mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
b88915d496
commit
b526f56f19
@ -58,15 +58,25 @@
|
||||
"url": "http://marc.info/?l=stunnel-users&m=100869449828705&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20011227 Stunnel: Format String Bug in versions <3.22",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://online.securityfocus.com/archive/1/247427"
|
||||
"name": "3748",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/3748"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2002:004",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-004.php3"
|
||||
},
|
||||
{
|
||||
"name": "20020102 Stunnel: Format String Bug update",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://online.securityfocus.com/archive/1/248149"
|
||||
},
|
||||
{
|
||||
"name": "stunnel-client-format-string(7741)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7741"
|
||||
},
|
||||
{
|
||||
"name": "http://stunnel.mirt.net/news.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -78,19 +88,9 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2002-002.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2002:004",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-004.php3"
|
||||
},
|
||||
{
|
||||
"name" : "stunnel-client-format-string(7741)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7741"
|
||||
},
|
||||
{
|
||||
"name" : "3748",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/3748"
|
||||
"name": "20011227 Stunnel: Format String Bug in versions <3.22",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://online.securityfocus.com/archive/1/247427"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.esecurityonline.com/advisories/eSO4125.asp"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-1.ibm.com/support/docview.wss?rs=0&uid=swg21095671",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-1.ibm.com/support/docview.wss?rs=0&uid=swg21095671"
|
||||
},
|
||||
{
|
||||
"name": "4318",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/4318"
|
||||
},
|
||||
{
|
||||
"name": "http://www-1.ibm.com/support/docview.wss?rs=0&uid=swg21095671",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?rs=0&uid=swg21095671"
|
||||
},
|
||||
{
|
||||
"name": "lotus-domino-tmpfile-symlink(8586)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020613 wp-02-0007: Microsoft SQLXML ISAPI Overflow and Cross Site Scripting",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=102397345410856&w=2"
|
||||
"name": "VU#811371",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/811371"
|
||||
},
|
||||
{
|
||||
"name": "5347",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/5347"
|
||||
},
|
||||
{
|
||||
"name": "20020613 [VulnWatch] wp-02-0007: Microsoft SQLXML ISAPI Overflow and Cross Site Scripting",
|
||||
@ -67,20 +72,15 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-030"
|
||||
},
|
||||
{
|
||||
"name" : "VU#811371",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/811371"
|
||||
},
|
||||
{
|
||||
"name": "5004",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5004"
|
||||
},
|
||||
{
|
||||
"name" : "5347",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/5347"
|
||||
"name": "mssql-sqlxml-isapi-bo(9328)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/9328.php"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:484",
|
||||
@ -93,9 +93,9 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A489"
|
||||
},
|
||||
{
|
||||
"name" : "mssql-sqlxml-isapi-bo(9328)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/9328.php"
|
||||
"name": "20020613 wp-02-0007: Microsoft SQLXML ISAPI Overflow and Cross Site Scripting",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=102397345410856&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020529 Potential security issues in Ethereal",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=102268626526119&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ethereal.com/appnotes/enpa-sa-00004.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ethereal.com/appnotes/enpa-sa-00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-130",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2002/dsa-130"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2002:036",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2002-036.html"
|
||||
"name": "CLSA-2002:505",
|
||||
"refsource": "CONECTIVA",
|
||||
"url": "http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000505"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2002:088",
|
||||
@ -78,14 +63,24 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2002-088.html"
|
||||
},
|
||||
{
|
||||
"name" : "CLSA-2002:505",
|
||||
"refsource" : "CONECTIVA",
|
||||
"url" : "http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000505"
|
||||
"name": "DSA-130",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2002/dsa-130"
|
||||
},
|
||||
{
|
||||
"name" : "CSSA-2002-037.0",
|
||||
"refsource" : "CALDERA",
|
||||
"url" : "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-037.0.txt"
|
||||
"name": "20020529 Potential security issues in Ethereal",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=102268626526119&w=2"
|
||||
},
|
||||
{
|
||||
"name": "ethereal-smb-dissector-dos(9204)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/9204.php"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ethereal.com/appnotes/enpa-sa-00004.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ethereal.com/appnotes/enpa-sa-00004.html"
|
||||
},
|
||||
{
|
||||
"name": "4806",
|
||||
@ -93,9 +88,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/4806"
|
||||
},
|
||||
{
|
||||
"name" : "ethereal-smb-dissector-dos(9204)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/9204.php"
|
||||
"name": "RHSA-2002:036",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2002-036.html"
|
||||
},
|
||||
{
|
||||
"name": "CSSA-2002-037.0",
|
||||
"refsource": "CALDERA",
|
||||
"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-037.0.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "5974",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5974"
|
||||
},
|
||||
{
|
||||
"name": "20021016 Denial of Service in Sabre Desktop Reservation Client for Windows",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://marc.info/?l=bugtraq&m=103478372603106&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20021010 Denial of Service in Sabre Desktop Reservation Client for Windows",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=48"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.idefense.com/advisory/10.16.02.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.idefense.com/advisory/10.16.02.txt"
|
||||
},
|
||||
{
|
||||
"name" : "5974",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/5974"
|
||||
"name": "sabre-sabserv-client-dos(10378)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/10378.php"
|
||||
},
|
||||
{
|
||||
"name": "6555",
|
||||
@ -78,9 +73,14 @@
|
||||
"url": "http://www.osvdb.org/6555"
|
||||
},
|
||||
{
|
||||
"name" : "sabre-sabserv-client-dos(10378)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/10378.php"
|
||||
"name": "http://www.idefense.com/advisory/10.16.02.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.idefense.com/advisory/10.16.02.txt"
|
||||
},
|
||||
{
|
||||
"name": "20021010 Denial of Service in Sabre Desktop Reservation Client for Windows",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=48"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020128 SECURITY.NNOV: stream3 Windows NT/2000 DoS (Q280446)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://online.securityfocus.com/archive/1/252616"
|
||||
},
|
||||
{
|
||||
"name": "Q280446",
|
||||
"refsource": "MSKB",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "3967",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/3967"
|
||||
},
|
||||
{
|
||||
"name": "20020128 SECURITY.NNOV: stream3 Windows NT/2000 DoS (Q280446)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://online.securityfocus.com/archive/1/252616"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://linux.bkbits.net:8080/linux-2.4/cset@3ef33d95ym_22QH2xwhDMt264M55Fg",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://linux.bkbits.net:8080/linux-2.4/cset@3ef33d95ym_22QH2xwhDMt264M55Fg"
|
||||
},
|
||||
{
|
||||
"name": "linux-kernel-odirect-information-disclosure(42942)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42942"
|
||||
},
|
||||
{
|
||||
"name": "http://linux.bkbits.net:8080/linux-2.4/cset@3ef33d95ym_22QH2xwhDMt264M55Fg",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://linux.bkbits.net:8080/linux-2.4/cset@3ef33d95ym_22QH2xwhDMt264M55Fg"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2012-0136",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS12-015",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-015"
|
||||
},
|
||||
{
|
||||
"name": "TA12-045A",
|
||||
"refsource": "CERT",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "oval:org.mitre.oval:def:14924",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14924"
|
||||
},
|
||||
{
|
||||
"name": "MS12-015",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-015"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2012-0227",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://dsecrg.com/pages/vul/show.php?id=406",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://dsecrg.com/pages/vul/show.php?id=406"
|
||||
},
|
||||
{
|
||||
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-012-01A.pdf",
|
||||
"refsource": "MISC",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "flexgrid-activex-bo(72604)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72604"
|
||||
},
|
||||
{
|
||||
"name": "http://dsecrg.com/pages/vul/show.php?id=406",
|
||||
"refsource": "MISC",
|
||||
"url": "http://dsecrg.com/pages/vul/show.php?id=406"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security_alert@emc.com",
|
||||
"ID": "CVE-2012-0406",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -62,15 +62,15 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/18688/"
|
||||
},
|
||||
{
|
||||
"name" : "http://aluigi.altervista.org/adv/dpa_1-adv.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://aluigi.altervista.org/adv/dpa_1-adv.txt"
|
||||
},
|
||||
{
|
||||
"name": "1026956",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1026956"
|
||||
},
|
||||
{
|
||||
"name": "http://aluigi.altervista.org/adv/dpa_1-adv.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://aluigi.altervista.org/adv/dpa_1-adv.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2012-0780",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -62,15 +62,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53422"
|
||||
},
|
||||
{
|
||||
"name" : "1027047",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1027047"
|
||||
},
|
||||
{
|
||||
"name": "illustrator-unspec-code-exec(75445)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75445"
|
||||
},
|
||||
{
|
||||
"name": "1027047",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1027047"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "pfile-kommentar-xss(73165)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73165"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/files/109670/Pfile-1.02-Cross-Site-Scripting-SQL-Injection.html",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "51982",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/51982"
|
||||
},
|
||||
{
|
||||
"name" : "pfile-kommentar-xss(73165)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73165"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-1621",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,16 +57,6 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://seclists.org/bugtraq/2012/Apr/101"
|
||||
},
|
||||
{
|
||||
"name" : "20120415 [CVE-2012-1621] Apache OFBiz information\tdisclosure vulnerability",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2012/Apr/172"
|
||||
},
|
||||
{
|
||||
"name" : "[ofbiz-dev] 20120415 [CVE-2012-1621] Apache OFBiz information disclosure vulnerability",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://mail-archives.apache.org/mod_mbox/ofbiz-dev/201204.mbox/%3CA126EDA0-06A5-4B67-8CDD-FC5F5AABA147@apache.org%3E"
|
||||
},
|
||||
{
|
||||
"name": "[www-announce] 20120415 Apache OFBiz 10.04.02 released",
|
||||
"refsource": "MLIST",
|
||||
@ -78,9 +68,14 @@
|
||||
"url": "http://ofbiz.apache.org/download.html#vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name" : "53023",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/53023"
|
||||
"name": "48800",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48800"
|
||||
},
|
||||
{
|
||||
"name": "81349",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/show/osvdb/81349"
|
||||
},
|
||||
{
|
||||
"name": "81346",
|
||||
@ -93,29 +88,34 @@
|
||||
"url": "http://osvdb.org/show/osvdb/81347"
|
||||
},
|
||||
{
|
||||
"name" : "81348",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/show/osvdb/81348"
|
||||
},
|
||||
{
|
||||
"name" : "81349",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/show/osvdb/81349"
|
||||
},
|
||||
{
|
||||
"name" : "1026927",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1026927"
|
||||
},
|
||||
{
|
||||
"name" : "48800",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48800"
|
||||
"name": "20120415 [CVE-2012-1621] Apache OFBiz information\tdisclosure vulnerability",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2012/Apr/172"
|
||||
},
|
||||
{
|
||||
"name": "apache-ofbiz-multiple-xss(74870)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74870"
|
||||
},
|
||||
{
|
||||
"name": "53023",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53023"
|
||||
},
|
||||
{
|
||||
"name": "81348",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/show/osvdb/81348"
|
||||
},
|
||||
{
|
||||
"name": "[ofbiz-dev] 20120415 [CVE-2012-1621] Apache OFBiz information disclosure vulnerability",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://mail-archives.apache.org/mod_mbox/ofbiz-dev/201204.mbox/%3CA126EDA0-06A5-4B67-8CDD-FC5F5AABA147@apache.org%3E"
|
||||
},
|
||||
{
|
||||
"name": "1026927",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1026927"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2012-1832",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2012-1884",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=771994",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=771994"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2553",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2553"
|
||||
"name": "oval:org.mitre.oval:def:16805",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16805"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2556",
|
||||
@ -78,15 +63,40 @@
|
||||
"url": "http://www.debian.org/security/2012/dsa-2556"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2554",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2554"
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=771994",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=771994"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1211",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html"
|
||||
},
|
||||
{
|
||||
"name": "55324",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/55324"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2553",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2553"
|
||||
},
|
||||
{
|
||||
"name": "USN-1548-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1548-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-1548-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1548-2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1210",
|
||||
"refsource": "REDHAT",
|
||||
@ -98,9 +108,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2012:1065",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html"
|
||||
"name": "DSA-2554",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2554"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:1157",
|
||||
@ -108,24 +118,14 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1548-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1548-2"
|
||||
"name": "openSUSE-SU-2012:1065",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1548-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1548-1"
|
||||
},
|
||||
{
|
||||
"name" : "55324",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/55324"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16805",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16805"
|
||||
"name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2012-4076",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,25 +57,25 @@
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4076"
|
||||
},
|
||||
{
|
||||
"name" : "62848",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/62848"
|
||||
},
|
||||
{
|
||||
"name": "98126",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/98126"
|
||||
},
|
||||
{
|
||||
"name": "cisco-nxos-cve20124076-command-exec(87678)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87678"
|
||||
},
|
||||
{
|
||||
"name": "55205",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/55205"
|
||||
},
|
||||
{
|
||||
"name" : "cisco-nxos-cve20124076-command-exec(87678)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/87678"
|
||||
"name": "62848",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/62848"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2012-4090",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20131004 Cisco Nexus 7000 Information Disclosure Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4090"
|
||||
"name": "cisco-nxos-cve20124090-info-disc(87670)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87670"
|
||||
},
|
||||
{
|
||||
"name": "62841",
|
||||
@ -72,15 +72,15 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029158"
|
||||
},
|
||||
{
|
||||
"name": "20131004 Cisco Nexus 7000 Information Disclosure Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4090"
|
||||
},
|
||||
{
|
||||
"name": "55206",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/55206"
|
||||
},
|
||||
{
|
||||
"name" : "cisco-nxos-cve20124090-info-disc(87670)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/87670"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2012-4223",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-4418",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20120912 CVE Request: Apache Axis2 XML Signature Wrapping Attack",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/09/12/1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120912 Re: CVE Request: Apache Axis2 XML Signature Wrapping Attack",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/13/1"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf"
|
||||
"name": "[oss-security] 20120912 CVE Request: Apache Axis2 XML Signature Wrapping Attack",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/12/1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=856755",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=856755"
|
||||
},
|
||||
{
|
||||
"name": "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf"
|
||||
},
|
||||
{
|
||||
"name": "55508",
|
||||
"refsource": "BID",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "larry0@me.com",
|
||||
"DATE_ASSIGNED": "2017-05-15",
|
||||
"ID": "CVE-2017-1002017",
|
||||
"REQUESTER": "kurt@seifried.org",
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb17-21.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb17-21.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201707-15",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201707-15"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1731",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1731"
|
||||
},
|
||||
{
|
||||
"name": "99520",
|
||||
"refsource": "BID",
|
||||
@ -76,6 +61,21 @@
|
||||
"name": "1038845",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038845"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1731",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1731"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb17-21.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb17-21.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201707-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201707-15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-l2tp",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-l2tp"
|
||||
"name": "1038100",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038100"
|
||||
},
|
||||
{
|
||||
"name": "97010",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/97010"
|
||||
},
|
||||
{
|
||||
"name" : "1038100",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038100"
|
||||
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-l2tp",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-l2tp"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1426712",
|
||||
"name": "https://github.com/lathiat/avahi/issues/203#issuecomment-449536790",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1426712"
|
||||
"url": "https://github.com/lathiat/avahi/issues/203#issuecomment-449536790"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.secfu.net/advisories",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.secfu.net/advisories"
|
||||
"name": "USN-3876-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3876-1/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/lathiat/avahi/issues/203",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "https://github.com/lathiat/avahi/issues/203"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/lathiat/avahi/issues/203#issuecomment-449536790",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1426712",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://github.com/lathiat/avahi/issues/203#issuecomment-449536790"
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426712"
|
||||
},
|
||||
{
|
||||
"name": "USN-3876-2",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "https://usn.ubuntu.com/3876-2/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3876-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3876-1/"
|
||||
"name": "https://www.secfu.net/advisories",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.secfu.net/advisories"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://github.com/mpruett/audiofile/pull/42",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/mpruett/audiofile/pull/42"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3814",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3814"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20170313 Re: audiofile: divide-by-zero in BlockCodec::reset1 (BlockCodec.cpp)",
|
||||
"refsource": "MLIST",
|
||||
@ -66,16 +76,6 @@
|
||||
"name": "https://github.com/mpruett/audiofile/issues/39",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/mpruett/audiofile/issues/39"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/mpruett/audiofile/pull/42",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/mpruett/audiofile/pull/42"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3814",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2017/dsa-3814"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,11 +58,6 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://puppet.com/security/cve/cve-2017-7529",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://puppet.com/security/cve/cve-2017-7529"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2538",
|
||||
"refsource": "REDHAT",
|
||||
@ -77,6 +72,11 @@
|
||||
"name": "1039238",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039238"
|
||||
},
|
||||
{
|
||||
"name": "https://puppet.com/security/cve/cve-2017-7529",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://puppet.com/security/cve/cve-2017-7529"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://marc.info/?l=linux-netdev&m=149200742616349",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://marc.info/?l=linux-netdev&m=149200742616349"
|
||||
},
|
||||
{
|
||||
"name" : "http://marc.info/?l=linux-netdev&m=149200746116365",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://marc.info/?l=linux-netdev&m=149200746116365"
|
||||
},
|
||||
{
|
||||
"name" : "http://marc.info/?l=linux-netdev&m=149200746116366",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://marc.info/?l=linux-netdev&m=149200746116366"
|
||||
},
|
||||
{
|
||||
"name" : "http://marc.info/?l=linux-netdev&m=149251041420194",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://marc.info/?l=linux-netdev&m=149251041420194"
|
||||
},
|
||||
{
|
||||
"name": "http://marc.info/?l=linux-netdev&m=149251041420195",
|
||||
"refsource": "MISC",
|
||||
@ -87,6 +67,26 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.proxmox.com/show_bug.cgi?id=1351"
|
||||
},
|
||||
{
|
||||
"name": "http://marc.info/?l=linux-netdev&m=149200742616349",
|
||||
"refsource": "MISC",
|
||||
"url": "http://marc.info/?l=linux-netdev&m=149200742616349"
|
||||
},
|
||||
{
|
||||
"name": "http://marc.info/?l=linux-netdev&m=149200746116365",
|
||||
"refsource": "MISC",
|
||||
"url": "http://marc.info/?l=linux-netdev&m=149200746116365"
|
||||
},
|
||||
{
|
||||
"name": "http://marc.info/?l=linux-netdev&m=149251041420194",
|
||||
"refsource": "MISC",
|
||||
"url": "http://marc.info/?l=linux-netdev&m=149251041420194"
|
||||
},
|
||||
{
|
||||
"name": "http://marc.info/?l=linux-netdev&m=149200746116366",
|
||||
"refsource": "MISC",
|
||||
"url": "http://marc.info/?l=linux-netdev&m=149200746116366"
|
||||
},
|
||||
{
|
||||
"name": "97969",
|
||||
"refsource": "BID",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "45716",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/45716/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.secureauth.com/labs/advisories/asrock-drivers-elevation-privilege-vulnerabilities",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.secureauth.com/labs/advisories/asrock-drivers-elevation-privilege-vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name": "45716",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45716/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "psampaio@redhat.com",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2018-14636",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -68,11 +68,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugs.launchpad.net/neutron/+bug/1734320",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.launchpad.net/neutron/+bug/1734320"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.launchpad.net/neutron/+bug/1767422",
|
||||
"refsource": "CONFIRM",
|
||||
@ -82,6 +77,11 @@
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14636",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14636"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.launchpad.net/neutron/+bug/1734320",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.launchpad.net/neutron/+bug/1734320"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "44567",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/44567/"
|
||||
},
|
||||
{
|
||||
"name": "20180501 SSRF(Server Side Request Forgery) in Cockpit 0.4.4-0.5.5 (CVE-2018-9302)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2018/May/10"
|
||||
},
|
||||
{
|
||||
"name": "44567",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/44567/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://botan.randombit.net/security.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://botan.randombit.net/security.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7434",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7434"
|
||||
},
|
||||
{
|
||||
"name": "https://botan.randombit.net/security.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://botan.randombit.net/security.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user