mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
68f102a273
commit
cbb8f287bd
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-1999-1310",
|
"ID": "CVE-1999-1310",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/142808"
|
"url": "http://www.securityfocus.com/archive/1/142808"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1890",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/1890"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "fw1-login-response(5816)",
|
"name": "fw1-login-response(5816)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "1632",
|
"name": "1632",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/1632"
|
"url": "http://www.osvdb.org/1632"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1890",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/1890"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20050724 ECI router login bypass",
|
"name": "16205",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=112230649106740&w=2"
|
"url": "http://secunia.com/advisories/16205"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "14364",
|
"name": "14364",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/14364"
|
"url": "http://www.securityfocus.com/bid/14364"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "16205",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/16205"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "eci-router-login-security-bypass(21521)",
|
"name": "eci-router-login-security-bypass(21521)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21521"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21521"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20050724 ECI router login bypass",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=112230649106740&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,36 +52,36 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20050905 Vulnerability in myBloggie 2.1.3-beta and prior",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=112607358831963&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://mywebland.com/forums/showtopic.php?t=399",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://mywebland.com/forums/showtopic.php?t=399"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20051211 [PHP-CHECKER] 99 potential SQL injection vulnerabilities",
|
"name": "20051211 [PHP-CHECKER] 99 potential SQL injection vulnerabilities",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/419280/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/419280/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://glide.stanford.edu/yichen/research/sec.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://glide.stanford.edu/yichen/research/sec.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "14739",
|
"name": "14739",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/14739"
|
"url": "http://www.securityfocus.com/bid/14739"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://mywebland.com/forums/showtopic.php?t=399",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://mywebland.com/forums/showtopic.php?t=399"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://glide.stanford.edu/yichen/research/sec.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://glide.stanford.edu/yichen/research/sec.pdf"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "16699",
|
"name": "16699",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/16699"
|
"url": "http://secunia.com/advisories/16699"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20050905 Vulnerability in myBloggie 2.1.3-beta and prior",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=112607358831963&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "mybloggie-login-sql-injection(22162)",
|
"name": "mybloggie-login-sql-injection(22162)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2005-2871",
|
"ID": "CVE-2005-2871",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,39 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20050909 Mozilla Firefox \"Host:\" Buffer Overflow",
|
"name": "VU#573857",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "CERT-VN",
|
||||||
"url" : "http://marc.info/?l=full-disclosure&m=112624614008387&w=2"
|
"url": "http://www.kb.cert.org/vuls/id/573857"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.security-protocols.com/firefox-death.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.security-protocols.com/firefox-death.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.security-protocols.com/advisory/sp-x17-advisory.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.security-protocols.com/advisory/sp-x17-advisory.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20050911 FireFox \"Host:\" Buffer Overflow is not just exploitable on FireFox",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0316.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.mozilla.org/security/announce/mfsa2005-57.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.mozilla.org/security/announce/mfsa2005-57.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=307259",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=307259"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-837",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2005/dsa-837"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-868",
|
"name": "DSA-868",
|
||||||
@ -93,9 +63,9 @@
|
|||||||
"url": "http://www.debian.org/security/2005/dsa-868"
|
"url": "http://www.debian.org/security/2005/dsa-868"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-866",
|
"name": "ADV-2005-1824",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.debian.org/security/2005/dsa-866"
|
"url": "http://www.vupen.com/english/advisories/2005/1824"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FLSA-2006:168375",
|
"name": "FLSA-2006:168375",
|
||||||
@ -103,29 +73,44 @@
|
|||||||
"url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00004.html"
|
"url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00004.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-200509-11",
|
"name": "ADV-2005-1690",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200509-11.xml"
|
"url": "http://www.vupen.com/english/advisories/2005/1690"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "MDKSA-2005:174",
|
"name": "83",
|
||||||
"refsource" : "MANDRIVA",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:174"
|
"url": "http://securityreason.com/securityalert/83"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2005:768",
|
"name": "16767",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-768.html"
|
"url": "http://secunia.com/advisories/16767"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2005:769",
|
"name": "oval:org.mitre.oval:def:1287",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "OVAL",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-769.html"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1287"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2005:791",
|
"name": "ADV-2005-1691",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-791.html"
|
"url": "http://www.vupen.com/english/advisories/2005/1691"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "16764",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/16764"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-837",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2005/dsa-837"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:584",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A584"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-181-1",
|
"name": "USN-181-1",
|
||||||
@ -133,19 +118,14 @@
|
|||||||
"url": "http://www.ubuntu.com/usn/usn-181-1"
|
"url": "http://www.ubuntu.com/usn/usn-181-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#573857",
|
"name": "RHSA-2005:791",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/573857"
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-791.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "P-303",
|
"name": "17042",
|
||||||
"refsource" : "CIAC",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.ciac.org/ciac/bulletins/p-303.shtml"
|
"url": "http://secunia.com/advisories/17042"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.securiteam.com/securitynews/5RP0B0UGVW.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.securiteam.com/securitynews/5RP0B0UGVW.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "14784",
|
"name": "14784",
|
||||||
@ -158,34 +138,29 @@
|
|||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9608"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9608"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2005-1690",
|
"name": "16766",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2005/1690"
|
"url": "http://secunia.com/advisories/16766"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2005-1691",
|
"name": "DSA-866",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2005/1691"
|
"url": "http://www.debian.org/security/2005/dsa-866"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2005-1824",
|
"name": "http://www.security-protocols.com/advisory/sp-x17-advisory.txt",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2005/1824"
|
"url": "http://www.security-protocols.com/advisory/sp-x17-advisory.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "19255",
|
"name": "20050911 FireFox \"Host:\" Buffer Overflow is not just exploitable on FireFox",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "FULLDISC",
|
||||||
"url" : "http://www.osvdb.org/19255"
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0316.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oval:org.mitre.oval:def:1287",
|
"name": "RHSA-2005:769",
|
||||||
"refsource" : "OVAL",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1287"
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-769.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:584",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A584"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1014877",
|
"name": "1014877",
|
||||||
@ -193,44 +168,69 @@
|
|||||||
"url": "http://securitytracker.com/id?1014877"
|
"url": "http://securitytracker.com/id?1014877"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "16764",
|
"name": "http://www.mozilla.org/security/announce/mfsa2005-57.html",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/16764"
|
"url": "http://www.mozilla.org/security/announce/mfsa2005-57.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "16766",
|
"name": "http://www.securiteam.com/securitynews/5RP0B0UGVW.html",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url" : "http://secunia.com/advisories/16766"
|
"url": "http://www.securiteam.com/securitynews/5RP0B0UGVW.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "16767",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/16767"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17042",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/17042"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17090",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/17090"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "17284",
|
"name": "17284",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/17284"
|
"url": "http://secunia.com/advisories/17284"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "19255",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/19255"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "17263",
|
"name": "17263",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/17263"
|
"url": "http://secunia.com/advisories/17263"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "83",
|
"name": "RHSA-2005:768",
|
||||||
"refsource" : "SREASON",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://securityreason.com/securityalert/83"
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-768.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "P-303",
|
||||||
|
"refsource": "CIAC",
|
||||||
|
"url": "http://www.ciac.org/ciac/bulletins/p-303.shtml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-200509-11",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200509-11.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.security-protocols.com/firefox-death.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.security-protocols.com/firefox-death.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=307259",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=307259"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2005:174",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:174"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "17090",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/17090"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20050909 Mozilla Firefox \"Host:\" Buffer Overflow",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://marc.info/?l=full-disclosure&m=112624614008387&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "mozilla-url-bo(22207)",
|
"name": "mozilla-url-bo(22207)",
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20070222 WebSpell > 4.0 Authentication Bypass and arbitrary code execution",
|
"name": "webspell-login-sql-injection(32669)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/460937/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32669"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "2337",
|
"name": "2337",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://securityreason.com/securityalert/2337"
|
"url": "http://securityreason.com/securityalert/2337"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "webspell-login-sql-injection(32669)",
|
"name": "20070222 WebSpell > 4.0 Authentication Bypass and arbitrary code execution",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32669"
|
"url": "http://www.securityfocus.com/archive/1/460937/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/4435"
|
"url": "https://www.exploit-db.com/exploits/4435"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "25746",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/25746"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "41904",
|
"name": "41904",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "flip-account-unauthorized-access(36709)",
|
"name": "flip-account-unauthorized-access(36709)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36709"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36709"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25746",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/25746"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "ca-brightstor-csagent-bo(36825)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36825"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "26914",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/26914"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20070927 Computer Associates BrightStor HSM r11.5 Multiple Vulnerabilities",
|
"name": "20070927 Computer Associates BrightStor HSM r11.5 Multiple Vulnerabilities",
|
||||||
"refsource": "IDEFENSE",
|
"refsource": "IDEFENSE",
|
||||||
@ -63,14 +73,9 @@
|
|||||||
"url": "http://www.securityfocus.com/archive/1/480808/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/480808/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://supportconnectw.ca.com/public/bstorhsm/infodocs/bstorhsm-secnot.asp",
|
"name": "ADV-2007-3275",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://supportconnectw.ca.com/public/bstorhsm/infodocs/bstorhsm-secnot.asp"
|
"url": "http://www.vupen.com/english/advisories/2007/3275"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35690",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35690"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://dvlabs.tippingpoint.com/advisory/TPTI-07-16",
|
"name": "http://dvlabs.tippingpoint.com/advisory/TPTI-07-16",
|
||||||
@ -83,24 +88,19 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/25823"
|
"url": "http://www.securityfocus.com/bid/25823"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2007-3275",
|
"name": "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35690",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/3275"
|
"url": "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35690"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://supportconnectw.ca.com/public/bstorhsm/infodocs/bstorhsm-secnot.asp",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://supportconnectw.ca.com/public/bstorhsm/infodocs/bstorhsm-secnot.asp"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1018747",
|
"name": "1018747",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1018747"
|
"url": "http://securitytracker.com/id?1018747"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "26914",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/26914"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ca-brightstor-csagent-bo(36825)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36825"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,31 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20080409 [CVE-2007-5301] alsaplayer PoC - exploit",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/490671/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "5424",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/5424"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.wekk.net/research/CVE-2007-5301/CVE-2007-5301-exploit.sh",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.wekk.net/research/CVE-2007-5301/CVE-2007-5301-exploit.sh"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://sourceforge.net/forum/forum.php?forum_id=742584",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://sourceforge.net/forum/forum.php?forum_id=742584"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=544663&group_id=249",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=544663&group_id=249"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-1538",
|
"name": "DSA-1538",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
@ -87,25 +62,50 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/25969"
|
"url": "http://www.securityfocus.com/bid/25969"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2007-3393",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/3393"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "27117",
|
"name": "27117",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/27117"
|
"url": "http://secunia.com/advisories/27117"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "5424",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/5424"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "alsaplayer-vorbis-input-bo(36996)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36996"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080409 [CVE-2007-5301] alsaplayer PoC - exploit",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/490671/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "29680",
|
"name": "29680",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/29680"
|
"url": "http://secunia.com/advisories/29680"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "alsaplayer-vorbis-input-bo(36996)",
|
"name": "http://sourceforge.net/forum/forum.php?forum_id=742584",
|
||||||
"refsource" : "XF",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36996"
|
"url": "http://sourceforge.net/forum/forum.php?forum_id=742584"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.wekk.net/research/CVE-2007-5301/CVE-2007-5301-exploit.sh",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.wekk.net/research/CVE-2007-5301/CVE-2007-5301-exploit.sh"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-3393",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/3393"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://sourceforge.net/project/shownotes.php?release_id=544663&group_id=249",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=544663&group_id=249"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,26 +57,16 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://sourceforge.net/project/shownotes.php?group_id=94142&release_id=547866"
|
"url": "http://sourceforge.net/project/shownotes.php?group_id=94142&release_id=547866"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "26115",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/26115"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-3539",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/3539"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "41804",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/41804"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "41805",
|
"name": "41805",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/41805"
|
"url": "http://osvdb.org/41805"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "27287",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/27287"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "41806",
|
"name": "41806",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -88,14 +78,24 @@
|
|||||||
"url": "http://osvdb.org/41807"
|
"url": "http://osvdb.org/41807"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "27287",
|
"name": "41804",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://secunia.com/advisories/27287"
|
"url": "http://osvdb.org/41804"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "miranda-im-multiple-bo(37291)",
|
"name": "miranda-im-multiple-bo(37291)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37291"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37291"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-3539",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/3539"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "26115",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/26115"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "minibb-table-sql-injection(38152)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38152"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "4587",
|
"name": "4587",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -66,11 +71,6 @@
|
|||||||
"name": "26249",
|
"name": "26249",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/26249"
|
"url": "http://www.securityfocus.com/bid/26249"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "minibb-table-sql-injection(38152)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38152"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "8965",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/8965"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "35385",
|
"name": "35385",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/35385"
|
"url": "http://www.securityfocus.com/bid/35385"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "8965",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/8965"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2009-2496",
|
"ID": "CVE-2009-2496",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "MS09-043",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-043"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "TA09-223A",
|
"name": "TA09-223A",
|
||||||
"refsource": "CERT",
|
"refsource": "CERT",
|
||||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-223A.html"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA09-223A.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1022708",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1022708"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:5645",
|
"name": "oval:org.mitre.oval:def:5645",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5645"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5645"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1022708",
|
"name": "MS09-043",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MS",
|
||||||
"url" : "http://www.securitytracker.com/id?1022708"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-043"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT3865",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT3865"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2009-09-10-2",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "36361",
|
"name": "36361",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -72,6 +62,16 @@
|
|||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/57954"
|
"url": "http://osvdb.org/57954"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2009-09-10-2",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT3865",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT3865"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "36701",
|
"name": "36701",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2015-0028",
|
"ID": "CVE-2015-0028",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1031723",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1031723"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "MS15-009",
|
"name": "MS15-009",
|
||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "72442",
|
"name": "72442",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/72442"
|
"url": "http://www.securityfocus.com/bid/72442"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1031723",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1031723"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@suse.com",
|
||||||
"ID": "CVE-2015-0795",
|
"ID": "CVE-2015-0795",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -54,28 +54,28 @@
|
|||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name": "20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)",
|
"name": "20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "FULLDISC",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/535679/100/0/threaded"
|
"url": "http://seclists.org/fulldisclosure/2015/Jun/8"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)",
|
"name": "20150603 [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://seclists.org/fulldisclosure/2015/Jun/8"
|
"url": "http://www.securityfocus.com/archive/1/535679/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html",
|
"name": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html"
|
"url": "http://packetstormsecurity.com/files/132138/SysAid-Help-Desk-14.4-Code-Execution-Denial-Of-Service-Traversal-SQL-Injection.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "75038",
|
"name": "75038",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/75038"
|
"url": "http://www.securityfocus.com/bid/75038"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.sysaid.com/blog/entry/sysaid-15-2-your-voice-your-service-desk"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "37112",
|
"name": "121304",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "OSVDB",
|
||||||
"url" : "https://www.exploit-db.com/exploits/37112/"
|
"url": "http://www.osvdb.org/121304"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://wordpress.org/plugins/church-admin/changelog/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://wordpress.org/plugins/church-admin/changelog/"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "74782",
|
"name": "74782",
|
||||||
@ -73,9 +63,19 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/74782"
|
"url": "http://www.securityfocus.com/bid/74782"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "121304",
|
"name": "https://wordpress.org/plugins/church-admin/changelog/",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.osvdb.org/121304"
|
"url": "https://wordpress.org/plugins/church-admin/changelog/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "37112",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/37112/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20150509 Re: CVE request: vulnerability in wpa_supplicant and hostapd",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2015/05/09/6"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20150531 Re: CVE request: vulnerability in wpa_supplicant and hostapd",
|
"name": "[oss-security] 20150531 Re: CVE request: vulnerability in wpa_supplicant and hostapd",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2015/05/31/6"
|
"url": "http://www.openwall.com/lists/oss-security/2015/05/31/6"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-3397",
|
"name": "DSA-3397",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
@ -77,15 +67,25 @@
|
|||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201606-17"
|
"url": "https://security.gentoo.org/glsa/201606-17"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2650-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2650-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2015:1030",
|
"name": "openSUSE-SU-2015:1030",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-2650-1",
|
"name": "[oss-security] 20150509 Re: CVE request: vulnerability in wpa_supplicant and hostapd",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2650-1"
|
"url": "http://www.openwall.com/lists/oss-security/2015/05/09/6"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2015-4792",
|
"ID": "CVE-2015-4792",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,54 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
|
"name": "openSUSE-SU-2015:2244",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3385",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3385"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3377",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3377"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2016-e30164d0a2",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:0534",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0534.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:0705",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1132",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1132"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:1480",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1480.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:1481",
|
"name": "RHSA-2016:1481",
|
||||||
@ -108,39 +63,84 @@
|
|||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1481.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1481.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2016:0296",
|
"name": "1033894",
|
||||||
"refsource" : "SUSE",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
|
"url": "http://www.securitytracker.com/id/1033894"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2016:0368",
|
"name": "RHSA-2016:1132",
|
||||||
"refsource" : "SUSE",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html"
|
"url": "https://access.redhat.com/errata/RHSA-2016:1132"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2015:2244",
|
"name": "RHSA-2016:0534",
|
||||||
"refsource" : "SUSE",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0534.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:2246",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2781-1",
|
"name": "USN-2781-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2781-1"
|
"url": "http://www.ubuntu.com/usn/USN-2781-1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:0296",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "77171",
|
"name": "77171",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/77171"
|
"url": "http://www.securityfocus.com/bid/77171"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1033894",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1033894"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:1480",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1480.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:2246",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3385",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2015/dsa-3385"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:0368",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3377",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2015/dsa-3377"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:0705",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-0705.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2016-e30164d0a2",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2015-4877",
|
"ID": "CVE-2015-4877",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,30 +57,30 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/536762/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/536762/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "38788",
|
"name": "38788",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/38788/"
|
"url": "https://www.exploit-db.com/exploits/38788/"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1033898",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1033898"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/134089/Oracle-Outside-In-Buffer-Overflow.html",
|
"name": "http://packetstormsecurity.com/files/134089/Oracle-Outside-In-Buffer-Overflow.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/134089/Oracle-Outside-In-Buffer-Overflow.html"
|
"url": "http://packetstormsecurity.com/files/134089/Oracle-Outside-In-Buffer-Overflow.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "77130",
|
"name": "77130",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/77130"
|
"url": "http://www.securityfocus.com/bid/77130"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1033898",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1033898"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2015-4891",
|
"ID": "CVE-2015-4891",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2015-8051",
|
"ID": "CVE-2015-8051",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,9 +58,9 @@
|
|||||||
"url": "http://www.securityfocus.com/archive/1/536928/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/536928/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20151118 Adobe Premiere Clip v1.1.1 iOS - (cid:x) Filter Bypass & Persistent Software Vulnerability",
|
"name": "https://helpx.adobe.com/security/products/premiereclip/apsb15-31.html",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://seclists.org/fulldisclosure/2015/Nov/81"
|
"url": "https://helpx.adobe.com/security/products/premiereclip/apsb15-31.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.vulnerability-lab.com/get_content.php?id=1478",
|
"name": "http://www.vulnerability-lab.com/get_content.php?id=1478",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://www.vulnerability-lab.com/get_content.php?id=1478"
|
"url": "http://www.vulnerability-lab.com/get_content.php?id=1478"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://helpx.adobe.com/security/products/premiereclip/apsb15-31.html",
|
"name": "20151118 Adobe Premiere Clip v1.1.1 iOS - (cid:x) Filter Bypass & Persistent Software Vulnerability",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "FULLDISC",
|
||||||
"url" : "https://helpx.adobe.com/security/products/premiereclip/apsb15-31.html"
|
"url": "http://seclists.org/fulldisclosure/2015/Nov/81"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "77624",
|
"name": "77624",
|
||||||
|
@ -58,9 +58,14 @@
|
|||||||
"url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
|
"url": "http://www.openwall.com/lists/oss-security/2015/11/29/1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
|
"name": "82990",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
|
"url": "http://www.securityfocus.com/bid/82990"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2015-eb896290d3",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
|
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731",
|
||||||
@ -73,19 +78,14 @@
|
|||||||
"url": "https://bto.bluecoat.com/security-advisory/sa128"
|
"url": "https://bto.bluecoat.com/security-advisory/sa128"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "FEDORA-2015-eb896290d3",
|
"name": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup",
|
||||||
"refsource" : "FEDORA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html"
|
"url": "http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201607-02",
|
"name": "GLSA-201607-02",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201607-02"
|
"url": "https://security.gentoo.org/glsa/201607-02"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "82990",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/82990"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "79800",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/79800"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-617",
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-617",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html",
|
"name": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html"
|
"url": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "79800",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/79800"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2015-8776",
|
"ID": "CVE-2015-8776",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,69 +53,59 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[libc-alpha] 20160219 The GNU C Library version 2.23 is now available",
|
"name": "SUSE-SU-2016:0471",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SUSE",
|
||||||
"url" : "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20160119 CVE assignment request for security bugs fixed in glibc 2.23",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2016/01/19/11"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20160119 Re: CVE assignment request for security bugs fixed in glibc 2.23",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2016/01/20/1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=18985",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=18985"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3481",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3481"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3480",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3480"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2016-68abc0be35",
|
"name": "FEDORA-2016-68abc0be35",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "GLSA-201602-02",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201602-02"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201702-11",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201702-11"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2017:0680",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0680.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2017:1916",
|
"name": "RHSA-2017:1916",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2017:1916"
|
"url": "https://access.redhat.com/errata/RHSA-2017:1916"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3481",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3481"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:0510",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2016:0470",
|
"name": "SUSE-SU-2016:0470",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2016:0471",
|
"name": "RHSA-2017:0680",
|
||||||
"refsource" : "SUSE",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0680.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2985-2",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2985-2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20160119 Re: CVE assignment request for security bugs fixed in glibc 2.23",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2016/01/20/1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201702-11",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201702-11"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201602-02",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201602-02"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2016:0472",
|
"name": "SUSE-SU-2016:0472",
|
||||||
@ -128,24 +118,34 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2016:0510",
|
"name": "[libc-alpha] 20160219 The GNU C Library version 2.23 is now available",
|
||||||
"refsource" : "SUSE",
|
"refsource": "MLIST",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html"
|
"url": "https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-2985-1",
|
"name": "[oss-security] 20160119 CVE assignment request for security bugs fixed in glibc 2.23",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2985-1"
|
"url": "http://www.openwall.com/lists/oss-security/2016/01/19/11"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2985-2",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2985-2"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "83277",
|
"name": "83277",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/83277"
|
"url": "http://www.securityfocus.com/bid/83277"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=18985",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=18985"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3480",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2016/dsa-3480"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2985-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2985-1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2016-1862",
|
"ID": "CVE-2016-1862",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-5629",
|
"ID": "CVE-2016-5629",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,19 +53,19 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
"name": "RHSA-2016:2749",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2749.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
|
"name": "RHSA-2016:2131",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2131.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
|
"name": "93668",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"
|
"url": "http://www.securityfocus.com/bid/93668"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
|
"name": "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
|
||||||
@ -77,45 +77,45 @@
|
|||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201701-01"
|
"url": "https://security.gentoo.org/glsa/201701-01"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2130",
|
"name": "RHSA-2016:2130",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2130.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:2131",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2131.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:2595",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2595.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:2749",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2749.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2927",
|
"name": "RHSA-2016:2927",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2927.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2927.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2016:2928",
|
"name": "RHSA-2016:2595",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2928.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2595.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "93668",
|
"name": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/93668"
|
"url": "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1037050",
|
"name": "1037050",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1037050"
|
"url": "http://www.securitytracker.com/id/1037050"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:2928",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2928.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2018-2301",
|
"ID": "CVE-2018-2301",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://launchpad.support.sap.com/#/notes/2678615",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://launchpad.support.sap.com/#/notes/2678615"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
|
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=500633095",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "105527",
|
"name": "105527",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/105527"
|
"url": "http://www.securityfocus.com/bid/105527"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://launchpad.support.sap.com/#/notes/2678615",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://launchpad.support.sap.com/#/notes/2678615"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -61,6 +61,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://github.com/erpscanteam/CVE-2018-2636",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/erpscanteam/CVE-2018-2636"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://erpscan.io/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://erpscan.io/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "43960",
|
"name": "43960",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -71,21 +86,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://erpscan.io/press-center/blog/oracle-micros-pos-breached/"
|
"url": "https://erpscan.io/press-center/blog/oracle-micros-pos-breached/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://erpscan.io/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://erpscan.io/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/erpscanteam/CVE-2018-2636",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/erpscanteam/CVE-2018-2636"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "102560",
|
"name": "102560",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "chrome-cve-admin@google.com",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2018-6065",
|
"ID": "CVE-2018-6065",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,11 +53,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "44584",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/44584/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://crbug.com/808192",
|
"name": "https://crbug.com/808192",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -69,9 +64,9 @@
|
|||||||
"url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html"
|
"url": "https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-4182",
|
"name": "103297",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "BID",
|
||||||
"url" : "https://www.debian.org/security/2018/dsa-4182"
|
"url": "http://www.securityfocus.com/bid/103297"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:0484",
|
"name": "RHSA-2018:0484",
|
||||||
@ -79,9 +74,14 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2018:0484"
|
"url": "https://access.redhat.com/errata/RHSA-2018:0484"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "103297",
|
"name": "44584",
|
||||||
"refsource" : "BID",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://www.securityfocus.com/bid/103297"
|
"url": "https://www.exploit-db.com/exploits/44584/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-4182",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "https://www.debian.org/security/2018/dsa-4182"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user