mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
434dda5352
commit
d3638cea86
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20010514 Becky! 2.00.05 Buffer Overflow",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-05/0089.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "2723",
|
"name": "2723",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/2723"
|
"url": "http://www.securityfocus.com/bid/2723"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20010514 Becky! 2.00.05 Buffer Overflow",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-05/0089.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "becky-mail-message-bo(6531)",
|
"name": "becky-mail-message-bo(6531)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -58,34 +58,34 @@
|
|||||||
"url": "http://marc.info/?l=bugtraq&m=100527618108521&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=100527618108521&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20011019 Minor IE vulnerability: about: URLs",
|
"name": "ie-about-cookie-information(7486)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/221612"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7486"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MS01-055",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-055"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "M-016",
|
|
||||||
"refsource" : "CIAC",
|
|
||||||
"url" : "http://www.ciac.org/ciac/bulletins/m-016.shtml"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "3513",
|
"name": "3513",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/3513"
|
"url": "http://www.securityfocus.com/bid/3513"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "MS01-055",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-055"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1982",
|
"name": "1982",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/1982"
|
"url": "http://www.osvdb.org/1982"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ie-about-cookie-information(7486)",
|
"name": "M-016",
|
||||||
"refsource" : "XF",
|
"refsource": "CIAC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7486"
|
"url": "http://www.ciac.org/ciac/bulletins/m-016.shtml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20011019 Minor IE vulnerability: about: URLs",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/221612"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20010531 Acme.Server v1.7 of 13nov96 Directory Browsing",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/188141"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "acme-serve-directory-traversal(6634)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "http://www.iss.net/security_center/static/6634.php"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20020702 Cisco Secure ACS Unix Acme.server Information Disclosure Vulnerability",
|
"name": "20020702 Cisco Secure ACS Unix Acme.server Information Disclosure Vulnerability",
|
||||||
"refsource": "CISCO",
|
"refsource": "CISCO",
|
||||||
@ -72,6 +62,16 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/2809"
|
"url": "http://www.securityfocus.com/bid/2809"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20010531 Acme.Server v1.7 of 13nov96 Directory Browsing",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/188141"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "acme-serve-directory-traversal(6634)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "http://www.iss.net/security_center/static/6634.php"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "5544",
|
"name": "5544",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
|
@ -52,20 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20010722 Re: [cgiwrap-users] Re: Security hole in CGIWrap (cross-site scripting vulnerability)",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://cgiwrap.sourceforge.net/changes.html",
|
"name": "http://cgiwrap.sourceforge.net/changes.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://cgiwrap.sourceforge.net/changes.html"
|
"url": "http://cgiwrap.sourceforge.net/changes.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3084",
|
"name": "20010722 Re: [cgiwrap-users] Re: Security hole in CGIWrap (cross-site scripting vulnerability)",
|
||||||
"refsource" : "BID",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.securityfocus.com/bid/3084"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-07/0499.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1909",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/1909"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "cgiwrap-cross-site-scripting(6886)",
|
"name": "cgiwrap-cross-site-scripting(6886)",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6886"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6886"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1909",
|
"name": "3084",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "BID",
|
||||||
"url" : "http://www.osvdb.org/1909"
|
"url": "http://www.securityfocus.com/bid/3084"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://evuln.com/vulns/126/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://evuln.com/vulns/126/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "17761",
|
"name": "17761",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/17761"
|
"url": "http://www.securityfocus.com/bid/17761"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://evuln.com/vulns/126/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://evuln.com/vulns/126/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-1579",
|
"name": "ADV-2006-1579",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/1579"
|
"url": "http://www.vupen.com/english/advisories/2006/1579"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1016036",
|
"name": "aznews-news-sql-injection(26136)",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "XF",
|
||||||
"url" : "http://securitytracker.com/id?1016036"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26136"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "19888",
|
"name": "19888",
|
||||||
@ -78,9 +78,9 @@
|
|||||||
"url": "http://secunia.com/advisories/19888"
|
"url": "http://secunia.com/advisories/19888"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "aznews-news-sql-injection(26136)",
|
"name": "1016036",
|
||||||
"refsource" : "XF",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26136"
|
"url": "http://securitytracker.com/id?1016036"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://d4igoro.blogspot.com/2006/05/phpkb-knowledge-base-xss.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://d4igoro.blogspot.com/2006/05/phpkb-knowledge-base-xss.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20060512 Vendor dispute of CVE-2006-2184",
|
"name": "20060512 Vendor dispute of CVE-2006-2184",
|
||||||
"refsource": "VIM",
|
"refsource": "VIM",
|
||||||
"url": "http://www.attrition.org/pipermail/vim/2006-May/000753.html"
|
"url": "http://www.attrition.org/pipermail/vim/2006-May/000753.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-1628",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/1628"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20060519 Resolved PHPKB vendor dispute (CVE-2006-2184)",
|
"name": "20060519 Resolved PHPKB vendor dispute (CVE-2006-2184)",
|
||||||
"refsource": "VIM",
|
"refsource": "VIM",
|
||||||
"url": "http://www.attrition.org/pipermail/vim/2006-May/000775.html"
|
"url": "http://www.attrition.org/pipermail/vim/2006-May/000775.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-1628",
|
"name": "http://d4igoro.blogspot.com/2006/05/phpkb-knowledge-base-xss.html",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/1628"
|
"url": "http://d4igoro.blogspot.com/2006/05/phpkb-knowledge-base-xss.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "19913",
|
"name": "19913",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||||
"ID": "CVE-2006-2915",
|
"ID": "CVE-2006-2915",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,45 +52,45 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060614 Secunia Research: DeluxeBB SQL Injection and File InclusionVulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/437228/100/100/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20060628 Secunia Research: DeluxeBB SQL Injection and File InclusionVulnerabilities",
|
"name": "20060628 Secunia Research: DeluxeBB SQL Injection and File InclusionVulnerabilities",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/438597/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/438597/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://secunia.com/secunia_research/2006-44/advisory",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://secunia.com/secunia_research/2006-44/advisory"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18453",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/18453"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-2347",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/2347"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "26457",
|
"name": "26457",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/26457"
|
"url": "http://www.osvdb.org/26457"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20152",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/20152"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1016309",
|
"name": "1016309",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1016309"
|
"url": "http://securitytracker.com/id?1016309"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20152",
|
"name": "http://secunia.com/secunia_research/2006-44/advisory",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url" : "http://secunia.com/advisories/20152"
|
"url": "http://secunia.com/secunia_research/2006-44/advisory"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-2347",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/2347"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18453",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/18453"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060614 Secunia Research: DeluxeBB SQL Injection and File InclusionVulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/437228/100/100/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1134",
|
"name": "1134",
|
||||||
|
@ -52,20 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060605 LabWiki v1.0",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/435981/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20060612 verify of LabWiki issue (source inspection)",
|
"name": "20060612 verify of LabWiki issue (source inspection)",
|
||||||
"refsource": "VIM",
|
"refsource": "VIM",
|
||||||
"url": "http://www.attrition.org/pipermail/vim/2006-June/000845.html"
|
"url": "http://www.attrition.org/pipermail/vim/2006-June/000845.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "18288",
|
"name": "labwiki-search-xss(26988)",
|
||||||
"refsource" : "BID",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/bid/18288"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26988"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "26597",
|
"name": "26597",
|
||||||
@ -77,15 +72,20 @@
|
|||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1016227"
|
"url": "http://securitytracker.com/id?1016227"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20060605 LabWiki v1.0",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/435981/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18288",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/18288"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1092",
|
"name": "1092",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/1092"
|
"url": "http://securityreason.com/securityalert/1092"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "labwiki-search-xss(26988)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26988"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,44 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://projects.info-pull.com/mokb/MOKB-26-11-2006.html",
|
"name": "30706",
|
||||||
"refsource" : "MISC",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://projects.info-pull.com/mokb/MOKB-26-11-2006.html"
|
"url": "http://www.osvdb.org/30706"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://docs.info.apple.com/article.html?artnum=305214",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://docs.info.apple.com/article.html?artnum=305214"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2007-03-13",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "TA07-072A",
|
"name": "TA07-072A",
|
||||||
"refsource": "CERT",
|
"refsource": "CERT",
|
||||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "21291",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/21291"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-4714",
|
"name": "ADV-2006-4714",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/4714"
|
"url": "http://www.vupen.com/english/advisories/2006/4714"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2007-0930",
|
"name": "APPLE-SA-2007-03-13",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "APPLE",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/0930"
|
"url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "30706",
|
"name": "http://docs.info.apple.com/article.html?artnum=305214",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.osvdb.org/30706"
|
"url": "http://docs.info.apple.com/article.html?artnum=305214"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21291",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/21291"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1017751",
|
"name": "1017751",
|
||||||
@ -102,15 +92,25 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/23088"
|
"url": "http://secunia.com/advisories/23088"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "24479",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/24479"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "macos-macho-universal-overflow(30547)",
|
"name": "macos-macho-universal-overflow(30547)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30547"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30547"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://projects.info-pull.com/mokb/MOKB-26-11-2006.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://projects.info-pull.com/mokb/MOKB-26-11-2006.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-0930",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/0930"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "24479",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/24479"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "cutenewsajfork-shows-file-include(30689)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30689"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "2891",
|
"name": "2891",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -71,11 +76,6 @@
|
|||||||
"name": "23425",
|
"name": "23425",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/23425"
|
"url": "http://secunia.com/advisories/23425"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "cutenewsajfork-shows-file-include(30689)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30689"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,34 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20061219 Multiple Bugs in MINI WEB SHOP",
|
"name": "2072",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/454864/100/0/threaded"
|
"url": "http://securityreason.com/securityalert/2072"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20061226 MINI WEB SHOP vuln report - incomplete researcher diagnosis",
|
|
||||||
"refsource" : "VIM",
|
|
||||||
"url" : "http://www.attrition.org/pipermail/vim/2006-December/001197.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "21677",
|
"name": "21677",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/21677"
|
"url": "http://www.securityfocus.com/bid/21677"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2006-5096",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/5096"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "23449",
|
"name": "23449",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/23449"
|
"url": "http://secunia.com/advisories/23449"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "2072",
|
"name": "ADV-2006-5096",
|
||||||
"refsource" : "SREASON",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://securityreason.com/securityalert/2072"
|
"url": "http://www.vupen.com/english/advisories/2006/5096"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20061226 MINI WEB SHOP vuln report - incomplete researcher diagnosis",
|
||||||
|
"refsource": "VIM",
|
||||||
|
"url": "http://www.attrition.org/pipermail/vim/2006-December/001197.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20061219 Multiple Bugs in MINI WEB SHOP",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/454864/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2011-0105",
|
"ID": "CVE-2011-0105",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,20 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "MS11-021",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "TA11-102A",
|
"name": "TA11-102A",
|
||||||
"refsource": "CERT",
|
"refsource": "CERT",
|
||||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "oval:org.mitre.oval:def:12618",
|
"name": "39122",
|
||||||
"refsource" : "OVAL",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12618"
|
"url": "http://secunia.com/advisories/39122"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1025337",
|
"name": "1025337",
|
||||||
@ -73,9 +68,14 @@
|
|||||||
"url": "http://www.securitytracker.com/id?1025337"
|
"url": "http://www.securitytracker.com/id?1025337"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "39122",
|
"name": "oval:org.mitre.oval:def:12618",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "OVAL",
|
||||||
"url" : "http://secunia.com/advisories/39122"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12618"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MS11-021",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2011-0940",
|
"name": "ADV-2011-0940",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2011-0831",
|
"ID": "CVE-2011-0831",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "TA11-201A",
|
"name": "TA11-201A",
|
||||||
"refsource": "CERT",
|
"refsource": "CERT",
|
||||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2011-2271",
|
"ID": "CVE-2011-2271",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2011-2782",
|
"ID": "CVE-2011-2782",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=81307",
|
"name": "74232",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=81307"
|
"url": "http://osvdb.org/74232"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html",
|
"name": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html",
|
||||||
@ -63,19 +63,19 @@
|
|||||||
"url": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html"
|
"url": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "74232",
|
"name": "http://code.google.com/p/chromium/issues/detail?id=81307",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://osvdb.org/74232"
|
"url": "http://code.google.com/p/chromium/issues/detail?id=81307"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:14100",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14100"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "google-chrome-drop-insecure-permissions(68944)",
|
"name": "google-chrome-drop-insecure-permissions(68944)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68944"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68944"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:14100",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14100"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:14202",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14202"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-52.html",
|
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-52.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-52.html"
|
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-52.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "49055",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/49055"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=672182",
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=672182",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,16 +76,6 @@
|
|||||||
"name": "SUSE-SU-2011:1256",
|
"name": "SUSE-SU-2011:1256",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:14202",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14202"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "49055",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/49055"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2013-0066",
|
"ID": "CVE-2013-0066",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2013-1260",
|
"ID": "CVE-2013-1260",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:16301",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16301"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "MS13-016",
|
"name": "MS13-016",
|
||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "TA13-043B",
|
"name": "TA13-043B",
|
||||||
"refsource": "CERT",
|
"refsource": "CERT",
|
||||||
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:16301",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16301"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-1843",
|
"ID": "CVE-2013-1843",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,11 +57,6 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/03/12/3"
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/12/3"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://typo3.org/support/teamssecuritysecurity-bulletins/security-bulletins-single-view/article/sql-injection-and-open-redirection-in-typo3-core/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://typo3.org/support/teamssecuritysecurity-bulletins/security-bulletins-single-view/article/sql-injection-and-open-redirection-in-typo3-core/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-2646",
|
"name": "DSA-2646",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
@ -73,24 +68,29 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00079.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00079.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "58330",
|
"name": "52638",
|
||||||
"refsource" : "BID",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/bid/58330"
|
"url": "http://secunia.com/advisories/52638"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "90924",
|
"name": "90924",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/90924"
|
"url": "http://www.osvdb.org/90924"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "58330",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/58330"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "52433",
|
"name": "52433",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/52433"
|
"url": "http://secunia.com/advisories/52433"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "52638",
|
"name": "http://typo3.org/support/teamssecuritysecurity-bulletins/security-bulletins-single-view/article/sql-injection-and-open-redirection-in-typo3-core/",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/52638"
|
"url": "http://typo3.org/support/teamssecuritysecurity-bulletins/security-bulletins-single-view/article/sql-injection-and-open-redirection-in-typo3-core/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-1860",
|
"ID": "CVE-2013-1860",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20130314 Re: CVE Request/Guidance: Linux kernel cdc-wdm buffer overflow triggered by device",
|
"name": "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa",
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2013/03/15/3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c0f5ecee4e741667b2493c742b60b6218d40b3aa",
|
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c0f5ecee4e741667b2493c742b60b6218d40b3aa"
|
"url": "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=921970",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=921970",
|
||||||
@ -73,14 +63,14 @@
|
|||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=921970"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=921970"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa",
|
"name": "USN-1812-1",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "UBUNTU",
|
||||||
"url" : "https://github.com/torvalds/linux/commit/c0f5ecee4e741667b2493c742b60b6218d40b3aa"
|
"url": "http://www.ubuntu.com/usn/USN-1812-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "MDVSA-2013:176",
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c0f5ecee4e741667b2493c742b60b6218d40b3aa",
|
||||||
"refsource" : "MANDRIVA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c0f5ecee4e741667b2493c742b60b6218d40b3aa"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2014:0328",
|
"name": "RHSA-2014:0328",
|
||||||
@ -88,44 +78,54 @@
|
|||||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0328.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0328.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2014:0339",
|
"name": "MDVSA-2013:176",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "MANDRIVA",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0339.html"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1829-1",
|
"name": "USN-1829-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1829-1"
|
"url": "http://www.ubuntu.com/usn/USN-1829-1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20130314 Re: CVE Request/Guidance: Linux kernel cdc-wdm buffer overflow triggered by device",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2013/03/15/3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "58510",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/58510"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1809-1",
|
"name": "USN-1809-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1809-1"
|
"url": "http://www.ubuntu.com/usn/USN-1809-1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "USN-1811-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1811-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-1812-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1812-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-1813-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1813-1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-1814-1",
|
"name": "USN-1814-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1814-1"
|
"url": "http://www.ubuntu.com/usn/USN-1814-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "58510",
|
"name": "RHSA-2014:0339",
|
||||||
"refsource" : "BID",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.securityfocus.com/bid/58510"
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0339.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-1813-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-1813-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-1811-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-1811-1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2013-5165",
|
"ID": "CVE-2013-5165",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2013-5183",
|
"ID": "CVE-2013-5183",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2013-5892",
|
"ID": "CVE-2013-5892",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,15 +53,25 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
"name": "56490",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
"url": "http://secunia.com/advisories/56490"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-2878",
|
"name": "DSA-2878",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2014/dsa-2878"
|
"url": "http://www.debian.org/security/2014/dsa-2878"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "102057",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/102057"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oracle-cpujan2014-cve20135892(90368)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90368"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "64758",
|
"name": "64758",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -73,24 +83,14 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/64909"
|
"url": "http://www.securityfocus.com/bid/64909"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "102057",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://osvdb.org/102057"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1029610",
|
"name": "1029610",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1029610"
|
"url": "http://www.securitytracker.com/id/1029610"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "56490",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/56490"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oracle-cpujan2014-cve20135892(90368)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90368"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2014-2201",
|
"ID": "CVE-2014-2201",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2014-2414",
|
"ID": "CVE-2014-2414",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,19 +53,19 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
|
"name": "USN-2187-1",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html"
|
"url": "http://www.ubuntu.com/usn/USN-2187-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21672080",
|
"name": "RHSA-2014:0675",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21672080"
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0675.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-2912",
|
"name": "RHSA-2014:0414",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-2912"
|
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201406-32",
|
"name": "GLSA-201406-32",
|
||||||
@ -73,69 +73,69 @@
|
|||||||
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
|
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201502-12",
|
"name": "USN-2191-1",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-201502-12.xml"
|
"url": "http://www.ubuntu.com/usn/USN-2191-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "HPSBUX03091",
|
"name": "HPSBUX03091",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21672080",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21672080"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2014:0413",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2014:0413"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT101667",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "HPSBUX03092",
|
"name": "HPSBUX03092",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SSRT101667",
|
"name": "RHSA-2014:0685",
|
||||||
"refsource" : "HP",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=140852886808946&w=2"
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0685.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-2912",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2014/dsa-2912"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "58415",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/58415"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SSRT101668",
|
"name": "SSRT101668",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:0675",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0675.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:0685",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0685.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:0413",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2014:0413"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:0414",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2014:0414"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2191-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2191-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2187-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2187-1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "66894",
|
"name": "66894",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/66894"
|
"url": "http://www.securityfocus.com/bid/66894"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "58415",
|
"name": "GLSA-201502-12",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://secunia.com/advisories/58415"
|
"url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-2949",
|
"ID": "CVE-2014-2949",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-14-293/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-14-293/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15310.html?sr=38021626",
|
"name": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15310.html?sr=38021626",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15310.html?sr=38021626"
|
"url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15310.html?sr=38021626"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#210884",
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-14-293/",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/210884"
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-14-293/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "68078",
|
"name": "68078",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/68078"
|
"url": "http://www.securityfocus.com/bid/68078"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#210884",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/210884"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-6702",
|
"ID": "CVE-2014-6702",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#361705",
|
"name": "VU#361705",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -59,15 +59,15 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html"
|
"url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://phabricator.wikimedia.org/T122209",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://phabricator.wikimedia.org/T122209"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://security-tracker.debian.org/tracker/CVE-2017-0364",
|
"name": "https://security-tracker.debian.org/tracker/CVE-2017-0364",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://security-tracker.debian.org/tracker/CVE-2017-0364"
|
"url": "https://security-tracker.debian.org/tracker/CVE-2017-0364"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://phabricator.wikimedia.org/T122209",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://phabricator.wikimedia.org/T122209"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2017-0622",
|
"ID": "CVE-2017-0622",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://source.android.com/security/bulletin/2017-05-01",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://source.android.com/security/bulletin/2017-05-01"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "98198",
|
"name": "98198",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/98198"
|
"url": "http://www.securityfocus.com/bid/98198"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://source.android.com/security/bulletin/2017-05-01",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://source.android.com/security/bulletin/2017-05-01"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2017-11-17",
|
"DATE_ASSIGNED": "2017-11-17",
|
||||||
"ID": "CVE-2017-1000390",
|
"ID": "CVE-2017-1000390",
|
||||||
"REQUESTER": "ml@beckweb.net",
|
"REQUESTER": "ml@beckweb.net",
|
||||||
@ -13,18 +13,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "Jenkins Multijob Plugin",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "1.25 and earlier"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "Jenkins Multijob Plugin"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -46,7 +46,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "Incorrect Access Control"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2017-12-29",
|
"DATE_ASSIGNED": "2017-12-29",
|
||||||
"ID": "CVE-2017-1000465",
|
"ID": "CVE-2017-1000465",
|
||||||
"REQUESTER": "sajeeb.lohani@bulletproof.sh",
|
"REQUESTER": "sajeeb.lohani@bulletproof.sh",
|
||||||
@ -13,18 +13,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "sulu-standard",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "<= sulu-standard v1.6.6"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "Sulu"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -46,7 +46,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "CWE-79"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -56,11 +56,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/125163",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/125163"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006248",
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006248",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -70,6 +65,11 @@
|
|||||||
"name": "101107",
|
"name": "101107",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/101107"
|
"url": "http://www.securityfocus.com/bid/101107"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/125163",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/125163"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -120,9 +120,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/130807",
|
"name": "100967",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/130807"
|
"url": "http://www.securityfocus.com/bid/100967"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22007451",
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg22007451",
|
||||||
@ -130,9 +130,9 @@
|
|||||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22007451"
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg22007451"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "100967",
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/130807",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/100967"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/130807"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-1826",
|
"ID": "CVE-2017-1826",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4156",
|
"ID": "CVE-2017-4156",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4229",
|
"ID": "CVE-2017-4229",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4536",
|
"ID": "CVE-2017-4536",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4558",
|
"ID": "CVE-2017-4558",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4753",
|
"ID": "CVE-2017-4753",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -54,9 +54,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://support.f5.com/csp/article/K62201098",
|
"name": "1041019",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://support.f5.com/csp/article/K62201098"
|
"url": "http://www.securitytracker.com/id/1041019"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "104470",
|
"name": "104470",
|
||||||
@ -64,9 +64,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/104470"
|
"url": "http://www.securityfocus.com/bid/104470"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1041019",
|
"name": "https://support.f5.com/csp/article/K62201098",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1041019"
|
"url": "https://support.f5.com/csp/article/K62201098"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/",
|
"name": "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/"
|
"url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-3838-1",
|
"name": "USN-3838-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
@ -76,6 +71,11 @@
|
|||||||
"name": "83507",
|
"name": "83507",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "https://secuniaresearch.flexerasoftware.com/advisories/83507/"
|
"url": "https://secuniaresearch.flexerasoftware.com/advisories/83507/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user