mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
f9277e4046
commit
98c016d997
@ -53,19 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010829 Security Advisory for Bugzilla v2.13 and older",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=99912899900567"
|
||||
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=95235",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=95235"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugzilla.mozilla.org/show_bug.cgi?id=38854",
|
||||
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=39536",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://bugzilla.mozilla.org/show_bug.cgi?id=38854"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugzilla.mozilla.org/show_bug.cgi?id=38855",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugzilla.mozilla.org/show_bug.cgi?id=38855"
|
||||
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=39536"
|
||||
},
|
||||
{
|
||||
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=87701",
|
||||
@ -77,20 +72,25 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=38859"
|
||||
},
|
||||
{
|
||||
"name": "20010829 Security Advisory for Bugzilla v2.13 and older",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=99912899900567"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2001:107",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2001-107.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugzilla.mozilla.org/show_bug.cgi?id=39536",
|
||||
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=38854",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://bugzilla.mozilla.org/show_bug.cgi?id=39536"
|
||||
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=38854"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugzilla.mozilla.org/show_bug.cgi?id=95235",
|
||||
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=38855",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://bugzilla.mozilla.org/show_bug.cgi?id=95235"
|
||||
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=38855"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,25 +53,25 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20011012 Bug in PostNuke 0.62, 0.63 and 0.64 (and possibly PHPnuke)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-10/0088.html"
|
||||
"name": "VU#921547",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/921547"
|
||||
},
|
||||
{
|
||||
"name": "20011013 Bug in PostNuke 0.62, 0.63 and 0.64 (and possibly PHPnuke)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-10/0091.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#921547",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/921547"
|
||||
},
|
||||
{
|
||||
"name": "3435",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/3435"
|
||||
},
|
||||
{
|
||||
"name": "20011012 Bug in PostNuke 0.62, 0.63 and 0.64 (and possibly PHPnuke)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-10/0088.html"
|
||||
},
|
||||
{
|
||||
"name": "postnuke-getusrinfo-bypass-authentication(7280)",
|
||||
"refsource": "XF",
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/212805"
|
||||
},
|
||||
{
|
||||
"name" : "CLA-2002:450",
|
||||
"refsource" : "CONECTIVA",
|
||||
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000450"
|
||||
"name": "3310",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/3310"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2002:005",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:005"
|
||||
},
|
||||
{
|
||||
"name" : "3310",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/3310"
|
||||
"name": "CLA-2002:450",
|
||||
"refsource": "CONECTIVA",
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000450"
|
||||
},
|
||||
{
|
||||
"name": "proftpd-unresolved-hostname(7126)",
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-12/0008.html"
|
||||
},
|
||||
{
|
||||
"name" : "20011204 RE: Stack overflow in all Internet Explorer Versions!!",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-12/0034.html"
|
||||
},
|
||||
{
|
||||
"name": "ie-settimeout-dos(7661)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/7661.php"
|
||||
},
|
||||
{
|
||||
"name": "20011204 RE: Stack overflow in all Internet Explorer Versions!!",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-12/0034.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/432022/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060427 Re: Instant Photo Gallery <= Multiple XSS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/432241/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "17696",
|
||||
"refsource": "BID",
|
||||
@ -72,6 +67,11 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/24984"
|
||||
},
|
||||
{
|
||||
"name": "20060427 Re: Instant Photo Gallery <= Multiple XSS",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/432241/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "790",
|
||||
"refsource": "SREASON",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2006-2386",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,49 +53,49 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBST02180",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061288",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MS06-076",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-076"
|
||||
},
|
||||
{
|
||||
"name" : "TA06-346A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-346A.html"
|
||||
"name": "23311",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23311"
|
||||
},
|
||||
{
|
||||
"name": "21501",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21501"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4969",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4969"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:1055",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1055"
|
||||
},
|
||||
{
|
||||
"name": "TA06-346A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA06-346A.html"
|
||||
},
|
||||
{
|
||||
"name": "MS06-076",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-076"
|
||||
},
|
||||
{
|
||||
"name": "SSRT061288",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name": "HPSBST02180",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1017369",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1017369"
|
||||
},
|
||||
{
|
||||
"name" : "23311",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23311"
|
||||
"name": "ADV-2006-4969",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4969"
|
||||
},
|
||||
{
|
||||
"name": "oe-wab-bo(29227)",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061116 My-BIC => 0.6.5 Remote File Include Vulnerability Exploit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/451876/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20061117 Fwd: My-BIC => 0.6.5 Remote File Include Vulnerability Exploit",
|
||||
"refsource": "VIM",
|
||||
"url": "http://attrition.org/pipermail/vim/2006-November/001127.html"
|
||||
},
|
||||
{
|
||||
"name": "20061116 My-BIC => 0.6.5 Remote File Include Vulnerability Exploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/451876/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "31542",
|
||||
"refsource": "OSVDB",
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4709"
|
||||
},
|
||||
{
|
||||
"name" : "30692",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/30692"
|
||||
},
|
||||
{
|
||||
"name": "22850",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22850"
|
||||
},
|
||||
{
|
||||
"name": "30692",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/30692"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf"
|
||||
},
|
||||
{
|
||||
"name": "23265",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23265"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,110 +52,110 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "2956",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/2956"
|
||||
},
|
||||
{
|
||||
"name": "http://linuxwebshop.com/forum/viewtopic.php?t=40",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://linuxwebshop.com/forum/viewtopic.php?t=40"
|
||||
},
|
||||
{
|
||||
"name" : "20070301 phpProfiles vendor ack",
|
||||
"refsource" : "VIM",
|
||||
"url" : "http://www.attrition.org/pipermail/vim/2007-March/001401.html"
|
||||
},
|
||||
{
|
||||
"name" : "21667",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21667"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-5087",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/5087"
|
||||
},
|
||||
{
|
||||
"name" : "32363",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32363"
|
||||
},
|
||||
{
|
||||
"name" : "32364",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32364"
|
||||
},
|
||||
{
|
||||
"name" : "32365",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32365"
|
||||
},
|
||||
{
|
||||
"name" : "32366",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32366"
|
||||
},
|
||||
{
|
||||
"name" : "32367",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32367"
|
||||
},
|
||||
{
|
||||
"name" : "32368",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32368"
|
||||
},
|
||||
{
|
||||
"name" : "32369",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32369"
|
||||
},
|
||||
{
|
||||
"name" : "32370",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32370"
|
||||
},
|
||||
{
|
||||
"name" : "32371",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32371"
|
||||
},
|
||||
{
|
||||
"name" : "32372",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32372"
|
||||
},
|
||||
{
|
||||
"name" : "32373",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32373"
|
||||
},
|
||||
{
|
||||
"name" : "32374",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32374"
|
||||
},
|
||||
{
|
||||
"name": "32375",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32375"
|
||||
},
|
||||
{
|
||||
"name": "32363",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32363"
|
||||
},
|
||||
{
|
||||
"name": "32372",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32372"
|
||||
},
|
||||
{
|
||||
"name": "32374",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32374"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-5087",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/5087"
|
||||
},
|
||||
{
|
||||
"name": "32376",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32376"
|
||||
},
|
||||
{
|
||||
"name": "32365",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32365"
|
||||
},
|
||||
{
|
||||
"name": "32370",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32370"
|
||||
},
|
||||
{
|
||||
"name": "32366",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32366"
|
||||
},
|
||||
{
|
||||
"name": "32368",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32368"
|
||||
},
|
||||
{
|
||||
"name": "23423",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23423"
|
||||
},
|
||||
{
|
||||
"name": "32369",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32369"
|
||||
},
|
||||
{
|
||||
"name": "32364",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32364"
|
||||
},
|
||||
{
|
||||
"name": "32371",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32371"
|
||||
},
|
||||
{
|
||||
"name": "20070301 phpProfiles vendor ack",
|
||||
"refsource": "VIM",
|
||||
"url": "http://www.attrition.org/pipermail/vim/2007-March/001401.html"
|
||||
},
|
||||
{
|
||||
"name": "32367",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32367"
|
||||
},
|
||||
{
|
||||
"name": "phpprofiles-multiple-parameters-file-include(30997)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30997"
|
||||
},
|
||||
{
|
||||
"name": "21667",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21667"
|
||||
},
|
||||
{
|
||||
"name": "32373",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32373"
|
||||
},
|
||||
{
|
||||
"name": "2956",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2956"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2011-0962",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "17304",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/17304"
|
||||
},
|
||||
{
|
||||
"name" : "20110518 Cisco Unified Operations Manager Multiple Vulnerabilities - SOS-11-006",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html"
|
||||
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=23087",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=23087"
|
||||
},
|
||||
{
|
||||
"name": "http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=23087",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=23087"
|
||||
"name": "20110518 Cisco Unified Operations Manager Multiple Vulnerabilities - SOS-11-006",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-05/0371.html"
|
||||
},
|
||||
{
|
||||
"name": "17304",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/17304"
|
||||
},
|
||||
{
|
||||
"name": "cisco-uom-common-services-xss(67524)",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2011/mfsa2011-41.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2011/mfsa2011-41.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=682335",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=682335"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-41.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-41.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:141",
|
||||
"refsource": "MANDRIVA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2011-3441",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5052",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5052"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5130",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5130"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2012-02-01-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-11-10-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2012-02-01-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
|
||||
"name": "http://support.apple.com/kb/HT5052",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5052"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/Ananta_Gazelle1.0",
|
||||
"refsource": "MISC",
|
||||
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/Ananta_Gazelle1.0"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
|
||||
"refsource": "MLIST",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
|
||||
"refsource": "MISC",
|
||||
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
|
||||
},
|
||||
{
|
||||
"name" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/Ananta_Gazelle1.0",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/Ananta_Gazelle1.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-4579",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,30 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20111123 NGS00148 Patch Notification: FFmpeg Libavcodec memory corruption remote code execution",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/520620"
|
||||
},
|
||||
{
|
||||
"name" : "http://ffmpeg.org/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://ffmpeg.org/"
|
||||
},
|
||||
{
|
||||
"name": "http://git.libav.org/?p=libav.git;a=commit;h=6e24b9488e67849a28e64a8056e05f83cf439229",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.libav.org/?p=libav.git;a=commit;h=6e24b9488e67849a28e64a8056e05f83cf439229"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:076",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
|
||||
},
|
||||
{
|
||||
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=6e24b9488e67849a28e64a8056e05f83cf439229",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=6e24b9488e67849a28e64a8056e05f83cf439229"
|
||||
},
|
||||
{
|
||||
"name" : "http://libav.org/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://libav.org/"
|
||||
"name": "USN-1320-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://ubuntu.com/usn/usn-1320-1"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:074",
|
||||
@ -88,19 +83,24 @@
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:075"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2012:076",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:076"
|
||||
"name": "http://ffmpeg.org/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://ffmpeg.org/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1320-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://ubuntu.com/usn/usn-1320-1"
|
||||
"name": "http://libav.org/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://libav.org/"
|
||||
},
|
||||
{
|
||||
"name": "USN-1333-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://ubuntu.com/usn/usn-1333-1"
|
||||
},
|
||||
{
|
||||
"name": "20111123 NGS00148 Patch Notification: FFmpeg Libavcodec memory corruption remote code execution",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/520620"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.infoserve.de/system/files/advisories/INFOSERVE-ADV2011-09.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.infoserve.de/system/files/advisories/INFOSERVE-ADV2011-09.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://forum.zftpserver.com/viewtopic.php?f=4&t=2927",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://forum.zftpserver.com/viewtopic.php?f=4&t=2927"
|
||||
},
|
||||
{
|
||||
"name": "http://www.infoserve.de/system/files/advisories/INFOSERVE-ADV2011-09.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.infoserve.de/system/files/advisories/INFOSERVE-ADV2011-09.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-0312",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://directory.fedoraproject.org/wiki/Releases/1.3.0.4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://directory.fedoraproject.org/wiki/Releases/1.3.0.4"
|
||||
},
|
||||
{
|
||||
"name": "52568",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/52568"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=912964",
|
||||
"refsource": "MISC",
|
||||
@ -63,29 +73,19 @@
|
||||
"url": "https://fedorahosted.org/389/ticket/571"
|
||||
},
|
||||
{
|
||||
"name" : "http://directory.fedoraproject.org/wiki/Releases/1.3.0.4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://directory.fedoraproject.org/wiki/Releases/1.3.0.4"
|
||||
"name": "58428",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/58428"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0628",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0628.html"
|
||||
},
|
||||
{
|
||||
"name" : "58428",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/58428"
|
||||
},
|
||||
{
|
||||
"name": "52279",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/52279"
|
||||
},
|
||||
{
|
||||
"name" : "52568",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/52568"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2013-0786",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.bugzilla.org/security/3.6.12/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.bugzilla.org/security/3.6.12/"
|
||||
"name": "MDVSA-2013:066",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:066"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=824399",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=824399"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:066",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:066"
|
||||
"name": "http://www.bugzilla.org/security/3.6.12/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.bugzilla.org/security/3.6.12/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,36 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20130227 Multiple Vulnerabilities in Piwigo",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-02/0153.html"
|
||||
},
|
||||
{
|
||||
"name" : "24561",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/24561"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/120592/Piwigo-2.4.6-Cross-Site-Request-Forgery-Traversal.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/120592/Piwigo-2.4.6-Cross-Site-Request-Forgery-Traversal.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5127.php",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5127.php"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.htbridge.com/advisory/HTB23144",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.htbridge.com/advisory/HTB23144"
|
||||
},
|
||||
{
|
||||
"name" : "http://piwigo.org/bugs/view.php?id=0002843",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://piwigo.org/bugs/view.php?id=0002843"
|
||||
},
|
||||
{
|
||||
"name": "http://piwigo.org/forum/viewtopic.php?id=21470",
|
||||
"refsource": "CONFIRM",
|
||||
@ -91,6 +61,36 @@
|
||||
"name": "http://piwigo.org/releases/2.4.7",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://piwigo.org/releases/2.4.7"
|
||||
},
|
||||
{
|
||||
"name": "https://www.htbridge.com/advisory/HTB23144",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.htbridge.com/advisory/HTB23144"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/120592/Piwigo-2.4.6-Cross-Site-Request-Forgery-Traversal.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/120592/Piwigo-2.4.6-Cross-Site-Request-Forgery-Traversal.html"
|
||||
},
|
||||
{
|
||||
"name": "24561",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/24561"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5127.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5127.php"
|
||||
},
|
||||
{
|
||||
"name": "http://piwigo.org/bugs/view.php?id=0002843",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://piwigo.org/bugs/view.php?id=0002843"
|
||||
},
|
||||
{
|
||||
"name": "20130227 Multiple Vulnerabilities in Piwigo",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-02/0153.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-1907",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/120991/Drupal-Common-Groups-7.x-Access-Bypass-Privilege-Escalation.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/120991/Drupal-Common-Groups-7.x-Access-Bypass-Privilege-Escalation.html"
|
||||
},
|
||||
{
|
||||
"name": "20130327 [Security-news] SA-CONTRIB-2013-038 - Commons Groups - Access bypass & Privilege escalation",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2013/Mar/242"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/120991/Drupal-Common-Groups-7.x-Access-Bypass-Privilege-Escalation.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/120991/Drupal-Common-Groups-7.x-Access-Bypass-Privilege-Escalation.html"
|
||||
"name": "52795",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/52795"
|
||||
},
|
||||
{
|
||||
"name": "https://drupal.org/node/1954764",
|
||||
@ -68,30 +73,25 @@
|
||||
"url": "https://drupal.org/node/1954764"
|
||||
},
|
||||
{
|
||||
"name" : "https://drupal.org/node/1954762",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://drupal.org/node/1954762"
|
||||
"name": "52769",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/52769"
|
||||
},
|
||||
{
|
||||
"name": "https://drupal.org/node/1954948",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://drupal.org/node/1954948"
|
||||
},
|
||||
{
|
||||
"name": "https://drupal.org/node/1954762",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://drupal.org/node/1954762"
|
||||
},
|
||||
{
|
||||
"name": "91748",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/91748"
|
||||
},
|
||||
{
|
||||
"name" : "52769",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/52769"
|
||||
},
|
||||
{
|
||||
"name" : "52795",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/52795"
|
||||
},
|
||||
{
|
||||
"name": "drupal-commons-groups-security-bypass(83133)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-1937",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20130409 [waraxe-2013-SA#102] - Reflected XSS in phpMyAdmin 3.5.7",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2013-04/0101.html"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20130409 Re: CVE Request: Self-XSS in phpmyadmin fixed in 3.5.8",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2013/04/09/13"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.waraxe.us/advisory-102.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.waraxe.us/advisory-102.html"
|
||||
"name": "MDVSA-2013:144",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:144"
|
||||
},
|
||||
{
|
||||
"name": "http://immunityservices.blogspot.com/2019/02/cvss.html",
|
||||
@ -83,19 +68,9 @@
|
||||
"url": "https://github.com/phpmyadmin/phpmyadmin/commit/79089c9bc02c82c15419fd9d6496b8781ae08a5a"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2013-5604",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103195.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2013-5620",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103184.html"
|
||||
"name": "openSUSE-SU-2013:1065",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2013-5623",
|
||||
@ -103,14 +78,39 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103188.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:144",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:144"
|
||||
"name": "http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:1065",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html"
|
||||
"name": "FEDORA-2013-5604",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103195.html"
|
||||
},
|
||||
{
|
||||
"name": "20130409 [waraxe-2013-SA#102] - Reflected XSS in phpMyAdmin 3.5.7",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-04/0101.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130409 Re: CVE Request: Self-XSS in phpmyadmin fixed in 3.5.8",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2013/04/09/13"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2013-5620",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103184.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php"
|
||||
},
|
||||
{
|
||||
"name": "http://www.waraxe.us/advisory-102.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.waraxe.us/advisory-102.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-5345",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-5787",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,75 +53,70 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5982",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5982"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2013-10-15-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02943",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02944",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
|
||||
"name": "RHSA-2014:0414",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1440",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1507",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1508",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1793",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0414",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2014:0414"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:1677",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02944",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02943",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
|
||||
},
|
||||
{
|
||||
"name": "63155",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/63155"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1793",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2013-10-15-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1507",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5982",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5982"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:19147",
|
||||
"refsource": "OVAL",
|
||||
@ -131,6 +126,11 @@
|
||||
"name": "56338",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/56338"
|
||||
},
|
||||
{
|
||||
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2014-2495",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
||||
},
|
||||
{
|
||||
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
||||
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
|
||||
},
|
||||
{
|
||||
"name": "1030586",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2014-6163",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "41655",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/41655/"
|
||||
},
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0120",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0120"
|
||||
},
|
||||
{
|
||||
"name": "96667",
|
||||
"refsource": "BID",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "1037992",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037992"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0120",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0120"
|
||||
},
|
||||
{
|
||||
"name": "41655",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/41655/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0479",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -75,15 +75,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
||||
},
|
||||
{
|
||||
"name" : "96958",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/96958"
|
||||
},
|
||||
{
|
||||
"name": "1037968",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037968"
|
||||
},
|
||||
{
|
||||
"name": "96958",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96958"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0607",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2017-05-01",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2017-05-01"
|
||||
},
|
||||
{
|
||||
"name": "98171",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/98171"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2017-05-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-05-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,15 +1,12 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"DATE_ASSIGNED" : "2017-05-06T20:43:28.289278",
|
||||
"ID" : "CVE-2017-1000040",
|
||||
"REQUESTER" : "bshastry@sec.t-labs.tu-berlin.de",
|
||||
"STATE" : "REJECT",
|
||||
"STATE_DETAIL" : "DUPLICATE of CVE-2017-7853"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2017-1000040",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.442450",
|
||||
"ID": "CVE-2017-1000213",
|
||||
"REQUESTER": "strukt93@gmail.com",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "WBCE",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.1.11"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Way better content editing"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Cross Site Scripting (XSS)"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.462821",
|
||||
"ID": "CVE-2017-1000234",
|
||||
"REQUESTER": "j.singh@sec-consult.com",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "I, Librarian",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "<=4.6 & 4.7"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "I, Librarian"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Directory Traversal"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -54,9 +54,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
|
||||
"name": "1039152",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039152"
|
||||
},
|
||||
{
|
||||
"name": "100367",
|
||||
@ -64,9 +64,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/100367"
|
||||
},
|
||||
{
|
||||
"name" : "1039152",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039152"
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1039791",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039791"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "101813",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101813"
|
||||
},
|
||||
{
|
||||
"name" : "1039791",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039791"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20171130 [SECURITY] [DLA 1194-1] libxml2 security update",
|
||||
"refsource": "MLIST",
|
||||
@ -63,9 +68,9 @@
|
||||
"url": "http://xmlsoft.org/news.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=759579",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=759579"
|
||||
"name": "USN-3739-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3739-1/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961"
|
||||
},
|
||||
{
|
||||
"name" : "https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html",
|
||||
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=759579",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3739-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3739-1/"
|
||||
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=759579"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-16999",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-1089",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -131,15 +131,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www-prd-trops.events.ibm.com/node/715749",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www-prd-trops.events.ibm.com/node/715749"
|
||||
},
|
||||
{
|
||||
"name": "ibm-rqm-cve20171651-xss(133261)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/133261"
|
||||
},
|
||||
{
|
||||
"name": "https://www-prd-trops.events.ibm.com/node/715749",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www-prd-trops.events.ibm.com/node/715749"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4062",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4269",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4591",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4688",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4894",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
Loading…
x
Reference in New Issue
Block a user