mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3f63c473eb
commit
c2d3000c2b
@ -57,15 +57,15 @@
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-509"
|
||||
},
|
||||
{
|
||||
"name" : "10437",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/10437"
|
||||
},
|
||||
{
|
||||
"name": "gatos-xatitv-gain-privileges(16273)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16273"
|
||||
},
|
||||
{
|
||||
"name": "10437",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/10437"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "GLSA-200409-22",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200409-22.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://downloads.phpgroupware.org/changelog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://downloads.phpgroupware.org/changelog"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200409-22",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200409-22.xml"
|
||||
},
|
||||
{
|
||||
"name": "phpgroupware-xss(17289)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "midnight-commander-section-dos(18907)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18907"
|
||||
},
|
||||
{
|
||||
"name": "13863",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/13863/"
|
||||
},
|
||||
{
|
||||
"name": "DSA-639",
|
||||
"refsource": "DEBIAN",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "RHSA-2005:512",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-512.html"
|
||||
},
|
||||
{
|
||||
"name" : "13863",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/13863/"
|
||||
},
|
||||
{
|
||||
"name" : "midnight-commander-section-dos(18907)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18907"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "midnight-commander-command-execution(18906)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18906"
|
||||
},
|
||||
{
|
||||
"name": "13863",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/13863/"
|
||||
},
|
||||
{
|
||||
"name": "1012903",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1012903"
|
||||
},
|
||||
{
|
||||
"name": "DSA-639",
|
||||
"refsource": "DEBIAN",
|
||||
@ -61,21 +76,6 @@
|
||||
"name": "RHSA-2005:512",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-512.html"
|
||||
},
|
||||
{
|
||||
"name" : "1012903",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1012903"
|
||||
},
|
||||
{
|
||||
"name" : "13863",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/13863/"
|
||||
},
|
||||
{
|
||||
"name" : "midnight-commander-command-execution(18906)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18906"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040825 Multiple Vulnerabilities in Cisco Secure Access Control Server",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml"
|
||||
},
|
||||
{
|
||||
"name": "11047",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "ciscosecure-leap-radius-dos(17116)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17116"
|
||||
},
|
||||
{
|
||||
"name": "20040825 Multiple Vulnerabilities in Cisco Secure Access Control Server",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=109483971420067&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "11371",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/11371"
|
||||
},
|
||||
{
|
||||
"name": "12789",
|
||||
"refsource": "SECUNIA",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "merak-icewarp-path-disclosure(17315)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17315"
|
||||
},
|
||||
{
|
||||
"name": "11371",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11371"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,45 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[announce] 20080215 Horde Groupware 1.0.4 (final)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.horde.org/archives/announce/2008/000380.html"
|
||||
"name": "29186",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29186"
|
||||
},
|
||||
{
|
||||
"name": "[announce] 20080215 Horde Groupware Webmail Edition 1.0.5 (final)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.horde.org/archives/announce/2008/000381.html"
|
||||
},
|
||||
{
|
||||
"name" : "[announce] 20080215 Turba H3 (2.2-RC3)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.horde.org/archives/announce/2008/000379.html"
|
||||
},
|
||||
{
|
||||
"name" : "[announce] 20080215 Turba H3 (2.1.7) (final)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.horde.org/archives/announce/2008/000378.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=432027",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1507",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2008/dsa-1507"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-2040",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-2087",
|
||||
"refsource": "FEDORA",
|
||||
@ -103,14 +78,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/27844"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0593",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0593/references"
|
||||
},
|
||||
{
|
||||
"name" : "1019433",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1019433"
|
||||
"name": "DSA-1507",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1507"
|
||||
},
|
||||
{
|
||||
"name": "28982",
|
||||
@ -123,9 +93,19 @@
|
||||
"url": "http://secunia.com/advisories/29071"
|
||||
},
|
||||
{
|
||||
"name" : "29184",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29184"
|
||||
"name": "[announce] 20080215 Turba H3 (2.1.7) (final)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.horde.org/archives/announce/2008/000378.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0593",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0593/references"
|
||||
},
|
||||
{
|
||||
"name": "[announce] 20080215 Turba H3 (2.2-RC3)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.horde.org/archives/announce/2008/000379.html"
|
||||
},
|
||||
{
|
||||
"name": "29185",
|
||||
@ -133,9 +113,29 @@
|
||||
"url": "http://secunia.com/advisories/29185"
|
||||
},
|
||||
{
|
||||
"name" : "29186",
|
||||
"name": "[announce] 20080215 Horde Groupware 1.0.4 (final)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.horde.org/archives/announce/2008/000380.html"
|
||||
},
|
||||
{
|
||||
"name": "1019433",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1019433"
|
||||
},
|
||||
{
|
||||
"name": "29184",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29186"
|
||||
"url": "http://secunia.com/advisories/29184"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-2040",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://osvdb.org/ref/48/48-v-webmail.txt"
|
||||
},
|
||||
{
|
||||
"name" : "48796",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/48796"
|
||||
},
|
||||
{
|
||||
"name": "vwebmail-redirect-phishing(45855)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45855"
|
||||
},
|
||||
{
|
||||
"name": "48796",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/48796"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.securityfocus.com/bid/30331/exploit",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.securityfocus.com/bid/30331/exploit"
|
||||
},
|
||||
{
|
||||
"name": "30331",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "runcms-votepolls-file-include(43969)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43969"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securityfocus.com/bid/30331/exploit",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securityfocus.com/bid/30331/exploit"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080718 Def_Blog 1.0.3 Multiple Remote SQL Injection Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/494534/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "30289",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30289"
|
||||
},
|
||||
{
|
||||
"name" : "31174",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31174"
|
||||
"name": "20080718 Def_Blog 1.0.3 Multiple Remote SQL Injection Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/494534/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "4079",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4079"
|
||||
},
|
||||
{
|
||||
"name": "31174",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31174"
|
||||
},
|
||||
{
|
||||
"name": "defblog-comaddok-comlook-sql-injection(43909)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2008-3823",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,64 +53,64 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080910 [oCERT-2008-012] Horde, Popoon frameworks common input sanitization errors (XSS)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/496182/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[horde-announce] 20080910 [SECURITY] Horde 3.2.2 (final)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=horde-announce&m=122104360019867&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20080910 [oCERT-2008-012] Horde, Popoon frameworks common input sanitization errors (XSS)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/09/10/1"
|
||||
},
|
||||
{
|
||||
"name" : "http://ocert.org/patches/2008-012/MIME.patch",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://ocert.org/patches/2008-012/MIME.patch"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ocert.org/advisories/ocert-2008-012.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.ocert.org/advisories/ocert-2008-012.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1642",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2008/dsa-1642"
|
||||
},
|
||||
{
|
||||
"name" : "31110",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31110"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2548",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2548"
|
||||
"name": "horde-mime-xss(45030)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45030"
|
||||
},
|
||||
{
|
||||
"name": "31842",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31842"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1642",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1642"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2548",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2548"
|
||||
},
|
||||
{
|
||||
"name": "31959",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31959"
|
||||
},
|
||||
{
|
||||
"name": "http://ocert.org/patches/2008-012/MIME.patch",
|
||||
"refsource": "MISC",
|
||||
"url": "http://ocert.org/patches/2008-012/MIME.patch"
|
||||
},
|
||||
{
|
||||
"name": "[horde-announce] 20080910 [SECURITY] Horde 3.2.2 (final)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=horde-announce&m=122104360019867&w=2"
|
||||
},
|
||||
{
|
||||
"name": "31110",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31110"
|
||||
},
|
||||
{
|
||||
"name": "20080910 [oCERT-2008-012] Horde, Popoon frameworks common input sanitization errors (XSS)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/496182/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "4245",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4245"
|
||||
},
|
||||
{
|
||||
"name" : "horde-mime-xss(45030)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45030"
|
||||
"name": "[oss-security] 20080910 [oCERT-2008-012] Horde, Popoon frameworks common input sanitization errors (XSS)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/09/10/1"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ocert.org/advisories/ocert-2008-012.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.ocert.org/advisories/ocert-2008-012.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20080911 CVE request for Joomla multiple vuln.",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=122118210029084&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20080911 CVE request: joomla < 1.5.7",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=122115344915232&w=2"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20080916 Re: CVE request: joomla < 1.5.7",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=122152798516853&w=2"
|
||||
},
|
||||
{
|
||||
"name": "31789",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31789"
|
||||
},
|
||||
{
|
||||
"name": "http://developer.joomla.org/security/news/273-20080903-core-commailto-spam.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://developer.joomla.org/security/news/273-20080903-core-commailto-spam.html"
|
||||
},
|
||||
{
|
||||
"name" : "31789",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31789"
|
||||
"name": "[oss-security] 20080911 CVE request: joomla < 1.5.7",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=122115344915232&w=2"
|
||||
},
|
||||
{
|
||||
"name": "4275",
|
||||
@ -86,6 +81,11 @@
|
||||
"name": "mailto-joomla-mail-relay(45070)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45070"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20080911 CVE request for Joomla multiple vuln.",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=122118210029084&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20081021 CVE Request: Opera 9.60 with security fixes",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/10/21/5"
|
||||
"name": "32394",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32394"
|
||||
},
|
||||
{
|
||||
"name": "32538",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32538"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/solaris/960/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/solaris/960/"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20081022 Re: CVE Request: Opera 9.60 with security fixes",
|
||||
@ -63,9 +73,39 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/10/22/5"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/freebsd/960/",
|
||||
"name": "1021016",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1021016"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20081021 CVE Request: Opera 9.60 with security fixes",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/10/21/5"
|
||||
},
|
||||
{
|
||||
"name": "32177",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32177"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/windows/960/",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/freebsd/960/"
|
||||
"url": "http://www.opera.com/docs/changelogs/windows/960/"
|
||||
},
|
||||
{
|
||||
"name": "opera-redirect-code-execution(45722)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45722"
|
||||
},
|
||||
{
|
||||
"name": "31631",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31631"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2008:022",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/linux/960/",
|
||||
@ -78,64 +118,24 @@
|
||||
"url": "http://www.opera.com/docs/changelogs/mac/960/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/solaris/960/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/solaris/960/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/windows/960/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/windows/960/"
|
||||
"name": "ADV-2008-2765",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2765"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/support/search/view/901/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/support/search/view/901/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/freebsd/960/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/freebsd/960/"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200811-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2008:022",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name" : "31631",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31631"
|
||||
},
|
||||
{
|
||||
"name" : "32538",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32538"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2765",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2765"
|
||||
},
|
||||
{
|
||||
"name" : "1021016",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1021016"
|
||||
},
|
||||
{
|
||||
"name" : "32177",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32177"
|
||||
},
|
||||
{
|
||||
"name" : "32394",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32394"
|
||||
},
|
||||
{
|
||||
"name" : "opera-redirect-code-execution(45722)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45722"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "49597",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/49597"
|
||||
},
|
||||
{
|
||||
"name": "6942",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32060"
|
||||
},
|
||||
{
|
||||
"name" : "49597",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/49597"
|
||||
},
|
||||
{
|
||||
"name": "4541",
|
||||
"refsource": "SREASON",
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://kayalang.org/about/news",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://kayalang.org/about/news"
|
||||
},
|
||||
{
|
||||
"name": "45882",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/45882"
|
||||
},
|
||||
{
|
||||
"name": "kaya-cgiframework-header-injection(42774)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42774"
|
||||
},
|
||||
{
|
||||
"name": "30466",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30466"
|
||||
},
|
||||
{
|
||||
"name" : "kaya-cgiframework-header-injection(42774)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42774"
|
||||
"name": "http://kayalang.org/about/news",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kayalang.org/about/news"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7408",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7408"
|
||||
},
|
||||
{
|
||||
"name": "32761",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "livinglocal-listtest-xss(47214)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47214"
|
||||
},
|
||||
{
|
||||
"name": "7408",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7408"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7558",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7558"
|
||||
},
|
||||
{
|
||||
"name": "32989",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "phpld-page-sql-injection(47580)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47580"
|
||||
},
|
||||
{
|
||||
"name": "7558",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7558"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-2144",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-2376",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||
"name": "53372",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/53372"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201308-06",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:150",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||
},
|
||||
{
|
||||
"name" : "53372",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/53372"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-2384",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,70 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[distro-pkg-dev] 20130417 [SECURITY] IcedTea 1.11.10 for OpenJDK 6 Released!",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022796.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=952709",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/"
|
||||
},
|
||||
{
|
||||
"name" : "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.icu-project.org/trac/ticket/10107",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.icu-project.org/trac/ticket/10107"
|
||||
},
|
||||
{
|
||||
"name" : "http://site.icu-project.org/download/51#TOC-Known-Issues",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://site.icu-project.org/download/51#TOC-Known-Issues"
|
||||
},
|
||||
{
|
||||
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124"
|
||||
},
|
||||
{
|
||||
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2013-04-16-2",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html"
|
||||
"name": "SUSE-SU-2013:0835",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201406-32",
|
||||
@ -123,55 +68,140 @@
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02889",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
|
||||
"name": "[distro-pkg-dev] 20130417 [SECURITY] IcedTea 1.11.10 for OpenJDK 6 Released!",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022796.html"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101252",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02922",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101305",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:145",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:145"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:161",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:161"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0752",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0752.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0757",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
|
||||
"name": "SUSE-SU-2013:0871",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0758",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0758.html"
|
||||
},
|
||||
{
|
||||
"name": "http://site.icu-project.org/download/51#TOC-Known-Issues",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://site.icu-project.org/download/51#TOC-Known-Issues"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2013-04-16-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:145",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:145"
|
||||
},
|
||||
{
|
||||
"name": "TA13-107A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-107A"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blog.fuseyism.com/index.php/2013/04/25/security-icedtea-1-11-11-1-12-5-for-openjdk-6-released/"
|
||||
},
|
||||
{
|
||||
"name": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7",
|
||||
"refsource": "MISC",
|
||||
"url": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7"
|
||||
},
|
||||
{
|
||||
"name": "SSRT101252",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
|
||||
},
|
||||
{
|
||||
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1455",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:19549",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19549"
|
||||
},
|
||||
{
|
||||
"name": "SSRT101305",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0757",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02922",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
|
||||
},
|
||||
{
|
||||
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0124"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0777",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:161",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:161"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0964",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0752",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0752.html"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.icu-project.org/trac/ticket/10107",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.icu-project.org/trac/ticket/10107"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16549",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16549"
|
||||
},
|
||||
{
|
||||
"name": "USN-1806-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1806-1"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:19341",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19341"
|
||||
},
|
||||
{
|
||||
"name": "59179",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/59179"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1456",
|
||||
"refsource": "REDHAT",
|
||||
@ -183,19 +213,14 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0777",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0835",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0871",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html"
|
||||
"name": "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blog.fuseyism.com/index.php/2013/04/22/security-icedtea-2-3-9-for-openjdk-7-released/"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0934",
|
||||
@ -203,39 +228,14 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0964",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html"
|
||||
"name": "HPSBUX02889",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1806-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1806-1"
|
||||
},
|
||||
{
|
||||
"name" : "TA13-107A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-107A"
|
||||
},
|
||||
{
|
||||
"name" : "59179",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/59179"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16549",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16549"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:19341",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19341"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:19549",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19549"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,31 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html"
|
||||
},
|
||||
{
|
||||
"name": "20130926 XAMPP 1.8.1 Local Write Access Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0131.html"
|
||||
},
|
||||
{
|
||||
"name": "97780",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/97780"
|
||||
},
|
||||
{
|
||||
"name": "28654",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/28654"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/123407/XAMPP-1.8.1-Local-Write-Access.html"
|
||||
},
|
||||
{
|
||||
"name": "62665",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/62665"
|
||||
},
|
||||
{
|
||||
"name" : "97780",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/97780"
|
||||
},
|
||||
{
|
||||
"name": "xampp-cve20122586-lang-security-bypass(87499)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20131120 Mybb Ajaxfs Plugin Sql Injection vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://seclists.org/bugtraq/2013/Nov/102"
|
||||
"name": "100030",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/100030"
|
||||
},
|
||||
{
|
||||
"name": "29797",
|
||||
@ -72,15 +72,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.iedb.ir/exploits-889.html"
|
||||
},
|
||||
{
|
||||
"name" : "100030",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/100030"
|
||||
},
|
||||
{
|
||||
"name": "mybb-ajaxfs-sql-injection(89084)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89084"
|
||||
},
|
||||
{
|
||||
"name": "20131120 Mybb Ajaxfs Plugin Sql Injection vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://seclists.org/bugtraq/2013/Nov/102"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -70,24 +70,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "44141",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/44141/"
|
||||
"name": "1038946",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038946"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
},
|
||||
{
|
||||
"name": "44141",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/44141/"
|
||||
},
|
||||
{
|
||||
"name": "99770",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99770"
|
||||
},
|
||||
{
|
||||
"name" : "1038946",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038946"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "42943",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/42943/"
|
||||
"name": "1039474",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039474"
|
||||
},
|
||||
{
|
||||
"name" : "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html"
|
||||
},
|
||||
{
|
||||
"name" : "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://thekelleys.org.uk/dnsmasq/CHANGELOG",
|
||||
"name": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://thekelleys.org.uk/dnsmasq/CHANGELOG"
|
||||
"url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3989",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3989"
|
||||
},
|
||||
{
|
||||
"name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033",
|
||||
@ -88,69 +78,79 @@
|
||||
"url": "https://access.redhat.com/security/vulnerabilities/3199382"
|
||||
},
|
||||
{
|
||||
"name" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
|
||||
"name": "101085",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101085"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3989",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2017/dsa-3989"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201710-27",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201710-27"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2836",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2836"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2837",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2837"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2017:2633",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html"
|
||||
"name": "42943",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/42943/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3430-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3430-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3430-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-3430-2"
|
||||
},
|
||||
{
|
||||
"name": "VU#973527",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "https://www.kb.cert.org/vuls/id/973527"
|
||||
},
|
||||
{
|
||||
"name" : "101085",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/101085"
|
||||
"name": "GLSA-201710-27",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201710-27"
|
||||
},
|
||||
{
|
||||
"name" : "1039474",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039474"
|
||||
"name": "USN-3430-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3430-2"
|
||||
},
|
||||
{
|
||||
"name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2836",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2836"
|
||||
},
|
||||
{
|
||||
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
|
||||
},
|
||||
{
|
||||
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2837",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2837"
|
||||
},
|
||||
{
|
||||
"name": "http://thekelleys.org.uk/dnsmasq/CHANGELOG",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2017:2633",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html"
|
||||
},
|
||||
{
|
||||
"name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-14677",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/"
|
||||
},
|
||||
{
|
||||
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=22200",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=22200"
|
||||
},
|
||||
{
|
||||
"name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf"
|
||||
"name": "101611",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101611"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201801-01",
|
||||
@ -73,9 +63,19 @@
|
||||
"url": "https://security.gentoo.org/glsa/201801-01"
|
||||
},
|
||||
{
|
||||
"name" : "101611",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/101611"
|
||||
"name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf",
|
||||
"refsource": "MISC",
|
||||
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf"
|
||||
},
|
||||
{
|
||||
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=22200",
|
||||
"refsource": "MISC",
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22200"
|
||||
},
|
||||
{
|
||||
"name": "https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "lpardo@redhat.com",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2017-15138",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/radare/radare2/issues/8673",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/radare/radare2/issues/8673"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-15794",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/systemd/systemd/pull/5998",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,6 +62,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://launchpad.net/bugs/1621396"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
|
||||
},
|
||||
{
|
||||
"name": "98677",
|
||||
"refsource": "BID",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs2"
|
||||
"name": "1040463",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040463"
|
||||
},
|
||||
{
|
||||
"name": "103328",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/103328"
|
||||
},
|
||||
{
|
||||
"name" : "1040463",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040463"
|
||||
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-acs2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss"
|
||||
},
|
||||
{
|
||||
"name": "103551",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103551"
|
||||
},
|
||||
{
|
||||
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-webuixss"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -60,15 +60,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20180905 Cisco Umbrella API Unauthorized Access Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-api"
|
||||
},
|
||||
{
|
||||
"name": "105283",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105283"
|
||||
},
|
||||
{
|
||||
"name": "20180905 Cisco Umbrella API Unauthorized Access Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-api"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-06-05T13:57:43.653459",
|
||||
"DATE_REQUESTED": "2018-05-09T00:00:00",
|
||||
"ID": "CVE-2018-1000195",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.120 and older, LTS 2.107.2 and older"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins project"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-441, CWE-918"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-11-27T13:54:33.456461",
|
||||
"DATE_REQUESTED": "2018-10-15T09:16:59",
|
||||
"ID": "CVE-2018-1000816",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Grafana",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "confirmed for 5.2.4 and 5.3.0 "
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Grafana"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Cross Site Scripting (XSS)"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "44919",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/44919/"
|
||||
},
|
||||
{
|
||||
"name": "https://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://packetstormsecurity.com/files/148268/LFCMS-3.7.0-Cross-Site-Request-Forgery.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.iwantacve.cn/index.php/archives/44/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.iwantacve.cn/index.php/archives/44/"
|
||||
"name": "44919",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/44919/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.cnblogs.com/v1vvwv/p/9203899.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.cnblogs.com/v1vvwv/p/9203899.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.iwantacve.cn/index.php/archives/44/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.iwantacve.cn/index.php/archives/44/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "chrome-cve-admin@google.com",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2018-16078",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -54,9 +54,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://crbug.com/858820",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://crbug.com/858820"
|
||||
"name": "105215",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105215"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:2666",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2666"
|
||||
},
|
||||
{
|
||||
"name": "https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html",
|
||||
@ -69,14 +74,9 @@
|
||||
"url": "https://security.gentoo.org/glsa/201811-10"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:2666",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2666"
|
||||
},
|
||||
{
|
||||
"name" : "105215",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/105215"
|
||||
"name": "https://crbug.com/858820",
|
||||
"refsource": "MISC",
|
||||
"url": "https://crbug.com/858820"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176"
|
||||
},
|
||||
{
|
||||
"name": "https://nimo-zhang.github.io/2018/09/07/bug-analysis-1/#more",
|
||||
"refsource": "MISC",
|
||||
"url": "https://nimo-zhang.github.io/2018/09/07/bug-analysis-1/#more"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908176"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "106375",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106375"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180921 [SECURITY] [DLA 1513-1] openafs security update",
|
||||
"refsource": "MLIST",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "DSA-4302",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4302"
|
||||
},
|
||||
{
|
||||
"name" : "106375",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/106375"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT208849",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT208849"
|
||||
},
|
||||
{
|
||||
"name": "1041027",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041027"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208849",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT208849"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,59 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-5417",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5417",
|
||||
"ASSIGNER": "support@hackerone.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "serve",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Fixed Version 7.1.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": {
|
||||
"lang": "eng",
|
||||
"value": "Directory Traversal (Local File Inclusion)"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://hackerone.com/reports/358645",
|
||||
"url": "https://hackerone.com/reports/358645"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A path traversal vulnerability in serve npm package version 7.0.1 allows the attackers to read content of arbitrary files on the remote server."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user