mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5f6d84c100
commit
be89dd1e85
@ -53,39 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://docs.info.apple.com/article.html?artnum=307562",
|
"name": "28304",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "http://docs.info.apple.com/article.html?artnum=307562"
|
"url": "http://www.securityfocus.com/bid/28304"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2008-03-18",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "TA08-079A",
|
"name": "TA08-079A",
|
||||||
"refsource": "CERT",
|
"refsource": "CERT",
|
||||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "28320",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/28320"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "28304",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/28304"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-0924",
|
"name": "ADV-2008-0924",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
|
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1019640",
|
"name": "macos-afpclient-bo(41319)",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securitytracker.com/id?1019640"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41319"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "29420",
|
"name": "29420",
|
||||||
@ -93,9 +78,24 @@
|
|||||||
"url": "http://secunia.com/advisories/29420"
|
"url": "http://secunia.com/advisories/29420"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "macos-afpclient-bo(41319)",
|
"name": "APPLE-SA-2008-03-18",
|
||||||
"refsource" : "XF",
|
"refsource": "APPLE",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41319"
|
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "28320",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/28320"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://docs.info.apple.com/article.html?artnum=307562",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://docs.info.apple.com/article.html?artnum=307562"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1019640",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1019640"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,30 +53,20 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html",
|
"name": "1019218",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html"
|
"url": "http://securitytracker.com/id?1019218"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBMA02133",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT061201",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA08-017A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "27229",
|
"name": "27229",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/27229"
|
"url": "http://www.securityfocus.com/bid/27229"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "TA08-017A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-0150",
|
"name": "ADV-2008-0150",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -88,19 +78,29 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2008/0180"
|
"url": "http://www.vupen.com/english/advisories/2008/0180"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1019218",
|
"name": "SSRT061201",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "HP",
|
||||||
"url" : "http://securitytracker.com/id?1019218"
|
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "28518",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/28518"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBMA02133",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "28556",
|
"name": "28556",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/28556"
|
"url": "http://secunia.com/advisories/28556"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "28518",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/28518"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080204 [DSECRG-08-010] VHD Web Pack 2.0 Local File Include",
|
"name": "3613",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/487485/100/0/threaded"
|
"url": "http://securityreason.com/securityalert/3613"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "5060",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/5060"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "27621",
|
"name": "27621",
|
||||||
@ -73,9 +68,14 @@
|
|||||||
"url": "http://secunia.com/advisories/28712"
|
"url": "http://secunia.com/advisories/28712"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3613",
|
"name": "5060",
|
||||||
"refsource" : "SREASON",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://securityreason.com/securityalert/3613"
|
"url": "https://www.exploit-db.com/exploits/5060"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080204 [DSECRG-08-010] VHD Web Pack 2.0 Local File Include",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/487485/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20080217 Simple CMS <= 1.0.3 (indexen.php area) Remote SQL Injection Exploit",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/488288/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "5131",
|
"name": "5131",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "27843",
|
"name": "27843",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/27843"
|
"url": "http://www.securityfocus.com/bid/27843"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080217 Simple CMS <= 1.0.3 (indexen.php area) Remote SQL Injection Exploit",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/488288/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "29078",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29078"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20080222 007: RELIABILITY FIX: February 22, 2008",
|
"name": "20080222 007: RELIABILITY FIX: February 22, 2008",
|
||||||
"refsource": "OPENBSD",
|
"refsource": "OPENBSD",
|
||||||
"url": "http://www.openbsd.org/errata42.html#007_tcprespond"
|
"url": "http://www.openbsd.org/errata42.html#007_tcprespond"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20080222 013: RELIABILITY FIX: February 22, 2008",
|
|
||||||
"refsource" : "OPENBSD",
|
|
||||||
"url" : "http://www.openbsd.org/errata41.html#013_tcprespond"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "27949",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/27949"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-0660",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/0660"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1019495",
|
"name": "1019495",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1019495"
|
"url": "http://www.securitytracker.com/id?1019495"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "29078",
|
"name": "ADV-2008-0660",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://secunia.com/advisories/29078"
|
"url": "http://www.vupen.com/english/advisories/2008/0660"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27949",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/27949"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080222 013: RELIABILITY FIX: February 22, 2008",
|
||||||
|
"refsource": "OPENBSD",
|
||||||
|
"url": "http://www.openbsd.org/errata41.html#013_tcprespond"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@ubuntu.com",
|
||||||
"ID": "CVE-2008-1693",
|
"ID": "CVE-2008-1693",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,59 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "DSA-1548",
|
"name": "29869",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.debian.org/security/2008/dsa-1548"
|
"url": "http://secunia.com/advisories/29869"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1606",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2008/dsa-1606"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2008-3312",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00522.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200804-18",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-200804-18.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2008:089",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:089"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2008:173",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:173"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2008:197",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:197"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0238",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0238.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0239",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0239.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0240",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0240.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0262",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0262.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SR:2008:011",
|
"name": "SUSE-SR:2008:011",
|
||||||
@ -113,24 +63,9 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SR:2008:013",
|
"name": "MDVSA-2008:173",
|
||||||
"refsource" : "SUSE",
|
"refsource": "MANDRIVA",
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2008_13_sr.html"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:173"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-603-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/usn-603-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-603-2",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/usn-603-2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "28830",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/28830"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:11226",
|
"name": "oval:org.mitre.oval:def:11226",
|
||||||
@ -143,74 +78,94 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2008/1265/references"
|
"url": "http://www.vupen.com/english/advisories/2008/1265/references"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2008-1266",
|
"name": "MDVSA-2008:089",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "MANDRIVA",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/1266/references"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:089"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1019893",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1019893"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29851",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29851"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29853",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29853"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29816",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29816"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29834",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29834"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29836",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29836"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29868",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29868"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29869",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29869"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "29884",
|
"name": "29884",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/29884"
|
"url": "http://secunia.com/advisories/29884"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "29885",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29885"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "30033",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/30033"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "30019",
|
"name": "30019",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/30019"
|
"url": "http://secunia.com/advisories/30019"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "30717",
|
"name": "29885",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/30717"
|
"url": "http://secunia.com/advisories/29885"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1019893",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1019893"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "28830",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/28830"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29853",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29853"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29851",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29851"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29816",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29816"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2008:197",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:197"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:0239",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0239.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1548",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2008/dsa-1548"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1606",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2008/dsa-1606"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:0240",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0240.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-200804-18",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-200804-18.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29868",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29868"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-1266",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/1266/references"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:0262",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0262.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "31035",
|
"name": "31035",
|
||||||
@ -221,6 +176,51 @@
|
|||||||
"name": "xpdf-pdf-code-execution(41884)",
|
"name": "xpdf-pdf-code-execution(41884)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41884"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41884"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "30033",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/30033"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29836",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29836"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29834",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29834"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:0238",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0238.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2008-3312",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00522.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-603-2",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/usn-603-2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-603-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/usn-603-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2008:013",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/2008_13_sr.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "30717",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/30717"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,19 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080909 Stash v1.0.3 Admin bypass / Remote File Disclosure",
|
"name": "stash-downloadmp3-sql-injection(44989)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/496142/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44989"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "4252",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/4252"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "31818",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/31818"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "6402",
|
"name": "6402",
|
||||||
@ -67,25 +77,15 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/31079"
|
"url": "http://www.securityfocus.com/bid/31079"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20080909 Stash v1.0.3 Admin bypass / Remote File Disclosure",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/496142/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "47994",
|
"name": "47994",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/47994"
|
"url": "http://osvdb.org/47994"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "31818",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/31818"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "4252",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/4252"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "stash-downloadmp3-sql-injection(44989)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44989"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "4261",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/4261"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-2469",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/2469"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "myphpnuke-printfeature-sql-injection(44798)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44798"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "6347",
|
"name": "6347",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -66,21 +81,6 @@
|
|||||||
"name": "30959",
|
"name": "30959",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/30959"
|
"url": "http://www.securityfocus.com/bid/30959"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-2469",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/2469"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "4261",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/4261"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "myphpnuke-printfeature-sql-injection(44798)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44798"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "31919",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/31919"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "solaris-acl-dos(45236)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45236"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1020899",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1020899"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "32125",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/32125"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-383.htm",
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-383.htm",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -62,11 +82,6 @@
|
|||||||
"refsource": "SUNALERT",
|
"refsource": "SUNALERT",
|
||||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242267-1"
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242267-1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "31250",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/31250"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:5639",
|
"name": "oval:org.mitre.oval:def:5639",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
@ -78,24 +93,9 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2008/2626"
|
"url": "http://www.vupen.com/english/advisories/2008/2626"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1020899",
|
"name": "31250",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securitytracker.com/id?1020899"
|
"url": "http://www.securityfocus.com/bid/31250"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "31919",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/31919"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "32125",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/32125"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "solaris-acl-dos(45236)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45236"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080911 Nooms 1.1",
|
"name": "nooms-auth-xss(45075)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/496236/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45075"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "4289",
|
"name": "4289",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://securityreason.com/securityalert/4289"
|
"url": "http://securityreason.com/securityalert/4289"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "nooms-auth-xss(45075)",
|
"name": "20080911 Nooms 1.1",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45075"
|
"url": "http://www.securityfocus.com/archive/1/496236/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,14 +58,9 @@
|
|||||||
"url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
|
"url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496415",
|
"name": "https://bugs.gentoo.org/show_bug.cgi?id=235770",
|
||||||
"refsource" : "MISC",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496415"
|
"url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://uvw.ru/report.lenny.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://uvw.ru/report.lenny.txt"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://bugs.debian.org/496378",
|
"name": "http://bugs.debian.org/496378",
|
||||||
@ -78,9 +73,9 @@
|
|||||||
"url": "http://dev.gentoo.org/~rbu/security/debiantemp/gdrae"
|
"url": "http://dev.gentoo.org/~rbu/security/debiantemp/gdrae"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugs.gentoo.org/show_bug.cgi?id=235770",
|
"name": "http://uvw.ru/report.lenny.txt",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MISC",
|
||||||
"url" : "https://bugs.gentoo.org/show_bug.cgi?id=235770"
|
"url": "http://uvw.ru/report.lenny.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "30888",
|
"name": "30888",
|
||||||
@ -91,6 +86,11 @@
|
|||||||
"name": "gdrae-gdrae-symlink(44838)",
|
"name": "gdrae-gdrae-symlink(44838)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44838"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44838"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496415",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496415"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,26 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "6963",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/6963"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "32073",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/32073"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-2998",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/2998"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "32513",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/32513"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "4571",
|
"name": "4571",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
@ -81,6 +61,26 @@
|
|||||||
"name": "chilkat-crypt-activex-file-overwrite(46315)",
|
"name": "chilkat-crypt-activex-file-overwrite(46315)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46315"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46315"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "32513",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/32513"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "6963",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/6963"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-2998",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/2998"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "32073",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/32073"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2013-2719",
|
"ID": "CVE-2013-2719",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,14 +58,9 @@
|
|||||||
"url": "http://www.adobe.com/support/security/bulletins/apsb13-15.html"
|
"url": "http://www.adobe.com/support/security/bulletins/apsb13-15.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201308-03",
|
"name": "oval:org.mitre.oval:def:16754",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "OVAL",
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-201308-03.xml"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16754"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2013:0826",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0826.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2013:0809",
|
"name": "SUSE-SU-2013:0809",
|
||||||
@ -73,9 +68,14 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oval:org.mitre.oval:def:16754",
|
"name": "RHSA-2013:0826",
|
||||||
"refsource" : "OVAL",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16754"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0826.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201308-03",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-201308-03.xml"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2013-2912",
|
"ID": "CVE-2013-2912",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,39 +58,39 @@
|
|||||||
"url": "http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html"
|
"url": "http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=276368",
|
"name": "openSUSE-SU-2014:0065",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=276368"
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://src.chromium.org/viewvc/chrome?revision=222614&view=revision",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://src.chromium.org/viewvc/chrome?revision=222614&view=revision"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-2785",
|
"name": "DSA-2785",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2013/dsa-2785"
|
"url": "http://www.debian.org/security/2013/dsa-2785"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:18962",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18962"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1556",
|
"name": "openSUSE-SU-2013:1556",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00002.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00002.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://src.chromium.org/viewvc/chrome?revision=222614&view=revision",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://src.chromium.org/viewvc/chrome?revision=222614&view=revision"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1861",
|
"name": "openSUSE-SU-2013:1861",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2014:0065",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=276368",
|
||||||
"refsource" : "SUSE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=276368"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:18962",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18962"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2013-2915",
|
"ID": "CVE-2013-2915",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,14 +58,9 @@
|
|||||||
"url": "http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html"
|
"url": "http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=280512",
|
"name": "openSUSE-SU-2014:0065",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=280512"
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://src.chromium.org/viewvc/chrome?revision=222146&view=revision",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://src.chromium.org/viewvc/chrome?revision=222146&view=revision"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-2785",
|
"name": "DSA-2785",
|
||||||
@ -77,16 +72,21 @@
|
|||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00002.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00002.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://src.chromium.org/viewvc/chrome?revision=222146&view=revision",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://src.chromium.org/viewvc/chrome?revision=222146&view=revision"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=280512",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=280512"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1861",
|
"name": "openSUSE-SU-2013:1861",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2014:0065",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:18319",
|
"name": "oval:org.mitre.oval:def:18319",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2013-3343",
|
"ID": "CVE-2013-3343",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,20 +58,15 @@
|
|||||||
"url": "http://www.adobe.com/support/security/bulletins/apsb13-16.html"
|
"url": "http://www.adobe.com/support/security/bulletins/apsb13-16.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2013:0941",
|
"name": "SUSE-SU-2013:1039",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "SUSE",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0941.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00016.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1063",
|
"name": "openSUSE-SU-2013:1063",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00179.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00179.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2013:1039",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00016.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1040",
|
"name": "openSUSE-SU-2013:1040",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
@ -81,6 +76,11 @@
|
|||||||
"name": "oval:org.mitre.oval:def:17030",
|
"name": "oval:org.mitre.oval:def:17030",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17030"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17030"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2013:0941",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0941.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2013-3357",
|
"ID": "CVE-2013-3357",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb13-22.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb13-22.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:19064",
|
"name": "oval:org.mitre.oval:def:19064",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19064"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19064"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.adobe.com/support/security/bulletins/apsb13-22.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.adobe.com/support/security/bulletins/apsb13-22.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-4115",
|
"ID": "CVE-2013-4115",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20130711 Re: CVE request: SQUID-2013:2: buffer overflow in HTTP request handling",
|
"name": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10487.patch",
|
||||||
"refsource" : "MLIST",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2013/07/11/8"
|
"url": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10487.patch"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.squid-cache.org/Advisories/SQUID-2013_2.txt",
|
"name": "http://www.squid-cache.org/Advisories/SQUID-2013_2.txt",
|
||||||
@ -63,34 +63,14 @@
|
|||||||
"url": "http://www.squid-cache.org/Advisories/SQUID-2013_2.txt"
|
"url": "http://www.squid-cache.org/Advisories/SQUID-2013_2.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9200.patch",
|
"name": "54076",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9200.patch"
|
"url": "http://secunia.com/advisories/54076"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10487.patch",
|
"name": "SUSE-SU-2016:1996",
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10487.patch"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11823.patch",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11823.patch"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12587.patch",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12587.patch"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2013:1435",
|
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-09/msg00024.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2013:1436",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-09/msg00025.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1441",
|
"name": "openSUSE-SU-2013:1441",
|
||||||
@ -102,20 +82,20 @@
|
|||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00033.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00033.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "54834",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/54834"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1443",
|
"name": "openSUSE-SU-2013:1443",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00032.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00032.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2016:1996",
|
"name": "http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12587.patch",
|
||||||
"refsource" : "SUSE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"
|
"url": "http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12587.patch"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:2089",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "61111",
|
"name": "61111",
|
||||||
@ -123,24 +103,44 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/61111"
|
"url": "http://www.securityfocus.com/bid/61111"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "54076",
|
"name": "http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11823.patch",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/54076"
|
"url": "http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11823.patch"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "54834",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/54834"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "54839",
|
"name": "54839",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/54839"
|
"url": "http://secunia.com/advisories/54839"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9200.patch",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9200.patch"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:2089",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2013:1435",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00024.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "squid-idnsalookup-bo(85564)",
|
"name": "squid-idnsalookup-bo(85564)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85564"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85564"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2013:1436",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00025.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20130711 Re: CVE request: SQUID-2013:2: buffer overflow in HTTP request handling",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2013/07/11/8"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-4538",
|
"ID": "CVE-2013-4538",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://lists.gnu.org/archive/html/qemu-devel/2013-12/msg00394.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released",
|
"name": "[Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=ead7a57df37d2187813a121308213f41591bd811"
|
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=ead7a57df37d2187813a121308213f41591bd811"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[Qemu-devel] 20131213 [PATCH 00/23] qemu state loading issues",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://lists.gnu.org/archive/html/qemu-devel/2013-12/msg00394.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2014-6288",
|
"name": "FEDORA-2014-6288",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2013-6017",
|
"ID": "CVE-2013-6017",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://atmail.com/changelog/",
|
"name": "101937",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://atmail.com/changelog/"
|
"url": "http://osvdb.org/101937"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#204950",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/204950"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "64779",
|
"name": "64779",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/64779"
|
"url": "http://www.securityfocus.com/bid/64779"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "101937",
|
"name": "VU#204950",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "CERT-VN",
|
||||||
"url" : "http://osvdb.org/101937"
|
"url": "http://www.kb.cert.org/vuls/id/204950"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://atmail.com/changelog/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://atmail.com/changelog/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-6454",
|
"ID": "CVE-2013-6454",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.fortiguard.com/advisory/FG-IR-13-016/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.fortiguard.com/advisory/FG-IR-13-016/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "fortiauthenticator-cve20136990-priv-esc(96200)",
|
"name": "fortiauthenticator-cve20136990-priv-esc(96200)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96200"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96200"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.fortiguard.com/advisory/FG-IR-13-016/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.fortiguard.com/advisory/FG-IR-13-016/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,40 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "30032",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/30032"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/124282",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/124282"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/124283",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/124283"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/124284",
|
"name": "http://packetstormsecurity.com/files/124284",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/124284"
|
"url": "http://packetstormsecurity.com/files/124284"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "30032",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "http://www.exploit-db.com/exploits/30032"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "mymp3pro-dep-bo(89469)",
|
"name": "mymp3pro-dep-bo(89469)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89469"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89469"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "mymp3pro-seh-bo(89468)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89468"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "mymp3pro-m3u-bo(89454)",
|
"name": "mymp3pro-m3u-bo(89454)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89454"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89454"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "mymp3pro-seh-bo(89468)",
|
"name": "http://packetstormsecurity.com/files/124283",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/89468"
|
"url": "http://packetstormsecurity.com/files/124283"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/124282",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/124282"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20140116 SQL Injection in Sexy Polling Joomla Extension",
|
"name": "http://2glux.com/forum/sexypolling/sexy-polling-security-vulnerability-notification-t2026.html",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/530789/100/0/threaded"
|
"url": "http://2glux.com/forum/sexypolling/sexy-polling-security-vulnerability-notification-t2026.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.htbridge.com/advisory/HTB23193",
|
"name": "https://www.htbridge.com/advisory/HTB23193",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://www.htbridge.com/advisory/HTB23193"
|
"url": "https://www.htbridge.com/advisory/HTB23193"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://2glux.com/forum/sexypolling/sexy-polling-security-vulnerability-notification-t2026.html",
|
"name": "20140116 SQL Injection in Sexy Polling Joomla Extension",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://2glux.com/forum/sexypolling/sexy-polling-security-vulnerability-notification-t2026.html"
|
"url": "http://www.securityfocus.com/archive/1/530789/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "sexypolling-cve20137219-sql-injection(90519)",
|
"name": "sexypolling-cve20137219-sql-injection(90519)",
|
||||||
|
@ -54,9 +54,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
"name": "1038929",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
"url": "http://www.securitytracker.com/id/1038929"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "99667",
|
"name": "99667",
|
||||||
@ -64,9 +64,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/99667"
|
"url": "http://www.securityfocus.com/bid/99667"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1038929",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1038929"
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/irssi/irssi/commit/5e26325317c72a04c1610ad952974e206384d291",
|
"name": "DSA-4016",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "DEBIAN",
|
||||||
"url" : "https://github.com/irssi/irssi/commit/5e26325317c72a04c1610ad952974e206384d291"
|
"url": "https://www.debian.org/security/2017/dsa-4016"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://irssi.org/security/irssi_sa_2017_07.txt",
|
"name": "https://irssi.org/security/irssi_sa_2017_07.txt",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://irssi.org/security/irssi_sa_2017_07.txt"
|
"url": "https://irssi.org/security/irssi_sa_2017_07.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-4016",
|
"name": "https://github.com/irssi/irssi/commit/5e26325317c72a04c1610ad952974e206384d291",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://www.debian.org/security/2017/dsa-4016"
|
"url": "https://github.com/irssi/irssi/commit/5e26325317c72a04c1610ad952974e206384d291"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -55,15 +55,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "VU#739007",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "https://www.kb.cert.org/vuls/id/739007"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "101699",
|
"name": "101699",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/101699"
|
"url": "http://www.securityfocus.com/bid/101699"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#739007",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "https://www.kb.cert.org/vuls/id/739007"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"DATE_PUBLIC": "2018-03-05T00:00:00",
|
"DATE_PUBLIC": "2018-03-05T00:00:00",
|
||||||
"ID": "CVE-2017-13261",
|
"ID": "CVE-2017-13261",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
@ -74,11 +74,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "44326",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/44326/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "44327",
|
"name": "44327",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -89,6 +84,11 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.android.com/security/bulletin/2018-03-01"
|
"url": "https://source.android.com/security/bulletin/2018-03-01"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "44326",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/44326/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "103253",
|
"name": "103253",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "43206",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/43206/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20171201 Artica Web Proxy v3.06 Remote Code Execution / CVE-2017-17055",
|
"name": "20171201 Artica Web Proxy v3.06 Remote Code Execution / CVE-2017-17055",
|
||||||
"refsource": "FULLDISC",
|
"refsource": "FULLDISC",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://hyp3rlinx.altervista.org/advisories/ARTICA-WEB-PROXY-v3.06-REMOTE-CODE-EXECUTION-CVE-2017-17055.txt"
|
"url": "http://hyp3rlinx.altervista.org/advisories/ARTICA-WEB-PROXY-v3.06-REMOTE-CODE-EXECUTION-CVE-2017-17055.txt"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "43206",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/43206/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/145183/Artica-Web-Proxy-3.06.112216-Remote-Code-Execution.html",
|
"name": "http://packetstormsecurity.com/files/145183/Artica-Web-Proxy-3.06.112216-Remote-Code-Execution.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
|
@ -53,39 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update",
|
"name": "USN-3685-1",
|
||||||
"refsource" : "MLIST",
|
"refsource": "UBUNTU",
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html"
|
"url": "https://usn.ubuntu.com/3685-1/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/",
|
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/",
|
||||||
@ -93,39 +63,69 @@
|
|||||||
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/"
|
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-4259",
|
"name": "103684",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "BID",
|
||||||
"url" : "https://www.debian.org/security/2018/dsa-4259"
|
"url": "http://www.securityfocus.com/bid/103684"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3729",
|
"name": "RHSA-2018:3729",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3729"
|
"url": "https://access.redhat.com/errata/RHSA-2018:3729"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1042004",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1042004"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3730",
|
"name": "RHSA-2018:3730",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3730"
|
"url": "https://access.redhat.com/errata/RHSA-2018:3730"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3731",
|
"name": "RHSA-2018:3731",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3731"
|
"url": "https://access.redhat.com/errata/RHSA-2018:3731"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-3685-1",
|
"name": "https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://usn.ubuntu.com/3685-1/"
|
"url": "https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "103684",
|
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/103684"
|
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1042004",
|
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.securitytracker.com/id/1042004"
|
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-4259",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "https://www.debian.org/security/2018/dsa-4259"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "43477",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/43477/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/145834/Muviko-1.1-SQL-Injection.html",
|
"name": "http://packetstormsecurity.com/files/145834/Muviko-1.1-SQL-Injection.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/145834/Muviko-1.1-SQL-Injection.html"
|
"url": "http://packetstormsecurity.com/files/145834/Muviko-1.1-SQL-Injection.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "43477",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/43477/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-01",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-01"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "100132",
|
"name": "100132",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/100132"
|
"url": "http://www.securityfocus.com/bid/100132"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-01",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-208-01"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://developer.joomla.org/security-centre/696-20170601-core-information-disclosure",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://developer.joomla.org/security-centre/696-20170601-core-information-disclosure"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "99450",
|
"name": "99450",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "1038817",
|
"name": "1038817",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1038817"
|
"url": "http://www.securitytracker.com/id/1038817"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://developer.joomla.org/security-centre/696-20170601-core-information-disclosure",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://developer.joomla.org/security-centre/696-20170601-core-information-disclosure"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp-dos",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp-dos"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "103575",
|
"name": "103575",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/103575"
|
"url": "http://www.securityfocus.com/bid/103575"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp-dos",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp-dos"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1040584",
|
"name": "1040584",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-pxss",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-pxss"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "104947",
|
"name": "104947",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/104947"
|
"url": "http://www.securityfocus.com/bid/104947"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-pxss",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-sb-pxss"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -67,15 +67,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://www.zsh.org/mla/zsh-announce/136"
|
"url": "https://www.zsh.org/mla/zsh-announce/136"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "GLSA-201903-02",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201903-02"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-3764-1",
|
"name": "USN-3764-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "https://usn.ubuntu.com/3764-1/"
|
"url": "https://usn.ubuntu.com/3764-1/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201903-02",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201903-02"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://wordpress.org/plugins/ultimate-member/#developers",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://wordpress.org/plugins/ultimate-member/#developers"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "JVN#28804532",
|
"name": "JVN#28804532",
|
||||||
"refsource": "JVN",
|
"refsource": "JVN",
|
||||||
"url": "http://jvn.jp/en/jp/JVN28804532/index.html"
|
"url": "http://jvn.jp/en/jp/JVN28804532/index.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://wordpress.org/plugins/ultimate-member/#developers",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://wordpress.org/plugins/ultimate-member/#developers"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -54,9 +54,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0815",
|
"name": "1040515",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0815"
|
"url": "http://www.securitytracker.com/id/1040515"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "103234",
|
"name": "103234",
|
||||||
@ -64,9 +64,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/103234"
|
"url": "http://www.securityfocus.com/bid/103234"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1040515",
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0815",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1040515"
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0815"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,13 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"DATE_ASSIGNED" : "2018-06-21",
|
|
||||||
"ID": "CVE-2018-1000220",
|
"ID": "CVE-2018-1000220",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "106162",
|
"name": "106162",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/106162"
|
"url": "http://www.securityfocus.com/bid/106162"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "106162",
|
"name": "106162",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/106162"
|
"url": "http://www.securityfocus.com/bid/106162"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2018-1119",
|
"ID": "CVE-2018-1119",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -76,15 +76,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10742723",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10742723"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ibm-qradar-cve20181728-xss(147707)",
|
"name": "ibm-qradar-cve20181728-xss(147707)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/147707"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/147707"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10742723",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10742723"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user