mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
a35b7b086c
commit
a26b63dc12
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "4861",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/4861"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "28291",
|
"name": "28291",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/28291"
|
"url": "http://secunia.com/advisories/28291"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "4861",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/4861"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2008-0174",
|
"ID": "CVE-2008-0174",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,30 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20080125 C4 Security Advisory - GE Fanuc Proficy Information Portal 2.6 Authentication Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/487075/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20080129 Re: C4 Security Advisory - GE Fanuc Proficy Information Portal 2.6 Authentication Vulnerability",
|
"name": "20080129 Re: C4 Security Advisory - GE Fanuc Proficy Information Portal 2.6 Authentication Vulnerability",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/487244/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/487244/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://support.gefanuc.com/support/index?page=kbchannel&id=KB12459",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.gefanuc.com/support/index?page=kbchannel&id=KB12459"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#180876",
|
"name": "VU#180876",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/180876"
|
"url": "http://www.kb.cert.org/vuls/id/180876"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "30754",
|
"name": "3590",
|
||||||
"refsource" : "BID",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/bid/30754"
|
"url": "http://securityreason.com/securityalert/3590"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1019273",
|
"name": "1019273",
|
||||||
@ -83,9 +73,19 @@
|
|||||||
"url": "http://securitytracker.com/id?1019273"
|
"url": "http://securitytracker.com/id?1019273"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3590",
|
"name": "http://support.gefanuc.com/support/index?page=kbchannel&id=KB12459",
|
||||||
"refsource" : "SREASON",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://securityreason.com/securityalert/3590"
|
"url": "http://support.gefanuc.com/support/index?page=kbchannel&id=KB12459"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080125 C4 Security Advisory - GE Fanuc Proficy Information Portal 2.6 Authentication Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/487075/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "30754",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/30754"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080130 PeteFinnigan.com Limited advisory for Oracle January 2008 CPU",
|
"name": "1019218",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/487322/100/100/threaded"
|
"url": "http://securitytracker.com/id?1019218"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27229",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/27229"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA08-017A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-0150",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/0150"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-0180",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/0180"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT061201",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.petefinnigan.com/Advisory_CPU_Jan_2008.htm",
|
"name": "http://www.petefinnigan.com/Advisory_CPU_Jan_2008.htm",
|
||||||
@ -73,34 +98,9 @@
|
|||||||
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SSRT061201",
|
"name": "28556",
|
||||||
"refsource" : "HP",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
"url": "http://secunia.com/advisories/28556"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA08-017A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "27229",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/27229"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-0150",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/0150"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-0180",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/0180"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1019218",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1019218"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "28518",
|
"name": "28518",
|
||||||
@ -108,9 +108,9 @@
|
|||||||
"url": "http://secunia.com/advisories/28518"
|
"url": "http://secunia.com/advisories/28518"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "28556",
|
"name": "20080130 PeteFinnigan.com Limited advisory for Oracle January 2008 CPU",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://secunia.com/advisories/28556"
|
"url": "http://www.securityfocus.com/archive/1/487322/100/100/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080217 lightblog 9.6 local file inclusion vulnerability",
|
"name": "ADV-2008-0621",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/488283/100/0/threaded"
|
"url": "http://www.vupen.com/english/advisories/2008/0621"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "5140",
|
"name": "5140",
|
||||||
@ -67,15 +67,15 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/27837"
|
"url": "http://www.securityfocus.com/bid/27837"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2008-0621",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/0621"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "29017",
|
"name": "29017",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/29017"
|
"url": "http://secunia.com/advisories/29017"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080217 lightblog 9.6 local file inclusion vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/488283/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "20080206 A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/487658"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openbsd-add-weak-security(41157)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41157"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "28819",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/28819"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf",
|
"name": "http://www.trusteer.com/docs/OpenBSD_DNS_Cache_Poisoning_and_Multiple_OS_Predictable_IP_ID_Vulnerability.pdf",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -62,30 +77,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
|
"url": "http://www.securiteam.com/securityreviews/5PP0H0UNGW.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20080206 A paper by Amit Klein (Trusteer): \"OpenBSD DNS Cache Poisoning and Multiple O/S Predictable IP ID Vulnerability\"",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/487658"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "27647",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/27647"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "28819",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/28819"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openbsd-prng-dns-spoofing(40329)",
|
"name": "openbsd-prng-dns-spoofing(40329)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40329"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openbsd-add-weak-security(41157)",
|
"name": "27647",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41157"
|
"url": "http://www.securityfocus.com/bid/27647"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2008-1445",
|
"ID": "CVE-2008-1445",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,49 +53,49 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080613 Securify bulletin: Microsoft Active Directory Denial-of-service",
|
"name": "ADV-2008-1782",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/493338/100/0/threaded"
|
"url": "http://www.vupen.com/english/advisories/2008/1782"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20080613 RE: Securify bulletin: Microsoft Active Directory Denial-of-service",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/493342/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MS08-035",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-035"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA08-162B",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-162B.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "29584",
|
"name": "29584",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/29584"
|
"url": "http://www.securityfocus.com/bid/29584"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:4910",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4910"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-1782",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/1782"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1020229",
|
"name": "1020229",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1020229"
|
"url": "http://securitytracker.com/id?1020229"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20080613 Securify bulletin: Microsoft Active Directory Denial-of-service",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/493338/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA08-162B",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA08-162B.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MS08-035",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-035"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080613 RE: Securify bulletin: Microsoft Active Directory Denial-of-service",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/493342/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "30586",
|
"name": "30586",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/30586"
|
"url": "http://secunia.com/advisories/30586"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:4910",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4910"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,49 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080416 Oracle - SQL Injection in package SDO_IDX [DB07]",
|
"name": "oracle-cpu-april-2008(41858)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/490920/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41858"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.red-database-security.com/advisory/oracle_sql_injection_sdo_idx.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.red-database-security.com/advisory/oracle_sql_injection_sdo_idx.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBMA02133",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/491024/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT061201",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/491024/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-1233",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/1233/references"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-1267",
|
"name": "ADV-2008-1267",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/1267/references"
|
"url": "http://www.vupen.com/english/advisories/2008/1267/references"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-1233",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/1233/references"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.red-database-security.com/advisory/oracle_sql_injection_sdo_idx.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.red-database-security.com/advisory/oracle_sql_injection_sdo_idx.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1019855",
|
"name": "1019855",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1019855"
|
"url": "http://www.securitytracker.com/id?1019855"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "29874",
|
"name": "oracle-database-sdoidx-sql-injection(42001)",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "XF",
|
||||||
"url" : "http://secunia.com/advisories/29874"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42001"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "29829",
|
"name": "29829",
|
||||||
@ -103,19 +88,34 @@
|
|||||||
"url": "http://secunia.com/advisories/29829"
|
"url": "http://secunia.com/advisories/29829"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oracle-cpu-april-2008(41858)",
|
"name": "HPSBMA02133",
|
||||||
"refsource" : "XF",
|
"refsource": "HP",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41858"
|
"url": "http://www.securityfocus.com/archive/1/491024/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29874",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29874"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT061201",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/491024/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080416 Oracle - SQL Injection in package SDO_IDX [DB07]",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/490920/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oracle-database-rdbms-info-disclosure(42002)",
|
"name": "oracle-database-rdbms-info-disclosure(42002)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42002"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42002"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oracle-database-sdoidx-sql-injection(42001)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42001"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "5362",
|
"name": "29697",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://www.exploit-db.com/exploits/5362"
|
"url": "http://secunia.com/advisories/29697"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "28622",
|
"name": "28622",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/28622"
|
"url": "http://www.securityfocus.com/bid/28622"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "29697",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29697"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "newspublisher-index-sql-injection(41663)",
|
"name": "newspublisher-index-sql-injection(41663)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41663"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41663"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "5362",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/5362"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2008-4016",
|
"ID": "CVE-2008-4016",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "33525",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/33525"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2009-0115",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2009/0115"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -61,16 +71,6 @@
|
|||||||
"name": "33177",
|
"name": "33177",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/33177"
|
"url": "http://www.securityfocus.com/bid/33177"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2009-0115",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/0115"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33525",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/33525"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "31531",
|
"name": "31531",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/31531"
|
"url": "http://www.securityfocus.com/bid/31531"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2008-2712",
|
"name": "http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/2712"
|
"url": "http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1020974",
|
"name": "trendmicro-officescan-cgi-dos(45608)",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securitytracker.com/id?1020974"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45608"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "32097",
|
"name": "32097",
|
||||||
@ -83,9 +73,19 @@
|
|||||||
"url": "http://secunia.com/advisories/32097"
|
"url": "http://secunia.com/advisories/32097"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "trendmicro-officescan-cgi-dos(45608)",
|
"name": "1020974",
|
||||||
"refsource" : "XF",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45608"
|
"url": "http://www.securitytracker.com/id?1020974"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-2712",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/2712"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,19 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib",
|
"name": "30797",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/495674/100/0/threaded"
|
"url": "http://www.securityfocus.com/bid/30797"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1020703",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1020703"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "xinelib-realparsemdpr-bo(44650)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44650"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.ocert.org/analysis/2008-008/analysis.txt",
|
"name": "http://www.ocert.org/analysis/2008-008/analysis.txt",
|
||||||
@ -63,14 +73,14 @@
|
|||||||
"url": "http://www.ocert.org/analysis/2008-008/analysis.txt"
|
"url": "http://www.ocert.org/analysis/2008-008/analysis.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=619869",
|
"name": "4648",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SREASON",
|
||||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=619869"
|
"url": "http://securityreason.com/securityalert/4648"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "FEDORA-2008-7512",
|
"name": "31827",
|
||||||
"refsource" : "FEDORA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html"
|
"url": "http://secunia.com/advisories/31827"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2008-7572",
|
"name": "FEDORA-2008-7572",
|
||||||
@ -83,29 +93,19 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "30797",
|
"name": "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/30797"
|
"url": "http://www.securityfocus.com/archive/1/495674/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1020703",
|
"name": "FEDORA-2008-7512",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://securitytracker.com/id?1020703"
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "31827",
|
"name": "http://sourceforge.net/project/shownotes.php?release_id=619869",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/31827"
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=619869"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "4648",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/4648"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "xinelib-realparsemdpr-bo(44650)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44650"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "7398",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/7398"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "50629",
|
"name": "50629",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/50629"
|
"url": "http://osvdb.org/50629"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "33067",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/33067"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "4725",
|
"name": "4725",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/4725"
|
"url": "http://securityreason.com/securityalert/4725"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "7398",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/7398"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "postecards-postcards-info-disclosure(47195)",
|
"name": "postecards-postcards-info-disclosure(47195)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47195"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47195"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "33067",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/33067"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-0301",
|
"ID": "CVE-2013-0301",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2013-3422",
|
"ID": "CVE-2013-3422",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20130712 Cisco Secure Access Control System Administration Page Cross-Site Scripting Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3422"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "cisco-acs-cve20133422-xss(85623)",
|
"name": "cisco-acs-cve20133422-xss(85623)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85623"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85623"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20130712 Cisco Secure Access Control System Administration Page Cross-Site Scripting Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3422"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,26 +52,31 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20130703 Multiple Vulnerabilities in Kasseler CMS",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://seclists.org/bugtraq/2013/Jul/26"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.htbridge.com/advisory/HTB23158",
|
"name": "https://www.htbridge.com/advisory/HTB23158",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://www.htbridge.com/advisory/HTB23158"
|
"url": "https://www.htbridge.com/advisory/HTB23158"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "kasselercms-cve20133728-admin-xss(85408)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85408"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20130703 Multiple Vulnerabilities in Kasseler CMS",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://seclists.org/bugtraq/2013/Jul/26"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://diff.kasseler-cms.net/svn.html",
|
"name": "http://diff.kasseler-cms.net/svn.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://diff.kasseler-cms.net/svn.html"
|
"url": "http://diff.kasseler-cms.net/svn.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://diff.kasseler-cms.net/svn/patches/1232.html",
|
"name": "http://diff.kasseler-cms.net/svn/patches/1232.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -81,11 +86,6 @@
|
|||||||
"name": "94780",
|
"name": "94780",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/94780"
|
"url": "http://osvdb.org/94780"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "kasselercms-cve20133728-admin-xss(85408)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/85408"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-4160",
|
"ID": "CVE-2013-4160",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[distro-pkg-dev] 20130708 [SECURITY] IcedTea 2.4.1 for OpenJDK 7 Released!",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-July/023895.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130718 CVE Request: OpenJDK and lcms2 2.5 release fixes various denial of service issues in lcms2",
|
"name": "[oss-security] 20130718 CVE Request: OpenJDK and lcms2 2.5 release fixes various denial of service issues in lcms2",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://openwall.com/lists/oss-security/2013/07/18/7"
|
"url": "http://openwall.com/lists/oss-security/2013/07/18/7"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20130722 Re: CVE Request: OpenJDK and lcms2 2.5 release fixes various denial of service issues in lcms2",
|
"name": "[distro-pkg-dev] 20130708 [SECURITY] IcedTea 2.4.1 for OpenJDK 7 Released!",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url" : "http://openwall.com/lists/oss-security/2013/07/22/1"
|
"url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-July/023895.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=826097#c9",
|
"name": "USN-1911-1",
|
||||||
"refsource" : "MISC",
|
"refsource": "UBUNTU",
|
||||||
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=826097#c9"
|
"url": "http://www.ubuntu.com/usn/USN-1911-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/mm2/Little-CMS/commit/91c2db7f2559be504211b283bc3a2c631d6f06d9",
|
"name": "https://github.com/mm2/Little-CMS/commit/91c2db7f2559be504211b283bc3a2c631d6f06d9",
|
||||||
@ -78,9 +73,14 @@
|
|||||||
"url": "https://github.com/mm2/Little-CMS/commit/91c2db7f2559be504211b283bc3a2c631d6f06d9"
|
"url": "https://github.com/mm2/Little-CMS/commit/91c2db7f2559be504211b283bc3a2c631d6f06d9"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-1911-1",
|
"name": "https://bugzilla.novell.com/show_bug.cgi?id=826097#c9",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1911-1"
|
"url": "https://bugzilla.novell.com/show_bug.cgi?id=826097#c9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20130722 Re: CVE Request: OpenJDK and lcms2 2.5 release fixes various denial of service issues in lcms2",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://openwall.com/lists/oss-security/2013/07/22/1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2013-6158",
|
"ID": "CVE-2013-6158",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2013-6262",
|
"ID": "CVE-2013-6262",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -58,129 +58,29 @@
|
|||||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-11/0080.html"
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-11/0080.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://git.chromium.org/gitweb/?p=chromium/deps/libjpeg_turbo.git;a=commit;h=32cab49bd4cb1ce069a435fd75f9439c34ddc6f8",
|
"name": "openSUSE-SU-2013:1958",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "http://git.chromium.org/gitweb/?p=chromium/deps/libjpeg_turbo.git;a=commit;h=32cab49bd4cb1ce069a435fd75f9439c34ddc6f8"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=299835",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=299835"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-116.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-116.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=891693",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=891693"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://advisories.mageia.org/MGASA-2013-0333.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://advisories.mageia.org/MGASA-2013-0333.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2799",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2013/dsa-2799"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2013-23127",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2013-23291",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2013-23295",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2013-23519",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201606-03",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201606-03"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2013:273",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:273"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:1803",
|
"name": "RHSA-2013:1803",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1803.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1803.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2013:1776",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2013:1777",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2013:1861",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1957",
|
"name": "openSUSE-SU-2013:1957",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2013:1958",
|
"name": "56175",
|
||||||
"refsource" : "SUSE",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html"
|
"url": "http://secunia.com/advisories/56175"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2013:1959",
|
"name": "FEDORA-2013-23127",
|
||||||
"refsource" : "SUSE",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2014:0008",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2013:1916",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2013:1917",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2013:1918",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2014:0065",
|
"name": "openSUSE-SU-2014:0065",
|
||||||
@ -188,34 +88,134 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-2052-1",
|
"name": "FEDORA-2013-23519",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2052-1"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2053-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2053-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2060-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2060-1"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1029470",
|
"name": "1029470",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1029470"
|
"url": "http://www.securitytracker.com/id/1029470"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=891693",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=891693"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2013:1917",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-116.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-116.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2013:1959",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2013:1916",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2014:0008",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1029476",
|
"name": "1029476",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1029476"
|
"url": "http://www.securitytracker.com/id/1029476"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "56175",
|
"name": "openSUSE-SU-2013:1776",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "SUSE",
|
||||||
"url" : "http://secunia.com/advisories/56175"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201606-03",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201606-03"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2013:1918",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2013-23291",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2052-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2052-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-2799",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2013/dsa-2799"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2013:1861",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.chromium.org/gitweb/?p=chromium/deps/libjpeg_turbo.git;a=commit;h=32cab49bd4cb1ce069a435fd75f9439c34ddc6f8",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.chromium.org/gitweb/?p=chromium/deps/libjpeg_turbo.git;a=commit;h=32cab49bd4cb1ce069a435fd75f9439c34ddc6f8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2013:1777",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=299835",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=299835"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://advisories.mageia.org/MGASA-2013-0333.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://advisories.mageia.org/MGASA-2013-0333.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2013:273",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:273"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2060-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2060-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2053-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2053-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2013-23295",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20131029 Olat CMS 7.8.0.1 - Persistent Calender Web Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://seclists.org/bugtraq/2013/Oct/154"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "29279",
|
"name": "29279",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/29279"
|
"url": "http://www.exploit-db.com/exploits/29279"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "99075",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/99075"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/123825/Olat-CMS-7.8.0.1-Cross-Site-Scripting.html",
|
"name": "http://packetstormsecurity.com/files/123825/Olat-CMS-7.8.0.1-Cross-Site-Scripting.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/123825/Olat-CMS-7.8.0.1-Cross-Site-Scripting.html"
|
"url": "http://packetstormsecurity.com/files/123825/Olat-CMS-7.8.0.1-Cross-Site-Scripting.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20131029 Olat CMS 7.8.0.1 - Persistent Calender Web Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://seclists.org/bugtraq/2013/Oct/154"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.vulnerability-lab.com/get_content.php?id=1125",
|
"name": "http://www.vulnerability-lab.com/get_content.php?id=1125",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.vulnerability-lab.com/get_content.php?id=1125"
|
"url": "http://www.vulnerability-lab.com/get_content.php?id=1125"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "99075",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/99075"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20131126 CVE Request: FFmpeg 2.1 multiple problems",
|
"name": "https://github.com/FFmpeg/FFmpeg/commit/3819db745da2ac7fb3faacb116788c32f4753f34",
|
||||||
"refsource" : "MLIST",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://openwall.com/lists/oss-security/2013/11/26/7"
|
"url": "https://github.com/FFmpeg/FFmpeg/commit/3819db745da2ac7fb3faacb116788c32f4753f34"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20131208 Re: CVE Request: FFmpeg 2.1 multiple problems",
|
"name": "GLSA-201603-06",
|
||||||
"refsource" : "MLIST",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://openwall.com/lists/oss-security/2013/12/08/3"
|
"url": "https://security.gentoo.org/glsa/201603-06"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://ffmpeg.org/security.html",
|
"name": "http://ffmpeg.org/security.html",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://ffmpeg.org/security.html"
|
"url": "http://ffmpeg.org/security.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/FFmpeg/FFmpeg/commit/3819db745da2ac7fb3faacb116788c32f4753f34",
|
"name": "[oss-security] 20131208 Re: CVE Request: FFmpeg 2.1 multiple problems",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MLIST",
|
||||||
"url" : "https://github.com/FFmpeg/FFmpeg/commit/3819db745da2ac7fb3faacb116788c32f4753f34"
|
"url": "http://openwall.com/lists/oss-security/2013/12/08/3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://trac.ffmpeg.org/ticket/2850",
|
"name": "https://trac.ffmpeg.org/ticket/2850",
|
||||||
@ -78,9 +78,9 @@
|
|||||||
"url": "https://trac.ffmpeg.org/ticket/2850"
|
"url": "https://trac.ffmpeg.org/ticket/2850"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201603-06",
|
"name": "[oss-security] 20131126 CVE Request: FFmpeg 2.1 multiple problems",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "MLIST",
|
||||||
"url" : "https://security.gentoo.org/glsa/201603-06"
|
"url": "http://openwall.com/lists/oss-security/2013/11/26/7"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "getsimplecms-cve20137243-xss(90191)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90191"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/124711",
|
"name": "http://packetstormsecurity.com/files/124711",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "101922",
|
"name": "101922",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/101922"
|
"url": "http://osvdb.org/101922"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "getsimplecms-cve20137243-xss(90191)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90191"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2013-7303",
|
"ID": "CVE-2013-7303",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20140120 CVE request: spip: cross-site scripting vulnerability",
|
"name": "56381",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://seclists.org/oss-sec/2014/q1/123"
|
"url": "http://secunia.com/advisories/56381"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20140120 Re: CVE request: spip: cross-site scripting vulnerability",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://seclists.org/oss-sec/2014/q1/128"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://core.spip.org/projects/spip/repository/revisions/20902",
|
"name": "http://core.spip.org/projects/spip/repository/revisions/20902",
|
||||||
@ -68,9 +63,19 @@
|
|||||||
"url": "http://core.spip.org/projects/spip/repository/revisions/20902"
|
"url": "http://core.spip.org/projects/spip/repository/revisions/20902"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.spip.net/fr_article5648.html",
|
"name": "spip-cve20137303-xss(90643)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://www.spip.net/fr_article5648.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90643"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1029703",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1029703"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140120 Re: CVE request: spip: cross-site scripting vulnerability",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://seclists.org/oss-sec/2014/q1/128"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.spip.net/fr_article5665.html",
|
"name": "http://www.spip.net/fr_article5665.html",
|
||||||
@ -83,19 +88,14 @@
|
|||||||
"url": "http://zone.spip.org/trac/spip-zone/changeset/77768"
|
"url": "http://zone.spip.org/trac/spip-zone/changeset/77768"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1029703",
|
"name": "http://www.spip.net/fr_article5648.html",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1029703"
|
"url": "http://www.spip.net/fr_article5648.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "56381",
|
"name": "[oss-security] 20140120 CVE request: spip: cross-site scripting vulnerability",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MLIST",
|
||||||
"url" : "http://secunia.com/advisories/56381"
|
"url": "http://seclists.org/oss-sec/2014/q1/123"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "spip-cve20137303-xss(90643)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90643"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -62,39 +62,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
"name": "RHSA-2017:1791",
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://security.netapp.com/advisory/ntap-20170720-0001/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://security.netapp.com/advisory/ntap-20170720-0001/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3919",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2017/dsa-3919"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3954",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2017/dsa-3954"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201709-22",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201709-22"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2017:3453",
|
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3453"
|
"url": "https://access.redhat.com/errata/RHSA-2017:1791"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2017:1789",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1789"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:1790",
|
"name": "RHSA-2017:1790",
|
||||||
@ -102,14 +72,14 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2017:1790"
|
"url": "https://access.redhat.com/errata/RHSA-2017:1790"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2017:1791",
|
"name": "https://security.netapp.com/advisory/ntap-20170720-0001/",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1791"
|
"url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2017:1792",
|
"name": "RHSA-2017:1789",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1792"
|
"url": "https://access.redhat.com/errata/RHSA-2017:1789"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:2424",
|
"name": "RHSA-2017:2424",
|
||||||
@ -117,9 +87,29 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2017:2424"
|
"url": "https://access.redhat.com/errata/RHSA-2017:2424"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2017:2469",
|
"name": "1038931",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1038931"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "99643",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/99643"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2017:1792",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2469"
|
"url": "https://access.redhat.com/errata/RHSA-2017:1792"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201709-22",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201709-22"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3919",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2017/dsa-3919"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:2481",
|
"name": "RHSA-2017:2481",
|
||||||
@ -132,14 +122,24 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2017:2530"
|
"url": "https://access.redhat.com/errata/RHSA-2017:2530"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "99643",
|
"name": "RHSA-2017:3453",
|
||||||
"refsource" : "BID",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.securityfocus.com/bid/99643"
|
"url": "https://access.redhat.com/errata/RHSA-2017:3453"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1038931",
|
"name": "RHSA-2017:2469",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.securitytracker.com/id/1038931"
|
"url": "https://access.redhat.com/errata/RHSA-2017:2469"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3954",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2017/dsa-3954"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -65,6 +65,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1039608",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1039608"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -74,11 +79,6 @@
|
|||||||
"name": "101392",
|
"name": "101392",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/101392"
|
"url": "http://www.securityfocus.com/bid/101392"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1039608",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1039608"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"DATE_PUBLIC": "2018-01-02T00:00:00",
|
"DATE_PUBLIC": "2018-01-02T00:00:00",
|
||||||
"ID": "CVE-2017-13186",
|
"ID": "CVE-2017-13186",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise"
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "103334",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/103334"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1040471",
|
"name": "1040471",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1040471"
|
"url": "http://www.securitytracker.com/id/1040471"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "103334",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/103334"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ucm1",
|
"name": "1040719",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ucm1"
|
"url": "http://www.securitytracker.com/id/1040719"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "103937",
|
"name": "103937",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/103937"
|
"url": "http://www.securityfocus.com/bid/103937"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1040719",
|
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ucm1",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1040719"
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-ucm1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://kb.cybozu.support/article/33120/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://kb.cybozu.support/article/33120/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "JVN#13415512",
|
"name": "JVN#13415512",
|
||||||
"refsource": "JVN",
|
"refsource": "JVN",
|
||||||
"url": "http://jvn.jp/en/jp/JVN13415512/index.html"
|
"url": "http://jvn.jp/en/jp/JVN13415512/index.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://kb.cybozu.support/article/33120/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://kb.cybozu.support/article/33120/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/grandnew/software-vulnerabilities/tree/master/LuPng#heap-buffer-overflow-in-function-internalprintf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/grandnew/software-vulnerabilities/tree/master/LuPng#heap-buffer-overflow-in-function-internalprintf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/jansol/LuPng/issues/7",
|
"name": "https://github.com/jansol/LuPng/issues/7",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/jansol/LuPng/issues/7"
|
"url": "https://github.com/jansol/LuPng/issues/7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/grandnew/software-vulnerabilities/tree/master/LuPng#heap-buffer-overflow-in-function-internalprintf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/grandnew/software-vulnerabilities/tree/master/LuPng#heap-buffer-overflow-in-function-internalprintf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "https://gitlab.freedesktop.org/poppler/poppler/issues/664"
|
"url": "https://gitlab.freedesktop.org/poppler/poppler/issues/664"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-3837-1",
|
"name": "106031",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "BID",
|
||||||
"url" : "https://usn.ubuntu.com/3837-1/"
|
"url": "http://www.securityfocus.com/bid/106031"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-3837-2",
|
"name": "USN-3837-2",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "https://usn.ubuntu.com/3837-2/"
|
"url": "https://usn.ubuntu.com/3837-2/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "106031",
|
"name": "USN-3837-1",
|
||||||
"refsource" : "BID",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://www.securityfocus.com/bid/106031"
|
"url": "https://usn.ubuntu.com/3837-1/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@suse.de",
|
"ASSIGNER": "security@suse.com",
|
||||||
"DATE_PUBLIC": "2019-02-21T00:00:00.000Z",
|
"DATE_PUBLIC": "2019-02-21T00:00:00.000Z",
|
||||||
"ID": "CVE-2018-19638",
|
"ID": "CVE-2018-19638",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://zerodayinitiative.com/advisories/ZDI-18-311",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://zerodayinitiative.com/advisories/ZDI-18-311"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
|
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
|
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://zerodayinitiative.com/advisories/ZDI-18-311",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://zerodayinitiative.com/advisories/ZDI-18-311"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user