mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
9c290420b0
commit
a76f241441
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2007-2216",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070815 TlbInf32 ActiveX Command Execution",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/476742/100/0/threaded"
|
||||
"name": "36396",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/36396"
|
||||
},
|
||||
{
|
||||
"name": "MS07-045",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-226A.html"
|
||||
},
|
||||
{
|
||||
"name" : "25289",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25289"
|
||||
"name": "oval:org.mitre.oval:def:2109",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2109"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2869",
|
||||
@ -78,14 +78,14 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2869"
|
||||
},
|
||||
{
|
||||
"name" : "36396",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/36396"
|
||||
"name": "26419",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26419"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:2109",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2109"
|
||||
"name": "25289",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25289"
|
||||
},
|
||||
{
|
||||
"name": "1018562",
|
||||
@ -93,9 +93,9 @@
|
||||
"url": "http://securitytracker.com/id?1018562"
|
||||
},
|
||||
{
|
||||
"name" : "26419",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26419"
|
||||
"name": "20070815 TlbInf32 ActiveX Command Execution",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/476742/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,105 +52,105 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-474.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-474.htm"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1479",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2008/dsa-1479"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0705",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0705.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0939",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0939.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-486-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-486-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-489-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-489-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-510-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-510-1"
|
||||
},
|
||||
{
|
||||
"name" : "24134",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24134"
|
||||
},
|
||||
{
|
||||
"name" : "35926",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35926"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11674",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11674"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2023",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2023"
|
||||
},
|
||||
{
|
||||
"name" : "25505",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25505"
|
||||
},
|
||||
{
|
||||
"name" : "26133",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26133"
|
||||
},
|
||||
{
|
||||
"name" : "26139",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26139"
|
||||
},
|
||||
{
|
||||
"name" : "26760",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26760"
|
||||
},
|
||||
{
|
||||
"name" : "27436",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27436"
|
||||
},
|
||||
{
|
||||
"name": "27747",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27747"
|
||||
},
|
||||
{
|
||||
"name" : "28626",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28626"
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2"
|
||||
},
|
||||
{
|
||||
"name": "kernel-vfatioctls-dos(34669)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34669"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0939",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0939.html"
|
||||
},
|
||||
{
|
||||
"name": "28626",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28626"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1479",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1479"
|
||||
},
|
||||
{
|
||||
"name": "USN-510-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-510-1"
|
||||
},
|
||||
{
|
||||
"name": "35926",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35926"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-474.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-474.htm"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2023",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2023"
|
||||
},
|
||||
{
|
||||
"name": "26760",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26760"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0705",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-489-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-489-1"
|
||||
},
|
||||
{
|
||||
"name": "25505",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25505"
|
||||
},
|
||||
{
|
||||
"name": "24134",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24134"
|
||||
},
|
||||
{
|
||||
"name": "USN-486-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-486-1"
|
||||
},
|
||||
{
|
||||
"name": "27436",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27436"
|
||||
},
|
||||
{
|
||||
"name": "26139",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26139"
|
||||
},
|
||||
{
|
||||
"name": "26133",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26133"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "apple-safari-multiple-bo(34978)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34978"
|
||||
},
|
||||
{
|
||||
"name": "http://erratasec.blogspot.com/2007/06/niiiice.html",
|
||||
"refsource": "MISC",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "1018223",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1018223"
|
||||
},
|
||||
{
|
||||
"name" : "apple-safari-multiple-bo(34978)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34978"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070608 Wordpress default theme XSS (admin) and other problems",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/470837/100/0/threaded"
|
||||
"name": "2807",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2807"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xssnews.com/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.xssnews.com/"
|
||||
},
|
||||
{
|
||||
"name": "20070608 Wordpress default theme XSS (admin) and other problems",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/470837/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "37441",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37441"
|
||||
},
|
||||
{
|
||||
"name" : "2807",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/2807"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "24580",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24580"
|
||||
},
|
||||
{
|
||||
"name": "37493",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37493"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2265",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2265"
|
||||
},
|
||||
{
|
||||
"name": "livecms-categoria-sql-injection(34957)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34957"
|
||||
},
|
||||
{
|
||||
"name": "4082",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -62,30 +82,10 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.g00ns-forum.net/showthread.php?t=9350"
|
||||
},
|
||||
{
|
||||
"name" : "24580",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24580"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2265",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2265"
|
||||
},
|
||||
{
|
||||
"name" : "37493",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37493"
|
||||
},
|
||||
{
|
||||
"name": "25744",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25744"
|
||||
},
|
||||
{
|
||||
"name" : "livecms-categoria-sql-injection(34957)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34957"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070626 Calyptix Security Advisory CX-2007-04 - Cross-Site Request Forgery Attack Against Check Point Safe@Office Device",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/472290/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://labs.calyptix.com/CX-2007-04.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://labs.calyptix.com/CX-2007-04.php"
|
||||
},
|
||||
{
|
||||
"name" : "http://labs.calyptix.com/CX-2007-04.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://labs.calyptix.com/CX-2007-04.txt"
|
||||
},
|
||||
{
|
||||
"name": "37644",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37644"
|
||||
},
|
||||
{
|
||||
"name": "http://labs.calyptix.com/CX-2007-04.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://labs.calyptix.com/CX-2007-04.txt"
|
||||
},
|
||||
{
|
||||
"name": "safeatoffice-admin-password-modification(35094)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35094"
|
||||
},
|
||||
{
|
||||
"name": "20070626 Calyptix Security Advisory CX-2007-04 - Cross-Site Request Forgery Attack Against Check Point Safe@Office Device",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/472290/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071126 FMDeluxe (index.php) Cross-Site Scripting Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/484191/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "26587",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26587"
|
||||
"name": "fmdeluxe-index-xss(38642)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38642"
|
||||
},
|
||||
{
|
||||
"name": "27826",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://securityreason.com/securityalert/3403"
|
||||
},
|
||||
{
|
||||
"name" : "fmdeluxe-index-xss(38642)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38642"
|
||||
"name": "20071126 FMDeluxe (index.php) Cross-Site Scripting Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/484191/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "26587",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26587"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071123 Aria-Security.net: Irola My-Time v3.5 SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/484107/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "4649",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4649"
|
||||
},
|
||||
{
|
||||
"name" : "http://aria-security.net/forum/showthread.php?p=1106",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://aria-security.net/forum/showthread.php?p=1106"
|
||||
},
|
||||
{
|
||||
"name" : "26548",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26548"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3996",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3996"
|
||||
},
|
||||
{
|
||||
"name" : "38813",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/38813"
|
||||
},
|
||||
{
|
||||
"name": "27798",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27798"
|
||||
},
|
||||
{
|
||||
"name": "38813",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/38813"
|
||||
},
|
||||
{
|
||||
"name": "http://aria-security.net/forum/showthread.php?p=1106",
|
||||
"refsource": "MISC",
|
||||
"url": "http://aria-security.net/forum/showthread.php?p=1106"
|
||||
},
|
||||
{
|
||||
"name": "3414",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3414"
|
||||
},
|
||||
{
|
||||
"name": "26548",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26548"
|
||||
},
|
||||
{
|
||||
"name": "20071123 Aria-Security.net: Irola My-Time v3.5 SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/484107/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071210 Falt4 CMS Security Report/Advisory",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/484813/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "4711",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4711"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/forum/forum.php?forum_id=762931",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/forum/forum.php?forum_id=762931"
|
||||
},
|
||||
{
|
||||
"name": "3436",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3436"
|
||||
},
|
||||
{
|
||||
"name": "http://www.h-labs.org/blog/2007/12/05/falt4_cms_security_report_advisory.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.h-labs.org/blog/2007/12/05/falt4_cms_security_report_advisory.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://sourceforge.net/forum/forum.php?forum_id=762931",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/forum/forum.php?forum_id=762931"
|
||||
"name": "falt4-index-feed-xss(38952)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38952"
|
||||
},
|
||||
{
|
||||
"name": "26786",
|
||||
@ -83,14 +88,9 @@
|
||||
"url": "http://secunia.com/advisories/28045"
|
||||
},
|
||||
{
|
||||
"name" : "3436",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3436"
|
||||
},
|
||||
{
|
||||
"name" : "falt4-index-feed-xss(38952)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38952"
|
||||
"name": "20071210 Falt4 CMS Security Report/Advisory",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/484813/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "38177",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/38177"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/chromium/issues/detail?id=29914",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=29914"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name": "http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs"
|
||||
},
|
||||
{
|
||||
"name" : "38177",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/38177"
|
||||
"name": "1023583",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1023583"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0361",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0361"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:13926",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13926"
|
||||
},
|
||||
{
|
||||
"name" : "1023583",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1023583"
|
||||
},
|
||||
{
|
||||
"name": "38545",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38545"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-0361",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/0361"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ADV-2010-1218",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1218"
|
||||
},
|
||||
{
|
||||
"name": "http://barnowl.mit.edu/wiki/barnowl-1.5.1-announce",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "39908",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/39908"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-1218",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/1218"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2010-1285",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,15 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100630 VUPEN Security Research - Adobe Acrobat and Reader \"newclass\" Memory Corruption Vulnerability (CVE-2010-1285)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/512099"
|
||||
"name": "ADV-2010-1636",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1636"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb10-15.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html"
|
||||
},
|
||||
{
|
||||
"name": "1024159",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1024159"
|
||||
},
|
||||
{
|
||||
"name": "41232",
|
||||
"refsource": "BID",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6725"
|
||||
},
|
||||
{
|
||||
"name" : "1024159",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1024159"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-1636",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/1636"
|
||||
"name": "20100630 VUPEN Security Research - Adobe Acrobat and Reader \"newclass\" Memory Corruption Vulnerability (CVE-2010-1285)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/512099"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.heartlogic.jp/docs/free_cgi/hl-sitemanager.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.heartlogic.jp/docs/free_cgi/hl-sitemanager.html"
|
||||
"name": "hlsitemanger-unspecified-sql-injection(57495)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57495"
|
||||
},
|
||||
{
|
||||
"name": "JVN#60969543",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN60969543/index.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.heartlogic.jp/docs/free_cgi/hl-sitemanager.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.heartlogic.jp/docs/free_cgi/hl-sitemanager.html"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2010-000010",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000010.html"
|
||||
},
|
||||
{
|
||||
"name" : "hlsitemanger-unspecified-sql-injection(57495)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57495"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2010-1523",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "44466",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/44466"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:12056",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12056"
|
||||
},
|
||||
{
|
||||
"name": "20101027 Secunia Research: Winamp VP6 Content Parsing Buffer Overflow Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -66,16 +76,6 @@
|
||||
"name": "http://forums.winamp.com/showthread.php?t=322995",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://forums.winamp.com/showthread.php?t=322995"
|
||||
},
|
||||
{
|
||||
"name" : "44466",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/44466"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:12056",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12056"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100507 [Wintercore Research] Consona Products - Multiple vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/511176/100/0/threaded"
|
||||
"name": "VU#602801",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/602801"
|
||||
},
|
||||
{
|
||||
"name": "http://wintercore.com/en/component/content/article/7-media/18-wintercore-releases-an-advisory-for-consona-products.html",
|
||||
@ -67,20 +67,20 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.wintercore.com/downloads/rootedcon_0day.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.consona.com/Content/CRM/Support/SecurityBulletin_April2010.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.consona.com/Content/CRM/Support/SecurityBulletin_April2010.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "VU#602801",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/602801"
|
||||
},
|
||||
{
|
||||
"name": "consona-sdcwebsecurebase-code-exec(58608)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58608"
|
||||
},
|
||||
{
|
||||
"name": "20100507 [Wintercore Research] Consona Products - Multiple vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/511176/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.consona.com/Content/CRM/Support/SecurityBulletin_April2010.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.consona.com/Content/CRM/Support/SecurityBulletin_April2010.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://keepass.info/news/n100902_1.18.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://keepass.info/news/n100902_1.18.html"
|
||||
},
|
||||
{
|
||||
"name": "41270",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41270"
|
||||
},
|
||||
{
|
||||
"name": "http://keepass.info/news/n100902_1.18.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://keepass.info/news/n100902_1.18.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"ID": "CVE-2014-0779",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://ics-cert.us-cert.gov/advisories/ICSA-14-072-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://ics-cert.us-cert.gov/advisories/ICSA-14-072-01"
|
||||
},
|
||||
{
|
||||
"name": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-024-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-024-01"
|
||||
},
|
||||
{
|
||||
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-072-01",
|
||||
"refsource": "MISC",
|
||||
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-072-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2014-1325",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,9 +58,9 @@
|
||||
"url": "https://support.apple.com/kb/HT6537"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2014-06-30-1",
|
||||
"name": "APPLE-SA-2014-06-30-4",
|
||||
"refsource": "APPLE",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-06/0171.html"
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-06-30-3",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2014-06-30-4",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html"
|
||||
"name": "59481",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59481"
|
||||
},
|
||||
{
|
||||
"name": "1030495",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://www.securitytracker.com/id/1030495"
|
||||
},
|
||||
{
|
||||
"name" : "59481",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59481"
|
||||
"name": "APPLE-SA-2014-06-30-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0171.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2014-1390",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT6367",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT6367"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/kb/HT6537",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/kb/HT6537"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201601-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201601-02"
|
||||
"name": "apple-safari-cve20141390-code-exec(95273)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95273"
|
||||
},
|
||||
{
|
||||
"name": "69223",
|
||||
@ -77,15 +67,25 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030731"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201601-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201601-02"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/kb/HT6537",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT6537"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT6367",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT6367"
|
||||
},
|
||||
{
|
||||
"name": "60705",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60705"
|
||||
},
|
||||
{
|
||||
"name" : "apple-safari-cve20141390-code-exec(95273)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95273"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,20 +53,15 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20140127 [CVE-2014-1673] Check Point Session Authentication Agent vulnerability",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Jan/185"
|
||||
"name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98263",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98263"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/124967",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/124967"
|
||||
},
|
||||
{
|
||||
"name" : "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98263",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98263"
|
||||
},
|
||||
{
|
||||
"name": "102418",
|
||||
"refsource": "OSVDB",
|
||||
@ -76,6 +71,11 @@
|
||||
"name": "check-point-cve20141673-unauth-access(90746)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90746"
|
||||
},
|
||||
{
|
||||
"name": "20140127 [CVE-2014-1673] Check Point Session Authentication Agent vulnerability",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Jan/185"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-1773",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS14-035",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
|
||||
"name": "1030370",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030370"
|
||||
},
|
||||
{
|
||||
"name": "67866",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/67866"
|
||||
},
|
||||
{
|
||||
"name" : "1030370",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030370"
|
||||
"name": "MS14-035",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-035"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-1808",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "108397",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/show/osvdb/108397"
|
||||
},
|
||||
{
|
||||
"name": "33866",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://packetstormsecurity.com/files/127244/Thomson-TWG87OUIR-Cross-Site-Request-Forgery.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/127244/Thomson-TWG87OUIR-Cross-Site-Request-Forgery.html"
|
||||
},
|
||||
{
|
||||
"name" : "108397",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/show/osvdb/108397"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,65 +52,55 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2014/08/27/1"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20140826 CVE Request: Linux Kernel unbound recursion in ISOFS",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2014/q3/450"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.google.com/p/google-security-research/issues/detail?id=88",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://code.google.com/p/google-security-research/issues/detail?id=88"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1134099",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1134099"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBGN03282",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=142722544401658&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBGN03285",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=142722450701342&w=2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:1318",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-1318.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:0102",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0102.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:0695",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0695.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:0782",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0782.html"
|
||||
"name": "HPSBGN03285",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=142722450701342&w=2"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2014/08/27/1"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:1316",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2356-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2356-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2355-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2355-1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1134099",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1134099"
|
||||
},
|
||||
{
|
||||
"name": "USN-2357-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2357-1"
|
||||
},
|
||||
{
|
||||
"name": "HPSBGN03282",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=142722544401658&w=2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:0803",
|
||||
@ -118,9 +108,9 @@
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0803.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:1316",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"
|
||||
"name": "linux-kernel-isofs-bo(95481)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95481"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:1319",
|
||||
@ -138,49 +128,59 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2015:0812",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2354-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2354-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2355-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2355-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2356-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2356-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2357-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2357-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2358-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2358-1"
|
||||
"name": "[oss-security] 20140826 CVE Request: Linux Kernel unbound recursion in ISOFS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q3/450"
|
||||
},
|
||||
{
|
||||
"name": "USN-2359-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2359-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2354-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2354-1"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:0782",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0782.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2358-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2358-1"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/google-security-research/issues/detail?id=88",
|
||||
"refsource": "MISC",
|
||||
"url": "https://code.google.com/p/google-security-research/issues/detail?id=88"
|
||||
},
|
||||
{
|
||||
"name": "69396",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/69396"
|
||||
},
|
||||
{
|
||||
"name" : "linux-kernel-isofs-bo(95481)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95481"
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:0102",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0102.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2015:0812",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-5539",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
"name": "VU#947785",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/947785"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name" : "VU#947785",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/947785"
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-5863",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#693817",
|
||||
"refsource": "CERT-VN",
|
||||
|
@ -52,70 +52,70 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0489",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2015-08.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2015-08.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10895",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10895"
|
||||
},
|
||||
{
|
||||
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=a835c85e3d662343d7283f1dcdacb8a11d1d0727",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=a835c85e3d662343d7283f1dcdacb8a11d1d0727"
|
||||
},
|
||||
{
|
||||
"name": "72944",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72944"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10895",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10895"
|
||||
},
|
||||
{
|
||||
"name": "http://advisories.mageia.org/MGASA-2015-0117.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://advisories.mageia.org/MGASA-2015-0117.html"
|
||||
},
|
||||
{
|
||||
"name": "1031858",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031858"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
|
||||
"name": "MDVSA-2015:183",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:183"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3210",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3210"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201510-03",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201510-03"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2015:183",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:183"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1460",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:0489",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
|
||||
},
|
||||
{
|
||||
"name" : "72944",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/72944"
|
||||
},
|
||||
{
|
||||
"name" : "1031858",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1031858"
|
||||
"name": "GLSA-201510-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201510-03"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,34 +58,34 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/535732/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "37261",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/37261/"
|
||||
"name": "https://www.redteam-pentesting.de/advisories/rt-sa-2015-004",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.redteam-pentesting.de/advisories/rt-sa-2015-004"
|
||||
},
|
||||
{
|
||||
"name": "1032544",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032544"
|
||||
},
|
||||
{
|
||||
"name": "20150610 [RT-SA-2015-004] Alcatel-Lucent OmniSwitch Web Interface Cross-Site Request Forgery",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2015/Jun/23"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/132236/Alcatel-Lucent-OmniSwitch-Web-Interface-Cross-Site-Request-Forgery.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/132236/Alcatel-Lucent-OmniSwitch-Web-Interface-Cross-Site-Request-Forgery.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.redteam-pentesting.de/advisories/rt-sa-2015-004",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.redteam-pentesting.de/advisories/rt-sa-2015-004"
|
||||
},
|
||||
{
|
||||
"name": "75121",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75121"
|
||||
},
|
||||
{
|
||||
"name" : "1032544",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1032544"
|
||||
"name": "37261",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/37261/"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/132236/Alcatel-Lucent-OmniSwitch-Web-Interface-Cross-Site-Request-Forgery.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/132236/Alcatel-Lucent-OmniSwitch-Web-Interface-Cross-Site-Request-Forgery.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/",
|
||||
"name": "https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/"
|
||||
"url": "https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/twbs/bootstrap/pull/26460",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/twbs/bootstrap/pull/26460"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/twbs/bootstrap/issues/20184",
|
||||
@ -63,9 +68,9 @@
|
||||
"url": "https://github.com/twbs/bootstrap/issues/20184"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906",
|
||||
"name": "https://github.com/twbs/bootstrap/pull/23687",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906"
|
||||
"url": "https://github.com/twbs/bootstrap/pull/23687"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/twbs/bootstrap/pull/23679",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "https://github.com/twbs/bootstrap/pull/23679"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/twbs/bootstrap/pull/23687",
|
||||
"name": "https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://github.com/twbs/bootstrap/pull/23687"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/twbs/bootstrap/pull/26460",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/twbs/bootstrap/pull/26460"
|
||||
"url": "https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2016-5f196e4e4a",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html"
|
||||
},
|
||||
{
|
||||
"name": "http://xenbits.xen.org/xsa/advisory-172.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://xenbits.xen.org/xsa/advisory-172.html"
|
||||
},
|
||||
{
|
||||
"name": "85716",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/85716"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2016-e5432ca977",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181729.html"
|
||||
},
|
||||
{
|
||||
"name": "http://xenbits.xen.org/xsa/xsa172.patch",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://xenbits.xen.org/xsa/xsa172.patch"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
|
||||
"name": "1035435",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035435"
|
||||
},
|
||||
{
|
||||
"name": "http://support.citrix.com/article/CTX209443",
|
||||
@ -76,26 +96,6 @@
|
||||
"name": "DSA-3554",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3554"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2016-5f196e4e4a",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2016-e5432ca977",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181729.html"
|
||||
},
|
||||
{
|
||||
"name" : "85716",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/85716"
|
||||
},
|
||||
{
|
||||
"name" : "1035435",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1035435"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-3582",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,20 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21988009",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988009"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988718",
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21988718"
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
||||
},
|
||||
{
|
||||
"name": "91933",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91933"
|
||||
},
|
||||
{
|
||||
"name": "91787",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/91787"
|
||||
},
|
||||
{
|
||||
"name" : "91933",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/91933"
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21988718",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988718"
|
||||
},
|
||||
{
|
||||
"name": "1036370",
|
||||
|
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206902",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206902"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT206903",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT206903"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-07-18-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2016-07-18-2",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
|
||||
"name": "1036344",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036344"
|
||||
},
|
||||
{
|
||||
"name": "91829",
|
||||
@ -83,9 +68,24 @@
|
||||
"url": "http://www.securitytracker.com/id/1037086"
|
||||
},
|
||||
{
|
||||
"name" : "1036344",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036344"
|
||||
"name": "APPLE-SA-2016-07-18-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2016-07-18-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206903",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT206903"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT206902",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT206902"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-8454",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.foxitsoftware.com/support/security-bulletins.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.foxitsoftware.com/support/security-bulletins.php"
|
||||
},
|
||||
{
|
||||
"name": "93608",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/93608"
|
||||
},
|
||||
{
|
||||
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-9516",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "anemec@redhat.com",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2016-9595",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -68,15 +68,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9595",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9595"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:0336",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:0336"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9595",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9595"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user