mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
c8731597e7
commit
c41270b6c2
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.kerio.com/kms_history.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.kerio.com/kms_history.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-1610",
|
"name": "ADV-2006-1610",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "kerio-mailserver-attachment-bypass(26170)",
|
"name": "kerio-mailserver-attachment-bypass(26170)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26170"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26170"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.kerio.com/kms_history.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.kerio.com/kms_history.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,39 +53,39 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060502 zawhttpd - Buffer Overflow",
|
"name": "25671",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/432955/100/0/threaded"
|
"url": "http://www.osvdb.org/25671"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.securiteam.com/exploits/5OP0315IKK.html",
|
"name": "http://www.securiteam.com/exploits/5OP0315IKK.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.securiteam.com/exploits/5OP0315IKK.html"
|
"url": "http://www.securiteam.com/exploits/5OP0315IKK.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "17814",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/17814"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25671",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/25671"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1016030",
|
"name": "1016030",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1016030"
|
"url": "http://securitytracker.com/id?1016030"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "zawhttpd-get-dos(26257)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26257"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060502 zawhttpd - Buffer Overflow",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/432955/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "852",
|
"name": "852",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/852"
|
"url": "http://securityreason.com/securityalert/852"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "zawhttpd-get-dos(26257)",
|
"name": "17814",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26257"
|
"url": "http://www.securityfocus.com/bid/17814"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,45 +52,45 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060529 [KAPDA::#45] - geeklog multiple vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/435295/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://kapda.ir/advisory-336.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://kapda.ir/advisory-336.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.geeklog.net/index.php?topic=Security",
|
"name": "http://www.geeklog.net/index.php?topic=Security",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.geeklog.net/index.php?topic=Security"
|
"url": "http://www.geeklog.net/index.php?topic=Security"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "18154",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/18154"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-2050",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/2050"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20316",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/20316"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "993",
|
"name": "993",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/993"
|
"url": "http://securityreason.com/securityalert/993"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20060529 [KAPDA::#45] - geeklog multiple vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/435295/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-2050",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/2050"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "geeklog-getimage-xss(26862)",
|
"name": "geeklog-getimage-xss(26862)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26862"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26862"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://kapda.ir/advisory-336.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://kapda.ir/advisory-336.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20316",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/20316"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18154",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/18154"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060526 Wavecon Advisory: Open-Xchange <= 0.8.2 defaultuser with /bin/bash and default password",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/435198/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.golem.de/0605/45407.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.golem.de/0605/45407.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.open-xchange.org/bugzilla/show_bug.cgi?id=2815",
|
"name": "http://www.open-xchange.org/bugzilla/show_bug.cgi?id=2815",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -72,6 +62,11 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/18115"
|
"url": "http://www.securityfocus.com/bid/18115"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20060526 Wavecon Advisory: Open-Xchange <= 0.8.2 defaultuser with /bin/bash and default password",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/435198/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-2037",
|
"name": "ADV-2006-2037",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -82,15 +77,20 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/20323"
|
"url": "http://secunia.com/advisories/20323"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "openxchange-ldap-default-account(26761)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26761"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1012",
|
"name": "1012",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/1012"
|
"url": "http://securityreason.com/securityalert/1012"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openxchange-ldap-default-account(26761)",
|
"name": "http://www.golem.de/0605/45407.html",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26761"
|
"url": "http://www.golem.de/0605/45407.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060606 ParticleSoft Wiki v1.0.2",
|
"name": "1070",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/436121/100/0/threaded"
|
"url": "http://securityreason.com/securityalert/1070"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-2170",
|
"name": "ADV-2006-2170",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2006/2170"
|
"url": "http://www.vupen.com/english/advisories/2006/2170"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1070",
|
"name": "20060606 ParticleSoft Wiki v1.0.2",
|
||||||
"refsource" : "SREASON",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://securityreason.com/securityalert/1070"
|
"url": "http://www.securityfocus.com/archive/1/436121/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "particlewiki-edit-xss(26952)",
|
"name": "particlewiki-edit-xss(26952)",
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060620 cjGuestbook v1.3 - XSS",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/438008/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18556",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/18556"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-2488",
|
"name": "ADV-2006-2488",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -77,6 +67,16 @@
|
|||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/1141"
|
"url": "http://securityreason.com/securityalert/1141"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "18556",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/18556"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060620 cjGuestbook v1.3 - XSS",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/438008/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "cjguestbook-comments-xss(27322)",
|
"name": "cjguestbook-comments-xss(27322)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,50 +52,50 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060707 PAPOO <=3RC3 sql injection / admin credentials disclosure",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/439518/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1993",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/1993"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18895",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/18895"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-2713",
|
"name": "ADV-2006-2713",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/2713"
|
"url": "http://www.vupen.com/english/advisories/2006/2713"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "27117",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/27117"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1016461",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1016461"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20978",
|
"name": "20978",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/20978"
|
"url": "http://secunia.com/advisories/20978"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1217",
|
"name": "1016461",
|
||||||
"refsource" : "SREASON",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://securityreason.com/securityalert/1217"
|
"url": "http://securitytracker.com/id?1016461"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18895",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/18895"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060707 PAPOO <=3RC3 sql injection / admin credentials disclosure",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/439518/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "papoo-internahilfe-xss(27639)",
|
"name": "papoo-internahilfe-xss(27639)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27639"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27639"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27117",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/27117"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1217",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/1217"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1993",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/1993"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,26 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://aluigi.altervista.org/adv/atrondos-adv.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://aluigi.altervista.org/adv/atrondos-adv.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "19015",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/19015"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-2836",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/2836"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21093",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21093"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1239",
|
"name": "1239",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
@ -81,6 +61,26 @@
|
|||||||
"name": "armagetron-nnetobject-dos(27787)",
|
"name": "armagetron-nnetobject-dos(27787)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27787"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27787"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21093",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21093"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-2836",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/2836"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://aluigi.altervista.org/adv/atrondos-adv.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://aluigi.altervista.org/adv/atrondos-adv.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "19015",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/19015"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2006-3740",
|
"ID": "CVE-2006-3740",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,19 +53,74 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060912 Multiple Vendor X Server CID-keyed Fonts 'scan_cidfont()' Integer Overflow Vulnerability",
|
"name": "23907",
|
||||||
"refsource" : "IDEFENSE",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=411"
|
"url": "http://secunia.com/advisories/23907"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20060912 rPSA-2006-0167-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
|
"name": "RHSA-2006:0666",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/445812/100/0/threaded"
|
"url": "http://www.redhat.com/support/errata/RHSA-2006-0666.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20070330 VMSA-2007-0002 VMware ESX security updates",
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-191.htm",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/464268/100/0/threaded"
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-191.htm"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21900",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21900"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2006:164",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:164"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21904",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21904"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2006:023",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21864",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21864"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21894",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21894"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-344-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/usn-344-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21889",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21889"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21908",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21908"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2006:0665",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2006-0665.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22141",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/22141"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-190.htm",
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-190.htm",
|
||||||
@ -73,9 +128,19 @@
|
|||||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-190.htm"
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-190.htm"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-191.htm",
|
"name": "ADV-2007-1171",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-191.htm"
|
"url": "http://www.vupen.com/english/advisories/2007/1171"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1193",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2006/dsa-1193"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22080",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/22080"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://issues.rpath.com/browse/RPL-614",
|
"name": "https://issues.rpath.com/browse/RPL-614",
|
||||||
@ -87,126 +152,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html"
|
"url": "http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-1193",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2006/dsa-1193"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200609-07",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-200609-07.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2006:164",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:164"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2006:0665",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0665.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2006:0666",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0666.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "102780",
|
|
||||||
"refsource" : "SUNALERT",
|
|
||||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102780-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2006:023",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-344-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/usn-344-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "19974",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/19974"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:9454",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9454"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-3581",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/3581"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-3582",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/3582"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-0322",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/0322"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-1171",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/1171"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1016828",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1016828"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21864",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21864"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21889",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21889"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21890",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21890"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21894",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21894"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21900",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21900"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21904",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21904"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21908",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21908"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21924",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21924"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "22141",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/22141"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "22332",
|
"name": "22332",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -217,31 +162,86 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/22560"
|
"url": "http://secunia.com/advisories/22560"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20070330 VMSA-2007-0002 VMware ESX security updates",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/464268/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "23033",
|
"name": "23033",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/23033"
|
"url": "http://secunia.com/advisories/23033"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "22080",
|
"name": "20060912 rPSA-2006-0167-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://secunia.com/advisories/22080"
|
"url": "http://www.securityfocus.com/archive/1/445812/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "23899",
|
"name": "20060912 Multiple Vendor X Server CID-keyed Fonts 'scan_cidfont()' Integer Overflow Vulnerability",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "IDEFENSE",
|
||||||
"url" : "http://secunia.com/advisories/23899"
|
"url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=411"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "23907",
|
"name": "oval:org.mitre.oval:def:9454",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "OVAL",
|
||||||
"url" : "http://secunia.com/advisories/23907"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9454"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-200609-07",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-200609-07.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "102780",
|
||||||
|
"refsource": "SUNALERT",
|
||||||
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102780-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "24636",
|
"name": "24636",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/24636"
|
"url": "http://secunia.com/advisories/24636"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-0322",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/0322"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21890",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21890"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "19974",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/19974"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1016828",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1016828"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-3581",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/3581"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21924",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21924"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-3582",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/3582"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23899",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/23899"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "xorg-server-scancidfont-overflow(28890)",
|
"name": "xorg-server-scancidfont-overflow(28890)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -53,25 +53,25 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21240386",
|
"name": "1016516",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21240386"
|
"url": "http://securitytracker.com/id?1016516"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21243602",
|
"name": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21243602",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21243602"
|
"url": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21243602"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1016516",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1016516"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1016819",
|
"name": "1016819",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1016819"
|
"url": "http://securitytracker.com/id?1016819"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21240386",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21240386"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "21096",
|
"name": "21096",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20061225 HLStats Remote SQL Injection Exploit",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/455305/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "3002",
|
"name": "3002",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/3002"
|
"url": "https://www.exploit-db.com/exploits/3002"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "21740",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/21740"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "2064",
|
"name": "2064",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/2064"
|
"url": "http://securityreason.com/securityalert/2064"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20061225 HLStats Remote SQL Injection Exploit",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/455305/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21740",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/21740"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://ez.no/download/ez_publish/changelogs/ez_publish_3_8/changelog_3_8_4_to_3_8_5"
|
"url": "http://ez.no/download/ez_publish/changelogs/ez_publish_3_8/changelog_3_8_4_to_3_8_5"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://ez.no/download/ez_publish/changelogs/ez_publish_3_9/changelog_3_8_0_to_3_9_0",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://ez.no/download/ez_publish/changelogs/ez_publish_3_9/changelog_3_8_0_to_3_9_0"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://issues.ez.no/8795",
|
"name": "http://issues.ez.no/8795",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://issues.ez.no/8795"
|
"url": "http://issues.ez.no/8795"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://ez.no/download/ez_publish/changelogs/ez_publish_3_9/changelog_3_8_0_to_3_9_0",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://ez.no/download/ez_publish/changelogs/ez_publish_3_9/changelog_3_8_0_to_3_9_0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security_alert@emc.com",
|
||||||
"ID": "CVE-2011-0321",
|
"ID": "CVE-2011-0321",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,31 +52,36 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20110126 ESA-2011-003: EMC NetWorker librpc.dll spoofing vulnerability.",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2011-01/0162.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://archives.neohapsis.com/archives/bugtraq/2011-01/att-0162/ESA-2011-003.txt",
|
"name": "http://archives.neohapsis.com/archives/bugtraq/2011-01/att-0162/ESA-2011-003.txt",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2011-01/att-0162/ESA-2011-003.txt"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2011-01/att-0162/ESA-2011-003.txt"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1025010",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1025010"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "46044",
|
"name": "46044",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/46044"
|
"url": "http://www.securityfocus.com/bid/46044"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "networker-librpc-security-bypass(64997)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64997"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20110126 ESA-2011-003: EMC NetWorker librpc.dll spoofing vulnerability.",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2011-01/0162.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "70686",
|
"name": "70686",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/70686"
|
"url": "http://www.osvdb.org/70686"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1025010",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1025010"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "43113",
|
"name": "43113",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -86,11 +91,6 @@
|
|||||||
"name": "ADV-2011-0241",
|
"name": "ADV-2011-0241",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2011/0241"
|
"url": "http://www.vupen.com/english/advisories/2011/0241"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "networker-librpc-security-bypass(64997)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64997"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||||
"ID": "CVE-2011-0335",
|
"ID": "CVE-2011-0335",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://code.google.com/p/chromium/issues/detail?id=66931"
|
"url": "http://code.google.com/p/chromium/issues/detail?id=66931"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:14243",
|
"name": "oval:org.mitre.oval:def:14243",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14243"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14243"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2011-1240",
|
"ID": "CVE-2011-1240",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
|
"name": "TA11-102A",
|
||||||
"refsource" : "MISC",
|
"refsource": "CERT",
|
||||||
"url" : "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.avaya.com/css/P8/documents/100133352",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.avaya.com/css/P8/documents/100133352"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MS11-034",
|
"name": "MS11-034",
|
||||||
@ -68,9 +63,9 @@
|
|||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "TA11-102A",
|
"name": "ADV-2011-0952",
|
||||||
"refsource" : "CERT",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
|
"url": "http://www.vupen.com/english/advisories/2011/0952"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "47217",
|
"name": "47217",
|
||||||
@ -78,9 +73,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/47217"
|
"url": "http://www.securityfocus.com/bid/47217"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "71755",
|
"name": "http://support.avaya.com/css/P8/documents/100133352",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://osvdb.org/71755"
|
"url": "http://support.avaya.com/css/P8/documents/100133352"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:12547",
|
"name": "oval:org.mitre.oval:def:12547",
|
||||||
@ -88,9 +83,9 @@
|
|||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12547"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12547"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1025345",
|
"name": "71755",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.securitytracker.com/id?1025345"
|
"url": "http://osvdb.org/71755"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "44156",
|
"name": "44156",
|
||||||
@ -98,14 +93,19 @@
|
|||||||
"url": "http://secunia.com/advisories/44156"
|
"url": "http://secunia.com/advisories/44156"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2011-0952",
|
"name": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/0952"
|
"url": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "mswin-win32k-var28-priv-escalation(66422)",
|
"name": "mswin-win32k-var28-priv-escalation(66422)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66422"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66422"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1025345",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1025345"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-1922",
|
"ID": "CVE-2011-1922",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,40 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://unbound.nlnetlabs.nl/downloads/CVE-2011-1922.txt",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://unbound.nlnetlabs.nl/downloads/CVE-2011-1922.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2011-7555",
|
"name": "FEDORA-2011-7555",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061243.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061243.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "VU#531342",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/531342"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "47986",
|
"name": "47986",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/47986"
|
"url": "http://www.securityfocus.com/bid/47986"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "72750",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/72750"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "44865",
|
"name": "44865",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/44865"
|
"url": "http://secunia.com/advisories/44865"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "72750",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/72750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#531342",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/531342"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "unbound-dns-dos(67645)",
|
"name": "unbound-dns-dos(67645)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67645"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67645"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://unbound.nlnetlabs.nl/downloads/CVE-2011-1922.txt",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://unbound.nlnetlabs.nl/downloads/CVE-2011-1922.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "hp-security-alert@hp.com",
|
||||||
"ID": "CVE-2011-3167",
|
"ID": "CVE-2011-3167",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "HPSBMU02712",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=132017799623289&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT100649",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=132017799623289&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1026260",
|
"name": "1026260",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1026260"
|
"url": "http://www.securitytracker.com/id?1026260"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBMU02712",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=132017799623289&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "8484",
|
"name": "8484",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/8484"
|
"url": "http://securityreason.com/securityalert/8484"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT100649",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=132017799623289&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2011-3897",
|
"ID": "CVE-2011-3897",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=102242",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=102242"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://googlechromereleases.blogspot.com/2011/11/stable-channel-update.html",
|
"name": "http://googlechromereleases.blogspot.com/2011/11/stable-channel-update.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://googlechromereleases.blogspot.com/2011/11/stable-channel-update.html"
|
"url": "http://googlechromereleases.blogspot.com/2011/11/stable-channel-update.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2012-03-07-1",
|
"name": "1026774",
|
||||||
"refsource" : "APPLE",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html"
|
"url": "http://www.securitytracker.com/id?1026774"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2012-03-07-2",
|
"name": "http://code.google.com/p/chromium/issues/detail?id=102242",
|
||||||
"refsource" : "APPLE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html"
|
"url": "http://code.google.com/p/chromium/issues/detail?id=102242"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "48377",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/48377"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "apple-webkit-cve20113897-code-execution(73806)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73806"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "46933",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/46933"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2012-03-12-1",
|
"name": "APPLE-SA-2012-03-12-1",
|
||||||
@ -82,35 +92,25 @@
|
|||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14250"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14250"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1026774",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1026774"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "46933",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/46933"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "48274",
|
"name": "48274",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/48274"
|
"url": "http://secunia.com/advisories/48274"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2012-03-07-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "48288",
|
"name": "48288",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/48288"
|
"url": "http://secunia.com/advisories/48288"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "48377",
|
"name": "APPLE-SA-2012-03-07-2",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "APPLE",
|
||||||
"url" : "http://secunia.com/advisories/48377"
|
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "apple-webkit-cve20113897-code-execution(73806)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73806"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-4309",
|
"ID": "CVE-2011-4309",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://git.moodle.org/gw?p=moodle.git;a=commit;h=5eb1cec34f013fdcb559b66bc401f2845ce0bbb7",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.moodle.org/gw?p=moodle.git;a=commit;h=5eb1cec34f013fdcb559b66bc401f2845ce0bbb7"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://moodle.org/mod/forum/discuss.php?d=188323",
|
"name": "http://moodle.org/mod/forum/discuss.php?d=188323",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://moodle.org/mod/forum/discuss.php?d=188323"
|
"url": "http://moodle.org/mod/forum/discuss.php?d=188323"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=5eb1cec34f013fdcb559b66bc401f2845ce0bbb7",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=5eb1cec34f013fdcb559b66bc401f2845ce0bbb7"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=747444",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-4583",
|
"ID": "CVE-2011-4583",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28670&sr=1",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28670&sr=1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://moodle.org/mod/forum/discuss.php?d=191750",
|
"name": "http://moodle.org/mod/forum/discuss.php?d=191750",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761248",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28670&sr=1",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28670&sr=1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "plesk-rfc-info-disclosure(72094)",
|
"name": "plesk-rfc-info-disclosure(72094)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72094"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72094"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-1964",
|
"ID": "CVE-2013-1964",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,35 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "59293",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/59293"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "55082",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/55082"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130418 Xen Security Advisory 50 (CVE-2013-1964) - grant table hypercall acquire/release imbalance",
|
"name": "[oss-security] 20130418 Xen Security Advisory 50 (CVE-2013-1964) - grant table hypercall acquire/release imbalance",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/04/18/9"
|
"url": "http://www.openwall.com/lists/oss-security/2013/04/18/9"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-2666",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2013/dsa-2666"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2013-6723",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201309-24",
|
"name": "GLSA-201309-24",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
|
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2014:0446",
|
"name": "DSA-2666",
|
||||||
"refsource" : "SUSE",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
|
"url": "http://www.debian.org/security/2013/dsa-2666"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "59293",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/59293"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1028459",
|
"name": "1028459",
|
||||||
@ -88,9 +83,14 @@
|
|||||||
"url": "http://www.securitytracker.com/id/1028459"
|
"url": "http://www.securitytracker.com/id/1028459"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "55082",
|
"name": "SUSE-SU-2014:0446",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "SUSE",
|
||||||
"url" : "http://secunia.com/advisories/55082"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2013-6723",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2013-5077",
|
"ID": "CVE-2013-5077",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@mozilla.org",
|
||||||
"ID": "CVE-2013-5612",
|
"ID": "CVE-2013-5612",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,19 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-106.html",
|
"name": "64205",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-106.html"
|
"url": "http://www.securityfocus.com/bid/64205"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=871161",
|
"name": "SUSE-SU-2013:1919",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=871161"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2013-23127",
|
"name": "FEDORA-2013-23127",
|
||||||
@ -77,25 +72,25 @@
|
|||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1029470",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1029470"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2013:1917",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201504-01",
|
"name": "GLSA-201504-01",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201504-01"
|
"url": "https://security.gentoo.org/glsa/201504-01"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2013:1812",
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1812.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2014:0008",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2013:1919",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1916",
|
"name": "openSUSE-SU-2013:1916",
|
||||||
@ -103,9 +98,24 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2013:1917",
|
"name": "openSUSE-SU-2014:0008",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1029476",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1029476"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-106.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-106.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=871161",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=871161"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1918",
|
"name": "openSUSE-SU-2013:1918",
|
||||||
@ -118,19 +128,9 @@
|
|||||||
"url": "http://www.ubuntu.com/usn/USN-2052-1"
|
"url": "http://www.ubuntu.com/usn/USN-2052-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "64205",
|
"name": "RHSA-2013:1812",
|
||||||
"refsource" : "BID",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.securityfocus.com/bid/64205"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1812.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1029470",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1029470"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1029476",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1029476"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2013-5996",
|
"ID": "CVE-2013-5996",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://svn.ec-cube.net/open_trac/changeset/23275",
|
"name": "JVNDB-2013-000107",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "JVNDB",
|
||||||
"url" : "http://svn.ec-cube.net/open_trac/changeset/23275"
|
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000107"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.ec-cube.net/info/weakness/weakness.php?id=55",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.ec-cube.net/info/weakness/weakness.php?id=55"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "JVN#06377589",
|
"name": "JVN#06377589",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://jvn.jp/en/jp/JVN06377589/index.html"
|
"url": "http://jvn.jp/en/jp/JVN06377589/index.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "JVNDB-2013-000107",
|
"name": "http://www.ec-cube.net/info/weakness/weakness.php?id=55",
|
||||||
"refsource" : "JVNDB",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000107"
|
"url": "http://www.ec-cube.net/info/weakness/weakness.php?id=55"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://svn.ec-cube.net/open_trac/changeset/23275",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://svn.ec-cube.net/open_trac/changeset/23275"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2014-2065",
|
"ID": "CVE-2014-2065",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20140220 Re: Possible CVE Requests: several issues fixed in Jenkins (Advisory 2014-02-14)",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2014/02/21/2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/jenkinsci/jenkins/commit/a0b00508eeb74d7033dc4100eb382df4e8fa72e7",
|
"name": "https://github.com/jenkinsci/jenkins/commit/a0b00508eeb74d7033dc4100eb382df4e8fa72e7",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/jenkinsci/jenkins/commit/a0b00508eeb74d7033dc4100eb382df4e8fa72e7"
|
"url": "https://github.com/jenkinsci/jenkins/commit/a0b00508eeb74d7033dc4100eb382df4e8fa72e7"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140220 Re: Possible CVE Requests: several issues fixed in Jenkins (Advisory 2014-02-14)",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2014/02/21/2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14",
|
"name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://issues.asterisk.org/jira/browse/ASTERISK-23340",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-23340"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://downloads.asterisk.org/pub/security/AST-2014-001-1.8.diff",
|
"name": "http://downloads.asterisk.org/pub/security/AST-2014-001-1.8.diff",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -63,9 +68,14 @@
|
|||||||
"url": "http://downloads.asterisk.org/pub/security/AST-2014-001.html"
|
"url": "http://downloads.asterisk.org/pub/security/AST-2014-001.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://issues.asterisk.org/jira/browse/ASTERISK-23340",
|
"name": "66093",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "https://issues.asterisk.org/jira/browse/ASTERISK-23340"
|
"url": "http://www.securityfocus.com/bid/66093"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2014:078",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:078"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2014-3762",
|
"name": "FEDORA-2014-3762",
|
||||||
@ -76,16 +86,6 @@
|
|||||||
"name": "FEDORA-2014-3779",
|
"name": "FEDORA-2014-3779",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130400.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2014:078",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2014:078"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "66093",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/66093"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2014-2405",
|
"ID": "CVE-2014-2405",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "DSA-2912",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-2912"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-2191-1",
|
"name": "USN-2191-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2191-1"
|
"url": "http://www.ubuntu.com/usn/USN-2191-1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-2912",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2014/dsa-2912"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "58415",
|
"name": "58415",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20140429 Arbitrary code execution by admins in File Gallery 1.7.7 (WordPress plugin)",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://seclists.org/fulldisclosure/2014/Apr/305"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://wordpress.org/plugins/file-gallery/changelog/",
|
"name": "http://wordpress.org/plugins/file-gallery/changelog/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/67120"
|
"url": "http://www.securityfocus.com/bid/67120"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20140429 Arbitrary code execution by admins in File Gallery 1.7.7 (WordPress plugin)",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2014/Apr/305"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "67183",
|
"name": "67183",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "57893",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/57893"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://labs.davidsopas.com/2014/04/phplist-csrf-on-subscription-page.html",
|
"name": "http://labs.davidsopas.com/2014/04/phplist-csrf-on-subscription-page.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -66,11 +71,6 @@
|
|||||||
"name": "1030191",
|
"name": "1030191",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1030191"
|
"url": "http://www.securitytracker.com/id/1030191"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "57893",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/57893"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-6719",
|
"ID": "CVE-2014-6719",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#418025",
|
"name": "VU#418025",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-6784",
|
"ID": "CVE-2014-6784",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#515705",
|
"name": "VU#515705",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-6841",
|
"ID": "CVE-2014-6841",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "VU#582497",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "VU#201457",
|
"name": "VU#201457",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/201457"
|
"url": "http://www.kb.cert.org/vuls/id/201457"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#582497",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/582497"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-6925",
|
"ID": "CVE-2014-6925",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
"name": "VU#625705",
|
||||||
"refsource" : "MISC",
|
"refsource": "CERT-VN",
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
"url": "http://www.kb.cert.org/vuls/id/625705"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#625705",
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/625705"
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2014-7935",
|
"ID": "CVE-2014-7935",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,55 +52,55 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "62665",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/62665"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
|
"name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
|
"url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=402957",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=402957"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://codereview.chromium.org/692203002",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://codereview.chromium.org/692203002"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201502-13",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-201502-13.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:0093",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:0441",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "72288",
|
"name": "72288",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/72288"
|
"url": "http://www.securityfocus.com/bid/72288"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201502-13",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=402957",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=402957"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1031623",
|
"name": "1031623",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1031623"
|
"url": "http://www.securitytracker.com/id/1031623"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://codereview.chromium.org/692203002",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://codereview.chromium.org/692203002"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:0441",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:0093",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "62383",
|
"name": "62383",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/62383"
|
"url": "http://secunia.com/advisories/62383"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "62665",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/62665"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1038668",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1038668"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0260",
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0260",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "98810",
|
"name": "98810",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/98810"
|
"url": "http://www.securityfocus.com/bid/98810"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1038668",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1038668"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2017-0476",
|
"ID": "CVE-2017-0476",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -66,15 +66,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "96756",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/96756"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1037968",
|
"name": "1037968",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1037968"
|
"url": "http://www.securitytracker.com/id/1037968"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "96756",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/96756"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2017-0527",
|
"ID": "CVE-2017-0527",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -60,15 +60,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "96949",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/96949"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1037968",
|
"name": "1037968",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1037968"
|
"url": "http://www.securitytracker.com/id/1037968"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "96949",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/96949"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.414395",
|
"DATE_ASSIGNED": "2017-08-22T17:29:33.414395",
|
||||||
"ID": "CVE-2017-1000191",
|
"ID": "CVE-2017-1000191",
|
||||||
"REQUESTER": "ydahhrk@gmail.com",
|
"REQUESTER": "ydahhrk@gmail.com",
|
||||||
@ -13,18 +13,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "Jool",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "3.5.0 - 3.5.1"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "NIC Mexico"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -46,7 +46,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "Buffer Overflow"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4020",
|
"ID": "CVE-2017-4020",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -53,14 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20170107 Re: Firejail local root exploit",
|
"name": "97385",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2017/01/07/6"
|
"url": "http://www.securityfocus.com/bid/97385"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://firejail.wordpress.com/download-2/release-notes/",
|
"name": "GLSA-201701-62",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "GENTOO",
|
||||||
"url" : "https://firejail.wordpress.com/download-2/release-notes/"
|
"url": "https://security.gentoo.org/glsa/201701-62"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/netblue30/firejail/commit/5d43fdcd215203868d440ffc42036f5f5ffc89fc",
|
"name": "https://github.com/netblue30/firejail/commit/5d43fdcd215203868d440ffc42036f5f5ffc89fc",
|
||||||
@ -73,14 +73,14 @@
|
|||||||
"url": "https://github.com/netblue30/firejail/issues/1023"
|
"url": "https://github.com/netblue30/firejail/issues/1023"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201701-62",
|
"name": "https://firejail.wordpress.com/download-2/release-notes/",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://security.gentoo.org/glsa/201701-62"
|
"url": "https://firejail.wordpress.com/download-2/release-notes/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "97385",
|
"name": "[oss-security] 20170107 Re: Firejail local root exploit",
|
||||||
"refsource" : "BID",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.securityfocus.com/bid/97385"
|
"url": "http://www.openwall.com/lists/oss-security/2017/01/07/6"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,19 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20170201 Multiple memory access issues in gstreamer",
|
"name": "96001",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2017/02/01/7"
|
"url": "http://www.securityfocus.com/bid/96001"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3819",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2017/dsa-3819"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2017:2060",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2017:2060"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20170202 Re: Multiple memory access issues in gstreamer",
|
"name": "[oss-security] 20170202 Re: Multiple memory access issues in gstreamer",
|
||||||
@ -72,25 +82,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3"
|
"url": "https://gstreamer.freedesktop.org/releases/1.10/#1.10.3"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "DSA-3819",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2017/dsa-3819"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201705-10",
|
"name": "GLSA-201705-10",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201705-10"
|
"url": "https://security.gentoo.org/glsa/201705-10"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2017:2060",
|
"name": "[oss-security] 20170201 Multiple memory access issues in gstreamer",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "MLIST",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2060"
|
"url": "http://www.openwall.com/lists/oss-security/2017/02/01/7"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "96001",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/96001"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user