mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
d62f7b2018
commit
c3d239d592
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "drupal-metatags-code-execution(39638)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39638"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://drupal.org/node/209759",
|
"name": "http://drupal.org/node/209759",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,11 +71,6 @@
|
|||||||
"name": "28478",
|
"name": "28478",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/28478"
|
"url": "http://secunia.com/advisories/28478"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "drupal-metatags-code-execution(39638)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39638"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080128 VB Marketing \"tseekdir.cgi\" Local File Inclusion",
|
"name": "3596",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/487174/100/0/threaded"
|
"url": "http://securityreason.com/securityalert/3596"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "27475",
|
"name": "27475",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/27475"
|
"url": "http://www.securityfocus.com/bid/27475"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3596",
|
"name": "20080128 VB Marketing \"tseekdir.cgi\" Local File Inclusion",
|
||||||
"refsource" : "SREASON",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://securityreason.com/securityalert/3596"
|
"url": "http://www.securityfocus.com/archive/1/487174/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "vbmarketing-tseekdir-file-include(39970)",
|
"name": "vbmarketing-tseekdir-file-include(39970)",
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "ezradius-config-database-info-disclosure(41767)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41767"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://sourceforge.net/forum/forum.php?forum_id=809832",
|
"name": "http://sourceforge.net/forum/forum.php?forum_id=809832",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -71,11 +76,6 @@
|
|||||||
"name": "29769",
|
"name": "29769",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/29769"
|
"url": "http://secunia.com/advisories/29769"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ezradius-config-database-info-disclosure(41767)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41767"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "https://www.exploit-db.com/exploits/5353"
|
"url": "https://www.exploit-db.com/exploits/5353"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "28738",
|
"name": "concoursphoto-cid-sql-injection(41636)",
|
||||||
"refsource" : "BID",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/bid/28738"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41636"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "29664",
|
"name": "29664",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://secunia.com/advisories/29664"
|
"url": "http://secunia.com/advisories/29664"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "concoursphoto-cid-sql-injection(41636)",
|
"name": "28738",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41636"
|
"url": "http://www.securityfocus.com/bid/28738"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:1044",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-1044.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and",
|
"name": "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=122331139823057&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=122331139823057&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and patches for ESX and ESXi resolve multiple security issues",
|
"name": "32436",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/497041/100/0/threaded"
|
"url": "http://secunia.com/advisories/32436"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://support.apple.com/kb/HT3179",
|
"name": "1020457",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://support.apple.com/kb/HT3179"
|
"url": "http://www.securitytracker.com/id?1020457"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2008-0016.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2008-0016.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-299.htm",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-299.htm"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-428.htm",
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-428.htm",
|
||||||
@ -88,114 +83,29 @@
|
|||||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-507.htm"
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-507.htm"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-509.htm",
|
"name": "31600",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-509.htm"
|
"url": "http://secunia.com/advisories/31600"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=751014",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=751014"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=756717",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=756717"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2008-09-24",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce//2008/Sep/msg00007.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200911-02",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-200911-02.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0594",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0594.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:1044",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-1044.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:1045",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-1045.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0906",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0906.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "238628",
|
|
||||||
"refsource" : "SUNALERT",
|
|
||||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238628-1"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SA:2008:042",
|
"name": "SUSE-SA:2008:042",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "TA08-193A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-193A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "30143",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/30143"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:11274",
|
"name": "oval:org.mitre.oval:def:11274",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11274"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11274"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "37386",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/37386"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-2056",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/2056/references"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-2740",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/2740"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1020457",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1020457"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "31010",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/31010"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "31600",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/31600"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "32018",
|
"name": "32018",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/32018"
|
"url": "http://secunia.com/advisories/32018"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "32180",
|
"name": "GLSA-200911-02",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://secunia.com/advisories/32180"
|
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "32179",
|
"name": "32179",
|
||||||
@ -203,29 +113,119 @@
|
|||||||
"url": "http://secunia.com/advisories/32179"
|
"url": "http://secunia.com/advisories/32179"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "32436",
|
"name": "ADV-2008-2740",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://secunia.com/advisories/32436"
|
"url": "http://www.vupen.com/english/advisories/2008/2740"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2008-09-24",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00007.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "sun-jre-jaxws-unauth-access(43654)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43654"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=756717",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=756717"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "33237",
|
"name": "33237",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/33237"
|
"url": "http://secunia.com/advisories/33237"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-2056",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/2056/references"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "32180",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/32180"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0016.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0016.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "30143",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/30143"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:0594",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0594.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=751014",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=751014"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-509.htm",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-509.htm"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "238628",
|
||||||
|
"refsource": "SUNALERT",
|
||||||
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238628-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:1045",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-1045.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "33238",
|
"name": "33238",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/33238"
|
"url": "http://secunia.com/advisories/33238"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-299.htm",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-299.htm"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20081004 VMSA-2008-0016 VMware Hosted products, VirtualCenter Update 3 and patches for ESX and ESXi resolve multiple security issues",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/497041/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:0906",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0906.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA08-193A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA08-193A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "37386",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/37386"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT3179",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT3179"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "sun-jre-xml-dos(43657)",
|
"name": "sun-jre-xml-dos(43657)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43657"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43657"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "sun-jre-jaxws-unauth-access(43654)",
|
"name": "31010",
|
||||||
"refsource" : "XF",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43654"
|
"url": "http://secunia.com/advisories/31010"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,45 +52,45 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "30306",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/30306"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20080721 FGA-2008-16: EMC Dantz Retrospect 7 backup Client 7.5.116 Remote Memory corruption Vulnerability",
|
"name": "20080721 FGA-2008-16: EMC Dantz Retrospect 7 backup Client 7.5.116 Remote Memory corruption Vulnerability",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/494564/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/494564/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.fortiguardcenter.com/advisory/FGA-2008-16.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.fortiguardcenter.com/advisory/FGA-2008-16.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://kb.dantz.com/display/2/articleDirect/index.asp?aid=9692&r=0.5160639",
|
"name": "http://kb.dantz.com/display/2/articleDirect/index.asp?aid=9692&r=0.5160639",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://kb.dantz.com/display/2/articleDirect/index.asp?aid=9692&r=0.5160639"
|
"url": "http://kb.dantz.com/display/2/articleDirect/index.asp?aid=9692&r=0.5160639"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "30306",
|
"name": "retrospect-retroclient-dos(43928)",
|
||||||
"refsource" : "BID",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/bid/30306"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43928"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-2150",
|
"name": "ADV-2008-2150",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/2150/references"
|
"url": "http://www.vupen.com/english/advisories/2008/2150/references"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "31186",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/31186"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "4024",
|
"name": "4024",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/4024"
|
"url": "http://securityreason.com/securityalert/4024"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "retrospect-retroclient-dos(43928)",
|
"name": "http://www.fortiguardcenter.com/advisory/FGA-2008-16.html",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43928"
|
"url": "http://www.fortiguardcenter.com/advisory/FGA-2008-16.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "31186",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/31186"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2008-4273",
|
"ID": "CVE-2008-4273",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -53,25 +53,25 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "6231",
|
"name": "31424",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://www.exploit-db.com/exploits/6231"
|
"url": "http://secunia.com/advisories/31424"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "30627",
|
"name": "30627",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/30627"
|
"url": "http://www.securityfocus.com/bid/30627"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "31424",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/31424"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "4349",
|
"name": "4349",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/4349"
|
"url": "http://securityreason.com/securityalert/4349"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "6231",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/6231"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ppim-upload-file-upload(44390)",
|
"name": "ppim-upload-file-upload(44390)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20080122 Belong Site Builder 0.1b Bypass Admincp",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/486803/100/200/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "27402",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/27402"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "4414",
|
"name": "4414",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/4414"
|
"url": "http://securityreason.com/securityalert/4414"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20080122 Belong Site Builder 0.1b Bypass Admincp",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/486803/100/200/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "belongsitebuilder-admin-security-bypass(39842)",
|
"name": "belongsitebuilder-admin-security-bypass(39842)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39842"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39842"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27402",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/27402"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2008-04/0031.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2008-04/0031.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20080403 Joomla Component com_lms SQL Injection",
|
"name": "ims-cat-sql-injection(41614)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/490410/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41614"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "28586",
|
"name": "28586",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/28586"
|
"url": "http://www.securityfocus.com/bid/28586"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ims-cat-sql-injection(41614)",
|
"name": "20080403 Joomla Component com_lms SQL Injection",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41614"
|
"url": "http://www.securityfocus.com/archive/1/490410/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-2139",
|
"ID": "CVE-2013-2139",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,15 +53,30 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20130603 [GTA-2013-01] - Libsrtp srtp_protect/hmac_compute\tbuffer overflow",
|
"name": "MDVSA-2014:219",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "MANDRIVA",
|
||||||
"url" : "http://seclists.org/fulldisclosure/2013/Jun/10"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:219"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=970697",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=970697",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=970697"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=970697"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20130603 [GTA-2013-01] - Libsrtp srtp_protect/hmac_compute\tbuffer overflow",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2013/Jun/10"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2013-24153",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lwn.net/Articles/579633/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-2840",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2014/dsa-2840"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/cisco/libsrtp/pull/27",
|
"name": "https://github.com/cisco/libsrtp/pull/27",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -73,24 +88,9 @@
|
|||||||
"url": "http://advisories.mageia.org/MGASA-2014-0465.html"
|
"url": "http://advisories.mageia.org/MGASA-2014-0465.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-2840",
|
"name": "93852",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-2840"
|
"url": "http://www.osvdb.org/93852"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2013-24153",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lwn.net/Articles/579633/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2014:219",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2014:219"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2013:1258",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-07/msg00083.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2014:1250",
|
"name": "openSUSE-SU-2014:1250",
|
||||||
@ -98,9 +98,9 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00059.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00059.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "93852",
|
"name": "openSUSE-SU-2013:1258",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.osvdb.org/93852"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00083.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2013-2847",
|
"ID": "CVE-2013-2847",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://code.google.com/p/chromium/issues/detail?id=176692",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=176692",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "oval:org.mitre.oval:def:16716",
|
"name": "oval:org.mitre.oval:def:16716",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16716"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16716"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-2960",
|
"ID": "CVE-2013-2960",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,30 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "IV40115",
|
||||||
|
"refsource": "AIXAPAR",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV40115"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21635080",
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21635080",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21635080"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21635080"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21640752",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21640752"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "IV27192",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV27192"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "IV30187",
|
"name": "IV30187",
|
||||||
"refsource": "AIXAPAR",
|
"refsource": "AIXAPAR",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV30187"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV30187"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "IV40115",
|
"name": "IV27192",
|
||||||
"refsource": "AIXAPAR",
|
"refsource": "AIXAPAR",
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV40115"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV27192"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "IV40116",
|
"name": "IV40116",
|
||||||
@ -86,6 +81,11 @@
|
|||||||
"name": "itm-cve20132960-dos(83724)",
|
"name": "itm-cve20132960-dos(83724)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83724"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83724"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21640752",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21640752"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2013-3866",
|
"ID": "CVE-2013-3866",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-076"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-076"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "TA13-253A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-253A"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:18951",
|
"name": "oval:org.mitre.oval:def:18951",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18951"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18951"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA13-253A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2013-3884",
|
"ID": "CVE-2013-3884",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2013-6002",
|
"ID": "CVE-2013-6002",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://cs.cybozu.co.jp/information/20131202up01.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://cs.cybozu.co.jp/information/20131202up01.php"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://products.cybozu.co.jp/garoon/download/update/gr3/fix371sp1.html",
|
"name": "http://products.cybozu.co.jp/garoon/download/update/gr3/fix371sp1.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -72,6 +67,11 @@
|
|||||||
"refsource": "JVN",
|
"refsource": "JVN",
|
||||||
"url": "http://jvn.jp/en/jp/JVN94245330/index.html"
|
"url": "http://jvn.jp/en/jp/JVN94245330/index.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://cs.cybozu.co.jp/information/20131202up01.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://cs.cybozu.co.jp/information/20131202up01.php"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "JVNDB-2013-000115",
|
"name": "JVNDB-2013-000115",
|
||||||
"refsource": "JVNDB",
|
"refsource": "JVNDB",
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-openwire.c?r1=52458&r2=52457&pathrev=52458",
|
"name": "openSUSE-SU-2013:1675",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-openwire.c?r1=52458&r2=52457&pathrev=52458"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-openwire.c?r1=52463&r2=52462&pathrev=52463",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-openwire.c?r1=52463&r2=52462&pathrev=52463"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=52458",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=52458"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=52463",
|
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=52463",
|
||||||
@ -73,9 +63,9 @@
|
|||||||
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=52463"
|
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=52463"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2013-64.html",
|
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=52458",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2013-64.html"
|
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=52458"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9248",
|
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9248",
|
||||||
@ -83,9 +73,14 @@
|
|||||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9248"
|
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9248"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2014:0342",
|
"name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-openwire.c?r1=52463&r2=52462&pathrev=52463",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0342.html"
|
"url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-openwire.c?r1=52463&r2=52462&pathrev=52463"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.wireshark.org/security/wnpa-sec-2013-64.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.wireshark.org/security/wnpa-sec-2013-64.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1671",
|
"name": "openSUSE-SU-2013:1671",
|
||||||
@ -93,14 +88,19 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2013:1675",
|
"name": "RHSA-2014:0342",
|
||||||
"refsource" : "SUSE",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0342.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:19086",
|
"name": "oval:org.mitre.oval:def:19086",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19086"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19086"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-openwire.c?r1=52458&r2=52457&pathrev=52458",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-openwire.c?r1=52458&r2=52457&pathrev=52458"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20131209 Re: CVE request: two issues in libmicro",
|
"name": "64138",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2013/12/09/11"
|
"url": "http://www.securityfocus.com/bid/64138"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugs.gentoo.org/show_bug.cgi?id=493450",
|
"name": "https://bugs.gentoo.org/show_bug.cgi?id=493450",
|
||||||
@ -67,20 +67,20 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039384"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039384"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://gnunet.org/svn/libmicrohttpd/ChangeLog",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://gnunet.org/svn/libmicrohttpd/ChangeLog"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201402-01",
|
"name": "GLSA-201402-01",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "http://security.gentoo.org/glsa/glsa-201402-01.xml"
|
"url": "http://security.gentoo.org/glsa/glsa-201402-01.xml"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "64138",
|
"name": "https://gnunet.org/svn/libmicrohttpd/ChangeLog",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/64138"
|
"url": "https://gnunet.org/svn/libmicrohttpd/ChangeLog"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20131209 Re: CVE request: two issues in libmicro",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2013/12/09/11"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "55903",
|
"name": "55903",
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://git.php.net/?p=php-src.git;a=commit;h=8f4a5373bb71590352fd934028d6dde5bc18530b"
|
"url": "http://git.php.net/?p=php-src.git;a=commit;h=8f4a5373bb71590352fd934028d6dde5bc18530b"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://bugs.php.net/bug.php?id=66356",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugs.php.net/bug.php?id=66356"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1065108",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1065108",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "USN-2126-1",
|
"name": "USN-2126-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2126-1"
|
"url": "http://www.ubuntu.com/usn/USN-2126-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.php.net/bug.php?id=66356",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugs.php.net/bug.php?id=66356"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -62,9 +62,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
"name": "1038941",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
"url": "http://www.securitytracker.com/id/1038941"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "99725",
|
"name": "99725",
|
||||||
@ -72,9 +72,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/99725"
|
"url": "http://www.securityfocus.com/bid/99725"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1038941",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1038941"
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,6 +53,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1039595",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1039595"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -62,11 +67,6 @@
|
|||||||
"name": "101309",
|
"name": "101309",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/101309"
|
"url": "http://www.securityfocus.com/bid/101309"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1039595",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1039595"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -81,16 +81,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "101330",
|
"name": "101330",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/101330"
|
"url": "http://www.securityfocus.com/bid/101330"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1039592",
|
"name": "1039592",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.tcpdump.org/tcpdump-changes.txt",
|
"name": "GLSA-201709-23",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://www.tcpdump.org/tcpdump-changes.txt"
|
"url": "https://security.gentoo.org/glsa/201709-23"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/the-tcpdump-group/tcpdump/commit/c5dd7bef5e54da5996dc4713284aa6266ae75b75",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/the-tcpdump-group/tcpdump/commit/c5dd7bef5e54da5996dc4713284aa6266ae75b75"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/the-tcpdump-group/tcpdump/commit/d692d67332bcc90540088ad8e725eb3279e39863",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/the-tcpdump-group/tcpdump/commit/d692d67332bcc90540088ad8e725eb3279e39863"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://support.apple.com/HT208221",
|
"name": "https://support.apple.com/HT208221",
|
||||||
@ -78,19 +68,29 @@
|
|||||||
"url": "http://www.debian.org/security/2017/dsa-3971"
|
"url": "http://www.debian.org/security/2017/dsa-3971"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201709-23",
|
"name": "https://github.com/the-tcpdump-group/tcpdump/commit/d692d67332bcc90540088ad8e725eb3279e39863",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://security.gentoo.org/glsa/201709-23"
|
"url": "https://github.com/the-tcpdump-group/tcpdump/commit/d692d67332bcc90540088ad8e725eb3279e39863"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHEA-2018:0705",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHEA-2018:0705"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1039307",
|
"name": "1039307",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1039307"
|
"url": "http://www.securitytracker.com/id/1039307"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.tcpdump.org/tcpdump-changes.txt",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.tcpdump.org/tcpdump-changes.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/the-tcpdump-group/tcpdump/commit/c5dd7bef5e54da5996dc4713284aa6266ae75b75",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/the-tcpdump-group/tcpdump/commit/c5dd7bef5e54da5996dc4713284aa6266ae75b75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHEA-2018:0705",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHEA-2018:0705"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://bugs.launchpad.net/mahara/+bug/1732987",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://bugs.launchpad.net/mahara/+bug/1732987"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://mahara.org/interaction/forum/topic.php?id=8149",
|
"name": "https://mahara.org/interaction/forum/topic.php?id=8149",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "https://reviews.mahara.org/#/c/8191/",
|
"name": "https://reviews.mahara.org/#/c/8191/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://reviews.mahara.org/#/c/8191/"
|
"url": "https://reviews.mahara.org/#/c/8191/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.launchpad.net/mahara/+bug/1732987",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://bugs.launchpad.net/mahara/+bug/1732987"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "DSA-3885",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2017/dsa-3885"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://openwall.com/lists/oss-security/2017/06/06/4",
|
"name": "http://openwall.com/lists/oss-security/2017/06/06/4",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -62,11 +67,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://irssi.org/security/irssi_sa_2017_06.txt"
|
"url": "https://irssi.org/security/irssi_sa_2017_06.txt"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-3885",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2017/dsa-3885"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "99043",
|
"name": "99043",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-148078.pdf",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-148078.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "101248",
|
"name": "101248",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/101248"
|
"url": "http://www.securityfocus.com/bid/101248"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-148078.pdf",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-148078.pdf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "43986",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/43986/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://icanthackit.wordpress.com/2018/01/30/thoughts-on-the-handling-cve-2018-0101-cisco-bug-cscvg35618/",
|
"name": "https://icanthackit.wordpress.com/2018/01/30/thoughts-on-the-handling-cve-2018-0101-cisco-bug-cscvg35618/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://icanthackit.wordpress.com/2018/01/30/thoughts-on-the-handling-cve-2018-0101-cisco-bug-cscvg35618/"
|
"url": "https://icanthackit.wordpress.com/2018/01/30/thoughts-on-the-handling-cve-2018-0101-cisco-bug-cscvg35618/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://pastebin.com/YrBcG2Ln",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://pastebin.com/YrBcG2Ln"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "102845",
|
"name": "102845",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/102845"
|
"url": "http://www.securityfocus.com/bid/102845"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1040292",
|
"name": "1040292",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1040292"
|
"url": "http://www.securitytracker.com/id/1040292"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "43986",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/43986/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://pastebin.com/YrBcG2Ln",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://pastebin.com/YrBcG2Ln"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -67,11 +67,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20181017 Cisco IOS Access Points Software 802.11r Fast Transition Denial of Service Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-ap-ft-dos"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "105680",
|
"name": "105680",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -81,6 +76,11 @@
|
|||||||
"name": "1041918",
|
"name": "1041918",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1041918"
|
"url": "http://www.securitytracker.com/id/1041918"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20181017 Cisco IOS Access Points Software 802.11r Fast Transition Denial of Service Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-ap-ft-dos"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "kurt@seifried.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2018-11-27T13:54:33.467477",
|
"DATE_ASSIGNED": "2018-11-27T13:54:33.467477",
|
||||||
"DATE_REQUESTED": "2018-10-28T04:10:05",
|
"DATE_REQUESTED": "2018-10-28T04:10:05",
|
||||||
"ID": "CVE-2018-1000832",
|
"ID": "CVE-2018-1000832",
|
||||||
@ -14,18 +14,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "ZoneMinder",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "<= 1.32.2"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "ZoneMinder"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -47,7 +47,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "Other/Unknown"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "104172",
|
"name": "104172",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/104172"
|
"url": "http://www.securityfocus.com/bid/104172"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1040920",
|
"name": "1040920",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
Loading…
x
Reference in New Issue
Block a user