontents/releasenotes/en/readme_embedded_in_fixpack3_long.htm"
|
||||
"name": "lotus-symphony-document-dos(68889)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68889"
|
||||
},
|
||||
{
|
||||
"name": "48936",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48936"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg21505448",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg21505448"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/software/lotus/symphony/buzz.nsf/web_DisPlayPlugin?open&unid=9717F6F587AAA939852578D300404BCF&category=announcements",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/software/lotus/symphony/buzz.nsf/web_DisPlayPlugin?open&unid=9717F6F587AAA939852578D300404BCF&category=announcements"
|
||||
},
|
||||
{
|
||||
"name": "https://www-304.ibm.com/jct03001c/software/lotus/symphony/idcontents/releasenotes/en/readme_embedded_in_fixpack3_long.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www-304.ibm.com/jct03001c/software/lotus/symphony/idcontents/releasenotes/en/readme_embedded_in_fixpack3_long.htm"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/software/lotus/symphony/idcontents/releasenotes/en/readme_fixpack3_standalone_long.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/software/lotus/symphony/idcontents/releasenotes/en/readme_fixpack3_standalone_long.htm"
|
||||
},
|
||||
{
|
||||
"name": "74163",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/74163"
|
||||
},
|
||||
{
|
||||
"name" : "lotus-symphony-document-dos(68889)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68889"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20110720 Re: CVE Request: ruby PRNG fixes",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/07/20/1"
|
||||
},
|
||||
{
|
||||
"name" : "http://redmine.ruby-lang.org/issues/show/4338",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://redmine.ruby-lang.org/issues/show/4338"
|
||||
"name": "49126",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/49126"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:1581",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-1581.html"
|
||||
},
|
||||
{
|
||||
"name": "ruby-random-number-weak-security(69157)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69157"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:0070",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-0070.html"
|
||||
},
|
||||
{
|
||||
"name" : "49126",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/49126"
|
||||
"name": "http://redmine.ruby-lang.org/issues/show/4338",
|
||||
"refsource": "MISC",
|
||||
"url": "http://redmine.ruby-lang.org/issues/show/4338"
|
||||
},
|
||||
{
|
||||
"name" : "ruby-random-number-weak-security(69157)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69157"
|
||||
"name": "[oss-security] 20110720 Re: CVE Request: ruby PRNG fixes",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-3343",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20110902 CVE request for OpenTTD",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2011/09/02/4"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110906 Re: CVE request for OpenTTD",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2011/09/06/2"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.openttd.org/task/4746",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.openttd.org/task/4746"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.openttd.org/task/4747",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.openttd.org/task/4747"
|
||||
},
|
||||
{
|
||||
"name": "http://security.openttd.org/en/CVE-2011-3343",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://security.openttd.org/en/CVE-2011-3343"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2386",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2386"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-12975",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html"
|
||||
},
|
||||
{
|
||||
"name": "46075",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/46075"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2386",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2386"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.openttd.org/task/4746",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.openttd.org/task/4746"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110902 CVE request for OpenTTD",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2011/09/02/4"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.openttd.org/task/4747",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.openttd.org/task/4747"
|
||||
},
|
||||
{
|
||||
"name": "49439",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/49439"
|
||||
},
|
||||
{
|
||||
"name" : "46075",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/46075"
|
||||
"name": "[oss-security] 20110906 Re: CVE request for OpenTTD",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2011/09/06/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2011-3411",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS11-091",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091"
|
||||
"name": "oval:org.mitre.oval:def:14346",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14346"
|
||||
},
|
||||
{
|
||||
"name": "TA11-347A",
|
||||
@ -67,15 +67,15 @@
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/361441"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:14346",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14346"
|
||||
},
|
||||
{
|
||||
"name": "1026414",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1026414"
|
||||
},
|
||||
{
|
||||
"name": "MS11-091",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-4297",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2013-0113",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-0334",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "GLSA-201609-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201609-02"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2014-11649",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140609.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2014-11630",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140654.html"
|
||||
},
|
||||
{
|
||||
"name": "http://bundler.io/blog/2014/08/14/bundler-may-install-gems-from-a-different-source-than-expected-cve-2013-0334.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,26 +77,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2014-11630",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140654.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2014-11649",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140609.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2014-11677",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140655.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201609-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201609-02"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0628",
|
||||
"refsource": "SUSE",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-1532",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
|
||||
"name": "53372",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/53372"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201308-06",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:150",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0772",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0772.html"
|
||||
},
|
||||
{
|
||||
"name" : "53372",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/53372"
|
||||
"name": "MDVSA-2013:150",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://supportforums.adtran.com/docs/DOC-6414",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://supportforums.adtran.com/docs/DOC-6414"
|
||||
},
|
||||
{
|
||||
"name": "https://supportforums.adtran.com/servlet/JiveServlet/downloadBody/6414-102-3-7862/NetVanta%207000%20Series%20Products%20AOS%20R10.8.1%20Release%20Notes.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://supportforums.adtran.com/servlet/JiveServlet/downloadBody/6414-102-3-7862/NetVanta%207000%20Series%20Products%20AOS%20R10.8.1%20Release%20Notes.pdf"
|
||||
},
|
||||
{
|
||||
"name": "https://supportforums.adtran.com/docs/DOC-6414",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://supportforums.adtran.com/docs/DOC-6414"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20131110 D-Link Router 2760N (DSL-2760U-BN) Multiple XSS",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2013/Nov/76"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/123976",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/123976"
|
||||
},
|
||||
{
|
||||
"name" : "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10002",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10002"
|
||||
},
|
||||
{
|
||||
"name" : "99603",
|
||||
"name": "99611",
|
||||
"refsource": "OSVDB",
|
||||
"url" : "http://osvdb.org/99603"
|
||||
"url": "http://osvdb.org/99611"
|
||||
},
|
||||
{
|
||||
"name" : "99604",
|
||||
"name": "99609",
|
||||
"refsource": "OSVDB",
|
||||
"url" : "http://osvdb.org/99604"
|
||||
"url": "http://osvdb.org/99609"
|
||||
},
|
||||
{
|
||||
"name": "dlink-cve20135223-xss(88723)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88723"
|
||||
},
|
||||
{
|
||||
"name": "dlink-cve20135223-multiple-xss(88724)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88724"
|
||||
},
|
||||
{
|
||||
"name": "99605",
|
||||
@ -83,9 +78,9 @@
|
||||
"url": "http://osvdb.org/99605"
|
||||
},
|
||||
{
|
||||
"name" : "99606",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/99606"
|
||||
"name": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10002",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10002"
|
||||
},
|
||||
{
|
||||
"name": "99607",
|
||||
@ -98,9 +93,9 @@
|
||||
"url": "http://osvdb.org/99608"
|
||||
},
|
||||
{
|
||||
"name" : "99609",
|
||||
"name": "99606",
|
||||
"refsource": "OSVDB",
|
||||
"url" : "http://osvdb.org/99609"
|
||||
"url": "http://osvdb.org/99606"
|
||||
},
|
||||
{
|
||||
"name": "99610",
|
||||
@ -108,39 +103,44 @@
|
||||
"url": "http://osvdb.org/99610"
|
||||
},
|
||||
{
|
||||
"name" : "99611",
|
||||
"name": "99604",
|
||||
"refsource": "OSVDB",
|
||||
"url" : "http://osvdb.org/99611"
|
||||
},
|
||||
{
|
||||
"name" : "99612",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/99612"
|
||||
},
|
||||
{
|
||||
"name" : "99613",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/99613"
|
||||
"url": "http://osvdb.org/99604"
|
||||
},
|
||||
{
|
||||
"name": "99615",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/99615"
|
||||
},
|
||||
{
|
||||
"name": "20131110 D-Link Router 2760N (DSL-2760U-BN) Multiple XSS",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2013/Nov/76"
|
||||
},
|
||||
{
|
||||
"name": "99603",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/99603"
|
||||
},
|
||||
{
|
||||
"name": "99612",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/99612"
|
||||
},
|
||||
{
|
||||
"name": "99616",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/99616"
|
||||
},
|
||||
{
|
||||
"name" : "dlink-cve20135223-multiple-xss(88724)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/88724"
|
||||
"name": "http://packetstormsecurity.com/files/123976",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/123976"
|
||||
},
|
||||
{
|
||||
"name" : "dlink-cve20135223-xss(88723)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/88723"
|
||||
"name": "99613",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/99613"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-5793",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201409-04",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201409-04.xml"
|
||||
},
|
||||
{
|
||||
"name": "63116",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/63116"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
|
||||
},
|
||||
{
|
||||
"name": "1029184",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029184"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201409-04",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201409-04.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.security-assessment.com/files/documents/advisory/reversesegment.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0040",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0040"
|
||||
},
|
||||
{
|
||||
"name": "96094",
|
||||
"refsource": "BID",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "1038008",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038008"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0040",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0040"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0489",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-12-29",
|
||||
"ID": "CVE-2017-1000421",
|
||||
"REQUESTER": "junxzm@hotmail.com",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Gifsicle (Gifview)",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.89 and older"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Eddie Kohler"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Use-After-Free"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -59,15 +59,15 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/kohler/gifsicle/issues/114",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/kohler/gifsicle/issues/114"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4084",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4084"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/kohler/gifsicle/issues/114",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/kohler/gifsicle/issues/114"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-12-29",
|
||||
"ID": "CVE-2017-1000453",
|
||||
"REQUESTER": "m.daniel.legall@gmail.com",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "CMS Made Simple",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.1.6, 2.2"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "CMS Made Simple"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Server Side Template Injection"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9e3f7a29694049edd728e2400ab57ad7553e5aa9",
|
||||
"name": "https://github.com/torvalds/linux/commit/9e3f7a29694049edd728e2400ab57ad7553e5aa9",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9e3f7a29694049edd728e2400ab57ad7553e5aa9"
|
||||
"url": "https://github.com/torvalds/linux/commit/9e3f7a29694049edd728e2400ab57ad7553e5aa9"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.11",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.11"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9e3f7a29694049edd728e2400ab57ad7553e5aa9",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9e3f7a29694049edd728e2400ab57ad7553e5aa9"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1492984",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492984"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/9e3f7a29694049edd728e2400ab57ad7553e5aa9",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/torvalds/linux/commit/9e3f7a29694049edd728e2400ab57ad7553e5aa9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbmu03753en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbmu03753en_us"
|
||||
"name": "1039437",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039437"
|
||||
},
|
||||
{
|
||||
"name": "101029",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/101029"
|
||||
},
|
||||
{
|
||||
"name" : "1039437",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039437"
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbmu03753en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbmu03753en_us"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/radare/radare2/commit/0b973e28166636e0ff1fad80baa0385c9c09c53a",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/radare/radare2/commit/0b973e28166636e0ff1fad80baa0385c9c09c53a"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/radare/radare2/issues/8742",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/radare/radare2/issues/8742"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/radare/radare2/commit/0b973e28166636e0ff1fad80baa0385c9c09c53a",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/radare/radare2/commit/0b973e28166636e0ff1fad80baa0385c9c09c53a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-16509",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "43219",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/43219/"
|
||||
},
|
||||
{
|
||||
"name": "https://m4.rkw.io/blog/cve201716777-local-root-privesc-in-hashicorp-vagrantvmwarefusion-503.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://m4.rkw.io/blog/cve201716777-local-root-privesc-in-hashicorp-vagrantvmwarefusion-503.html"
|
||||
},
|
||||
{
|
||||
"name": "43219",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/43219/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4167",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4305",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4694",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "chrome-cve-admin@google.com",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2018-18337",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -63,16 +63,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4352",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4352"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:3803",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3803"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4352",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4352"
|
||||
},
|
||||
{
|
||||
"name": "106084",
|
||||
"refsource": "BID",
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=698860"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4334",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4334"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201811-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201811-15"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4334",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4334"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user