mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
169a19604c
commit
aea4db0c52
@ -53,144 +53,144 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20070613 High risk vulnerability in OpenOffice RTF parser",
|
"name": "25648",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/471274/100/0/threaded"
|
"url": "http://secunia.com/advisories/25648"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://sw.openoffice.org/source/browse/sw/sw/source/filter/rtf/swparrtf.cxx?rev=1.67",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://sw.openoffice.org/source/browse/sw/sw/source/filter/rtf/swparrtf.cxx?rev=1.67"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://issues.rpath.com/browse/RPL-1570",
|
"name": "https://issues.rpath.com/browse/RPL-1570",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://issues.rpath.com/browse/RPL-1570"
|
"url": "https://issues.rpath.com/browse/RPL-1570"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-1307",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2007/dsa-1307"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200707-02",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2007:144",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:144"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2007:0406",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0406.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20070602-01-P",
|
|
||||||
"refsource" : "SGI",
|
|
||||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "102917",
|
|
||||||
"refsource" : "SUNALERT",
|
|
||||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102917-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SA:2007:037",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2007_37_openoffice.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-482-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/usn-482-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24450",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/24450"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "35378",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/35378"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:10002",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10002"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-2166",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/2166"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-2229",
|
"name": "ADV-2007-2229",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/2229"
|
"url": "http://www.vupen.com/english/advisories/2007/2229"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1018239",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1018239"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25648",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/25648"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25650",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/25650"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25673",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/25673"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25705",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/25705"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25862",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/25862"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "25894",
|
"name": "25894",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/25894"
|
"url": "http://secunia.com/advisories/25894"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "25905",
|
"name": "26476",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/25905"
|
"url": "http://secunia.com/advisories/26476"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1018239",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1018239"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25705",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/25705"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-482-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/usn-482-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25862",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/25862"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2007:144",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:144"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://sw.openoffice.org/source/browse/sw/sw/source/filter/rtf/swparrtf.cxx?rev=1.67",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://sw.openoffice.org/source/browse/sw/sw/source/filter/rtf/swparrtf.cxx?rev=1.67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070613 High risk vulnerability in OpenOffice RTF parser",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/471274/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1307",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2007/dsa-1307"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "102917",
|
||||||
|
"refsource": "SUNALERT",
|
||||||
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102917-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "26010",
|
"name": "26010",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/26010"
|
"url": "http://secunia.com/advisories/26010"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-2166",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/2166"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "26022",
|
"name": "26022",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/26022"
|
"url": "http://secunia.com/advisories/26022"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "26476",
|
"name": "GLSA-200707-02",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2007:0406",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2007-0406.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25673",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/26476"
|
"url": "http://secunia.com/advisories/25673"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SA:2007:037",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/2007_37_openoffice.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openoffice-rtf-bo(34843)",
|
"name": "openoffice-rtf-bo(34843)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34843"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34843"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "24450",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/24450"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:10002",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10002"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25650",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/25650"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070602-01-P",
|
||||||
|
"refsource": "SGI",
|
||||||
|
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25905",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/25905"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "35378",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/35378"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2007-1210",
|
"ID": "CVE-2007-1210",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,25 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.amavis.org/security/asa-2007-2.txt",
|
"name": "http://www.amavis.org/security/asa-2007-2.txt",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.amavis.org/security/asa-2007-2.txt"
|
"url": "http://www.amavis.org/security/asa-2007-2.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20070724 zoo - amavis - barracuda cross-ref problems",
|
"name": "multiple-vendor-zoo-dos(34080)",
|
||||||
"refsource" : "VIM",
|
"refsource": "XF",
|
||||||
"url" : "http://www.attrition.org/pipermail/vim/2007-July/001725.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "23823",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/23823"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-1699",
|
"name": "ADV-2007-1699",
|
||||||
@ -78,29 +68,39 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2007/1699"
|
"url": "http://www.vupen.com/english/advisories/2007/1699"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "35795",
|
"name": "23823",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "BID",
|
||||||
"url" : "http://www.osvdb.org/35795"
|
"url": "http://www.securityfocus.com/bid/23823"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "25122",
|
"name": "20070724 zoo - amavis - barracuda cross-ref problems",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "VIM",
|
||||||
"url" : "http://secunia.com/advisories/25122"
|
"url": "http://www.attrition.org/pipermail/vim/2007-July/001725.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "25315",
|
"name": "25315",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/25315"
|
"url": "http://secunia.com/advisories/25315"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25122",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/25122"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "2680",
|
"name": "2680",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/2680"
|
"url": "http://securityreason.com/securityalert/2680"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "multiple-vendor-zoo-dos(34080)",
|
"name": "35795",
|
||||||
"refsource" : "XF",
|
"refsource": "OSVDB",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
|
"url": "http://www.osvdb.org/35795"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1018512",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1018512"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "37681",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/37681"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20070730 Security Testing Enterprise Messaging Systems",
|
"name": "20070730 Security Testing Enterprise Messaging Systems",
|
||||||
"refsource": "FULLDISC",
|
"refsource": "FULLDISC",
|
||||||
@ -62,25 +72,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.irmplc.com/content/pdfs/Security_Testing_Enterprise_Messaging_Systems.pdf"
|
"url": "http://www.irmplc.com/content/pdfs/Security_Testing_Enterprise_Messaging_Systems.pdf"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2007-2814",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/2814"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "37681",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/37681"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1018512",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1018512"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "26337",
|
"name": "26337",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/26337"
|
"url": "http://secunia.com/advisories/26337"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-2814",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/2814"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,15 +58,25 @@
|
|||||||
"url": "http://www.securityfocus.com/archive/1/477424/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/477424/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20070511 Teamspeak Server 2.0.20.1 Vulnerabilities",
|
"name": "25242",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2007-05/0165.html"
|
"url": "http://secunia.com/advisories/25242"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://securityvulns.com/Rdocument6.html",
|
"name": "http://securityvulns.com/Rdocument6.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://securityvulns.com/Rdocument6.html"
|
"url": "http://securityvulns.com/Rdocument6.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "teamspeak-webadmin-privilege-escalation(34254)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34254"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070511 Teamspeak Server 2.0.20.1 Vulnerabilities",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-05/0165.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "23935",
|
"name": "23935",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -76,16 +86,6 @@
|
|||||||
"name": "36047",
|
"name": "36047",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/36047"
|
"url": "http://osvdb.org/36047"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25242",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/25242"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "teamspeak-webadmin-privilege-escalation(34254)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34254"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20071025 TikiWiki <= 1.9.8.1 Cross Site Scripting / Local File Inclusion",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/482801/30/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://info.tikiwiki.org/tiki-read_article.php?articleId=15",
|
"name": "http://info.tikiwiki.org/tiki-read_article.php?articleId=15",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://info.tikiwiki.org/tiki-read_article.php?articleId=15"
|
"url": "http://info.tikiwiki.org/tiki-read_article.php?articleId=15"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20071025 TikiWiki <= 1.9.8.1 Cross Site Scripting / Local File Inclusion",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/482801/30/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,39 +53,39 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://docs.info.apple.com/article.html?artnum=307179",
|
"name": "ADV-2007-4238",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://docs.info.apple.com/article.html?artnum=307179"
|
"url": "http://www.vupen.com/english/advisories/2007/4238"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2007-12-17",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "TA07-352A",
|
"name": "TA07-352A",
|
||||||
"refsource": "CERT",
|
"refsource": "CERT",
|
||||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "28136",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/28136"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "26910",
|
"name": "26910",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/26910"
|
"url": "http://www.securityfocus.com/bid/26910"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2007-4238",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/4238"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1019106",
|
"name": "1019106",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1019106"
|
"url": "http://securitytracker.com/id?1019106"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "28136",
|
"name": "APPLE-SA-2007-12-17",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "APPLE",
|
||||||
"url" : "http://secunia.com/advisories/28136"
|
"url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://docs.info.apple.com/article.html?artnum=307179",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://docs.info.apple.com/article.html?artnum=307179"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "macos-spin-tracer-code-execution(39112)",
|
"name": "macos-spin-tracer-code-execution(39112)",
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-2495",
|
"ID": "CVE-2015-2495",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2015-2853",
|
"ID": "CVE-2015-2853",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://bto.bluecoat.com/security-advisory/sa96",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bto.bluecoat.com/security-advisory/sa96"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#498348",
|
"name": "VU#498348",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/498348"
|
"url": "http://www.kb.cert.org/vuls/id/498348"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bto.bluecoat.com/security-advisory/sa96",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bto.bluecoat.com/security-advisory/sa96"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "74921",
|
"name": "74921",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2015-2903",
|
"ID": "CVE-2015-2903",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04850932",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04850932"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#350508",
|
"name": "VU#350508",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "1034078",
|
"name": "1034078",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034078"
|
"url": "http://www.securitytracker.com/id/1034078"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04850932",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04850932"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2015-2988",
|
"ID": "CVE-2015-2988",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "JVN#81207766",
|
"name": "76531",
|
||||||
"refsource" : "JVN",
|
"refsource": "BID",
|
||||||
"url" : "http://jvn.jp/en/jp/JVN81207766/index.html"
|
"url": "http://www.securityfocus.com/bid/76531"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "JVNDB-2015-000120",
|
"name": "JVNDB-2015-000120",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000120.html"
|
"url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000120.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "76531",
|
"name": "JVN#81207766",
|
||||||
"refsource" : "BID",
|
"refsource": "JVN",
|
||||||
"url" : "http://www.securityfocus.com/bid/76531"
|
"url": "http://jvn.jp/en/jp/JVN81207766/index.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://fortiguard.com/psirt/FG-IR-15-011",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://fortiguard.com/psirt/FG-IR-15-011"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "74444",
|
"name": "74444",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/74444"
|
"url": "http://www.securityfocus.com/bid/74444"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://fortiguard.com/psirt/FG-IR-15-011",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://fortiguard.com/psirt/FG-IR-15-011"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1032188",
|
"name": "1032188",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-3764",
|
"ID": "CVE-2015-3764",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://support.apple.com/kb/HT205031",
|
"name": "76340",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "https://support.apple.com/kb/HT205031"
|
"url": "http://www.securityfocus.com/bid/76340"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2015-08-13-2",
|
"name": "APPLE-SA-2015-08-13-2",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "76340",
|
"name": "https://support.apple.com/kb/HT205031",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/76340"
|
"url": "https://support.apple.com/kb/HT205031"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1033276",
|
"name": "1033276",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2015-6143",
|
"ID": "CVE-2015-6143",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-584"
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-584"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "MS15-124",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-124"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1034315",
|
"name": "1034315",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034315"
|
"url": "http://www.securitytracker.com/id/1034315"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MS15-124",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-124"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-6341",
|
"ID": "CVE-2015-6341",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-6386",
|
"ID": "CVE-2015-6386",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20151130 Cisco Web Security Appliance Native FTP Denial of Service Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151130-wsa"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1034276",
|
"name": "1034276",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034276"
|
"url": "http://www.securitytracker.com/id/1034276"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20151130 Cisco Web Security Appliance Native FTP Denial of Service Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151130-wsa"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-7064",
|
"ID": "CVE-2015-7064",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -63,44 +63,44 @@
|
|||||||
"url": "https://support.apple.com/HT205637"
|
"url": "https://support.apple.com/HT205637"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://support.apple.com/HT205640",
|
"name": "1034344",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://support.apple.com/HT205640"
|
"url": "http://www.securitytracker.com/id/1034344"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT205641",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT205641"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-12-08-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-12-08-2",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-12-08-3",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2015-12-08-4",
|
"name": "APPLE-SA-2015-12-08-4",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-12-08-3",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "78719",
|
"name": "78719",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/78719"
|
"url": "http://www.securityfocus.com/bid/78719"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1034344",
|
"name": "APPLE-SA-2015-12-08-1",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "APPLE",
|
||||||
"url" : "http://www.securitytracker.com/id/1034344"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205641",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205641"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT205640",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT205640"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-12-08-2",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-7109",
|
"ID": "CVE-2015-7109",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,6 +57,16 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://support.apple.com/HT205637"
|
"url": "https://support.apple.com/HT205637"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1034344",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1034344"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-12-08-3",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://support.apple.com/HT205640",
|
"name": "https://support.apple.com/HT205640",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,16 +76,6 @@
|
|||||||
"name": "APPLE-SA-2015-12-08-2",
|
"name": "APPLE-SA-2015-12-08-2",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-12-08-3",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1034344",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1034344"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,60 +52,60 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://xenbits.xen.org/xsa/advisory-149.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://xenbits.xen.org/xsa/advisory-149.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://xenbits.xen.org/xsa/advisory-151.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://xenbits.xen.org/xsa/advisory-151.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://support.citrix.com/article/CTX202404",
|
"name": "http://support.citrix.com/article/CTX202404",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.citrix.com/article/CTX202404"
|
"url": "http://support.citrix.com/article/CTX202404"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-3414",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3414"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2015-242be2c240",
|
"name": "FEDORA-2015-242be2c240",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "FEDORA-2015-6f6b79efe2",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2015-a931b02be2",
|
"name": "FEDORA-2015-a931b02be2",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201604-03",
|
"name": "1034033",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://security.gentoo.org/glsa/201604-03"
|
"url": "http://www.securitytracker.com/id/1034033"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://xenbits.xen.org/xsa/advisory-149.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://xenbits.xen.org/xsa/advisory-149.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2015:1965",
|
"name": "openSUSE-SU-2015:1965",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3414",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2015/dsa-3414"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://xenbits.xen.org/xsa/advisory-151.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://xenbits.xen.org/xsa/advisory-151.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-6f6b79efe2",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201604-03",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201604-03"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "77364",
|
"name": "77364",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/77364"
|
"url": "http://www.securityfocus.com/bid/77364"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1034033",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1034033"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2016-0099",
|
"ID": "CVE-2016-0099",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "40107",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/40107/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "39719",
|
"name": "39719",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -62,21 +67,6 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/39809/"
|
"url": "https://www.exploit-db.com/exploits/39809/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "40107",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/40107/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "39574",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/39574/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MS16-032",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-032"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "84034",
|
"name": "84034",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -86,6 +76,16 @@
|
|||||||
"name": "1035210",
|
"name": "1035210",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1035210"
|
"url": "http://www.securitytracker.com/id/1035210"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MS16-032",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-032"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "39574",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/39574/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||||
"ID": "CVE-2016-0860",
|
"ID": "CVE-2016-0860",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-074",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-074"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01",
|
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-014-01",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-058",
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-058",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-058"
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-058"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-074",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-074"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-1000364",
|
"ID": "CVE-2016-1000364",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2016-1025",
|
"ID": "CVE-2016-1025",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:0610",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0610.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2016:1305",
|
"name": "SUSE-SU-2016:1305",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
@ -72,6 +62,11 @@
|
|||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:0610",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0610.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "85932",
|
"name": "85932",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -81,6 +76,11 @@
|
|||||||
"name": "1035509",
|
"name": "1035509",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1035509"
|
"url": "http://www.securitytracker.com/id/1035509"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2016-1387",
|
"ID": "CVE-2016-1387",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2016-1430",
|
"ID": "CVE-2016-1430",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CISCO",
|
"refsource": "CISCO",
|
||||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv180_2"
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv180_2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "92275",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/92275"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1036525",
|
"name": "1036525",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1036525"
|
"url": "http://www.securitytracker.com/id/1036525"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "92275",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/92275"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2016-4099",
|
"ID": "CVE-2016-4099",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1035828",
|
"name": "1035828",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1035828"
|
"url": "http://www.securitytracker.com/id/1035828"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2016-4100",
|
"ID": "CVE-2016-4100",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1035828",
|
"name": "1035828",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1035828"
|
"url": "http://www.securitytracker.com/id/1035828"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||||
"ID": "CVE-2016-4528",
|
"ID": "CVE-2016-4528",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2016-4811",
|
"ID": "CVE-2016-4811",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,11 +57,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://jvn.jp/en/jp/JVN46888319/278948/index.html"
|
"url": "http://jvn.jp/en/jp/JVN46888319/278948/index.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://itunes.apple.com/app/japan-connected-free-wi-fi/id810838196",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://itunes.apple.com/app/japan-connected-free-wi-fi/id810838196"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://play.google.com/store/apps/details?id=com.nttbp.jfw",
|
"name": "https://play.google.com/store/apps/details?id=com.nttbp.jfw",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -72,6 +67,11 @@
|
|||||||
"refsource": "JVN",
|
"refsource": "JVN",
|
||||||
"url": "http://jvn.jp/en/jp/JVN46888319/index.html"
|
"url": "http://jvn.jp/en/jp/JVN46888319/index.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://itunes.apple.com/app/japan-connected-free-wi-fi/id810838196",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://itunes.apple.com/app/japan-connected-free-wi-fi/id810838196"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "JVNDB-2016-000076",
|
"name": "JVNDB-2016-000076",
|
||||||
"refsource": "JVNDB",
|
"refsource": "JVNDB",
|
||||||
|
@ -53,6 +53,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html",
|
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -62,11 +67,6 @@
|
|||||||
"name": "107069",
|
"name": "107069",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/107069"
|
"url": "http://www.securityfocus.com/bid/107069"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update",
|
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://bugzilla.libsdl.org/show_bug.cgi?id=4498"
|
"url": "https://bugzilla.libsdl.org/show_bug.cgi?id=4498"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00015.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720",
|
"name": "https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-03-13-gdata-total-security-acl-bypass.md",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-03-13-gdata-total-security-acl-bypass.md"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://nafiez.github.io/security/bypass/2019/03/12/gdata-total-security-acl-bypass.html",
|
"name": "https://nafiez.github.io/security/bypass/2019/03/12/gdata-total-security-acl-bypass.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://nafiez.github.io/security/bypass/2019/03/12/gdata-total-security-acl-bypass.html"
|
"url": "https://nafiez.github.io/security/bypass/2019/03/12/gdata-total-security-acl-bypass.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-03-13-gdata-total-security-acl-bypass.md",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-03-13-gdata-total-security-acl-bypass.md"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user