mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
972b850b38
commit
d5892e804a
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "MS99-057",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-057"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "Q248185",
|
"name": "Q248185",
|
||||||
"refsource": "MSKB",
|
"refsource": "MSKB",
|
||||||
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q248185"
|
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q248185"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "MS99-057",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-057"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "875",
|
"name": "875",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.securiteam.com/exploits/Netscape_4_7_and_earlier_vulnerable_to__Huge_Key__DoS.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.securiteam.com/exploits/Netscape_4_7_and_earlier_vulnerable_to__Huge_Key__DoS.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "netscape-huge-key-dos(3436)",
|
"name": "netscape-huge-key-dos(3436)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3436"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3436"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.securiteam.com/exploits/Netscape_4_7_and_earlier_vulnerable_to__Huge_Key__DoS.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.securiteam.com/exploits/Netscape_4_7_and_earlier_vulnerable_to__Huge_Key__DoS.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "MS99-039",
|
"name": "iis-unresolved-domain-access(3306)",
|
||||||
"refsource" : "MS",
|
"refsource": "XF",
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-039"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3306"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "241562",
|
"name": "241562",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/657"
|
"url": "http://www.securityfocus.com/bid/657"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "iis-unresolved-domain-access(3306)",
|
"name": "MS99-039",
|
||||||
"refsource" : "XF",
|
"refsource": "MS",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/3306"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-039"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "773",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/773"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "19991104 Eserv 2.50 Web interface Server Directory Traversal Vulnerability",
|
"name": "19991104 Eserv 2.50 Web interface Server Directory Traversal Vulnerability",
|
||||||
"refsource": "NTBUGTRAQ",
|
"refsource": "NTBUGTRAQ",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "19991104 Eserv 2.50 Web interface Server Directory Traversal Vulnerability",
|
"name": "19991104 Eserv 2.50 Web interface Server Directory Traversal Vulnerability",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=94183041514522&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=94183041514522&w=2"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "773",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/773"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "RHSA-2000:045",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2000-045.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20000322 gpm-root",
|
"name": "20000322 gpm-root",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20000405 Security hole in gpm < 1.18.1",
|
"name": "1069",
|
||||||
"refsource" : "SUSE",
|
"refsource": "BID",
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/suse_security_announce_45.html"
|
"url": "http://www.securityfocus.com/bid/1069"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2000:009",
|
"name": "RHSA-2000:009",
|
||||||
@ -68,14 +73,9 @@
|
|||||||
"url": "http://www.redhat.com/support/errata/RHSA-2000-009.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2000-009.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2000:045",
|
"name": "20000405 Security hole in gpm < 1.18.1",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2000-045.html"
|
"url": "http://www.novell.com/linux/security/advisories/suse_security_announce_45.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1069",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/1069"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20000324 AnalogX SimpleServer 1.03 Remote Crash\" at:",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=web-5645555@post2.rnci.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.analogx.com/contents/download/network/sswww.htm",
|
"name": "http://www.analogx.com/contents/download/network/sswww.htm",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.analogx.com/contents/download/network/sswww.htm"
|
"url": "http://www.analogx.com/contents/download/network/sswww.htm"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "1265",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/1265"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "simpleserver-exception-dos(4189)",
|
"name": "simpleserver-exception-dos(4189)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4189"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4189"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20000324 AnalogX SimpleServer 1.03 Remote Crash\" at:",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=web-5645555@post2.rnci.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1076",
|
"name": "1076",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/1076"
|
"url": "http://www.securityfocus.com/bid/1076"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1265",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/1265"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20000703 Remote DoS Attack in LocalWEB HTTP Server 1.2.0 Vulnerability",
|
"name": "localweb-get-bo(4896)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-07-8&msg=NCBBKFKDOLAGKIAPMILPCEIHCFAA.labs@ussrback.com"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4896"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1423",
|
"name": "1423",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/1423"
|
"url": "http://www.securityfocus.com/bid/1423"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "localweb-get-bo(4896)",
|
"name": "20000703 Remote DoS Attack in LocalWEB HTTP Server 1.2.0 Vulnerability",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/4896"
|
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-07-8&msg=NCBBKFKDOLAGKIAPMILPCEIHCFAA.labs@ussrback.com"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20000829 News Publisher CGI Vulnerability",
|
"name": "news-publisher-add-author(5169)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/templates/archive.pike?list=1&msg=003301c0123b$18f8c1a0$953b29d4@e8s9s4"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5169"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1621",
|
"name": "1621",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/1621"
|
"url": "http://www.securityfocus.com/bid/1621"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "news-publisher-add-author(5169)",
|
"name": "20000829 News Publisher CGI Vulnerability",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5169"
|
"url": "http://www.securityfocus.com/templates/archive.pike?list=1&msg=003301c0123b$18f8c1a0$953b29d4@e8s9s4"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20000922 [ no subject ]",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/84901"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20001031 FW: Pine 4.30 now available",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-10/0441.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FreeBSD-SA-00:59",
|
"name": "FreeBSD-SA-00:59",
|
||||||
"refsource": "FREEBSD",
|
"refsource": "FREEBSD",
|
||||||
@ -73,15 +63,25 @@
|
|||||||
"url": "http://www.redhat.com/support/errata/RHSA-2000-102.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2000-102.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "MDKSA-2000:073",
|
"name": "20001031 FW: Pine 4.30 now available",
|
||||||
"refsource" : "MANDRAKE",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.linux-mandrake.com/en/security/MDKSA-2000-073.php3"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0441.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1709",
|
"name": "1709",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/1709"
|
"url": "http://www.securityfocus.com/bid/1709"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20000922 [ no subject ]",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/84901"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2000:073",
|
||||||
|
"refsource": "MANDRAKE",
|
||||||
|
"url": "http://www.linux-mandrake.com/en/security/MDKSA-2000-073.php3"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "pine-check-mail-bo(5283)",
|
"name": "pine-check-mail-bo(5283)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20001008 Security Advisory: Bytes Interactive's Web Shopper (shopper.cgi) Directory Traversal Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-10/0120.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1776",
|
"name": "1776",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "web-shopper-directory-traversal(5351)",
|
"name": "web-shopper-directory-traversal(5351)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5351"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5351"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20001008 Security Advisory: Bytes Interactive's Web Shopper (shopper.cgi) Directory Traversal Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0120.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "shambala-password-plaintext(5346)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5346"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20001009 Shambala 4.5 vulnerability",
|
"name": "20001009 Shambala 4.5 vulnerability",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "1771",
|
"name": "1771",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/1771"
|
"url": "http://www.securityfocus.com/bid/1771"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "shambala-password-plaintext(5346)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5346"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20001102 Mantrap By Recourse Technologies - Fate Advisory (11-01-00)",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-11/0041.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20001107 Vendor Response Re: Mantrap Advisory Vendor Followup - Fate Research Labs",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-11/0100.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1913",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/1913"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20001105 Mantrap Advisory Vendor Followup - Fate Research Labs",
|
"name": "20001105 Mantrap Advisory Vendor Followup - Fate Research Labs",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -76,6 +61,21 @@
|
|||||||
"name": "mantrap-dir-dos(5528)",
|
"name": "mantrap-dir-dos(5528)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5528"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5528"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1913",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/1913"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20001102 Mantrap By Recourse Technologies - Fate Advisory (11-01-00)",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0041.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20001107 Vendor Response Re: Mantrap Advisory Vendor Followup - Fate Research Labs",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0100.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20070313 New report on Windows Vista network attack surface",
|
"name": "20070313 New report on Windows Vista network attack surface",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -63,9 +68,9 @@
|
|||||||
"url": "http://www.securityfocus.com/archive/1/464617/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/464617/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf",
|
"name": "33663",
|
||||||
"refsource" : "MISC",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.symantec.com/avcenter/reference/Vista_Network_Attack_Surface_RTM.pdf"
|
"url": "http://osvdb.org/33663"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.symantec.com/enterprise/security_response/weblog/2007/04/microsofts_inaccurate_teredo_d.html",
|
"name": "http://www.symantec.com/enterprise/security_response/weblog/2007/04/microsofts_inaccurate_teredo_d.html",
|
||||||
@ -76,11 +81,6 @@
|
|||||||
"name": "23279",
|
"name": "23279",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/23279"
|
"url": "http://www.securityfocus.com/bid/23279"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "33663",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/33663"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,20 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "3515",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/3515"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "23019",
|
"name": "23019",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/23019"
|
"url": "http://www.securityfocus.com/bid/23019"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2007-1016",
|
"name": "24563",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/1016"
|
"url": "http://secunia.com/advisories/24563"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "34283",
|
"name": "34283",
|
||||||
@ -73,9 +68,14 @@
|
|||||||
"url": "http://osvdb.org/34283"
|
"url": "http://osvdb.org/34283"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "24563",
|
"name": "3515",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://secunia.com/advisories/24563"
|
"url": "https://www.exploit-db.com/exploits/3515"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-1016",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/1016"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "scriptmagixlyrics-index-sql-injection(33056)",
|
"name": "scriptmagixlyrics-index-sql-injection(33056)",
|
||||||
|
@ -52,6 +52,76 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "23145",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/23145"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25056",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/25056"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1283",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2007/dsa-1283"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:10951",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10951"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-200705-19",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-200705-19.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1017946",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1017946"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2007:0162",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2007-0162.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25062",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/25062"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "php-mailfunction-header-injection(33516)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33516"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2007:090",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:090"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-455-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/usn-455-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "24909",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/24909"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2007:087",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:087"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1282",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2007/dsa-1282"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.php-security.org/MOPB/MOPB-34-2007.html",
|
"name": "http://www.php-security.org/MOPB/MOPB-34-2007.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -63,114 +133,24 @@
|
|||||||
"url": "http://us2.php.net/releases/5_2_2.php"
|
"url": "http://us2.php.net/releases/5_2_2.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-1282",
|
"name": "24924",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.debian.org/security/2007/dsa-1282"
|
"url": "http://secunia.com/advisories/24924"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1283",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2007/dsa-1283"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200705-19",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-200705-19.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2007:087",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:087"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2007:088",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:088"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2007:089",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:089"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2007:090",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:090"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2007:0155",
|
"name": "RHSA-2007:0155",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2007-0155.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2007-0155.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2007:0153",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0153.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2007:0162",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0162.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SA:2007:032",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2007_32_php.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-455-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/usn-455-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "23145",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/23145"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:10951",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10951"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1017946",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1017946"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24924",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/24924"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "24965",
|
"name": "24965",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/24965"
|
"url": "http://secunia.com/advisories/24965"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "25025",
|
"name": "MDKSA-2007:089",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MANDRIVA",
|
||||||
"url" : "http://secunia.com/advisories/25025"
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:089"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25062",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/25062"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25057",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/25057"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24909",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/24909"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25056",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/25056"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "25445",
|
"name": "25445",
|
||||||
@ -178,9 +158,29 @@
|
|||||||
"url": "http://secunia.com/advisories/25445"
|
"url": "http://secunia.com/advisories/25445"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "php-mailfunction-header-injection(33516)",
|
"name": "25057",
|
||||||
"refsource" : "XF",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33516"
|
"url": "http://secunia.com/advisories/25057"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SA:2007:032",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/2007_32_php.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25025",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/25025"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2007:088",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:088"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2007:0153",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2007-0153.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "2538",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/2538"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23313",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/23313"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20070404 CYBSEC Security Pre-Advisory: SAP RFC_START_PROGRAM RFC Function Multiple Vulnerabilities",
|
"name": "20070404 CYBSEC Security Pre-Advisory: SAP RFC_START_PROGRAM RFC Function Multiple Vulnerabilities",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -62,25 +72,15 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_PROGRAM_RFC_Function_Multiple_Vulnerabilities.pdf"
|
"url": "http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_PROGRAM_RFC_Function_Multiple_Vulnerabilities.pdf"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "23313",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/23313"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-1270",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/1270"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "24722",
|
"name": "24722",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/24722"
|
"url": "http://secunia.com/advisories/24722"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "2538",
|
"name": "ADV-2007-1270",
|
||||||
"refsource" : "SREASON",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://securityreason.com/securityalert/2538"
|
"url": "http://www.vupen.com/english/advisories/2007/1270"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "sap-rfc-startprogram-information-disclosure(33422)",
|
"name": "sap-rfc-startprogram-information-disclosure(33422)",
|
||||||
|
@ -52,20 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20071006 idmos-phoenix cms Remote File inclusion",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/481682/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "4495",
|
"name": "4495",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/4495"
|
"url": "https://www.exploit-db.com/exploits/4495"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2007-3433",
|
"name": "20071006 idmos-phoenix cms Remote File inclusion",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/3433"
|
"url": "http://www.securityfocus.com/archive/1/481682/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "3205",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/3205"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "38633",
|
"name": "38633",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://osvdb.org/38633"
|
"url": "http://osvdb.org/38633"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3205",
|
"name": "ADV-2007-3433",
|
||||||
"refsource" : "SREASON",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://securityreason.com/securityalert/3205"
|
"url": "http://www.vupen.com/english/advisories/2007/3433"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "idmos-aural-file-include(36994)",
|
"name": "idmos-aural-file-include(36994)",
|
||||||
|
@ -52,31 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20071017 Oracle RDBMS TNS Data packet DoS",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/482424/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "HPSBMA02133",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT061201",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA07-290A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "26108",
|
"name": "26108",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -87,30 +67,50 @@
|
|||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/3524"
|
"url": "http://www.vupen.com/english/advisories/2007/3524"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20071017 Oracle RDBMS TNS Data packet DoS",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/482424/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-3626",
|
"name": "ADV-2007-3626",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2007/3626"
|
"url": "http://www.vupen.com/english/advisories/2007/3626"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "TA07-290A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "3244",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/3244"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT061201",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBMA02133",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1018823",
|
"name": "1018823",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1018823"
|
"url": "http://www.securitytracker.com/id?1018823"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "27251",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/27251"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "27409",
|
"name": "27409",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/27409"
|
"url": "http://secunia.com/advisories/27409"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3244",
|
"name": "27251",
|
||||||
"refsource" : "SREASON",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://securityreason.com/securityalert/3244"
|
"url": "http://secunia.com/advisories/27251"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21261095"
|
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21261095"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "26176",
|
"name": "domino-ca-password-disclosure(37372)",
|
||||||
"refsource" : "BID",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/bid/26176"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37372"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2007-3598",
|
"name": "ADV-2007-3598",
|
||||||
@ -72,15 +72,15 @@
|
|||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/40952"
|
"url": "http://osvdb.org/40952"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "26176",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/26176"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "27321",
|
"name": "27321",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/27321"
|
"url": "http://secunia.com/advisories/27321"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "domino-ca-password-disclosure(37372)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37372"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -62,15 +62,15 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/26416"
|
"url": "http://www.securityfocus.com/bid/26416"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2007-3904",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/3904"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "patbbcode-bbcodesource-file-include(38425)",
|
"name": "patbbcode-bbcodesource-file-include(38425)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38425"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38425"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-3904",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/3904"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,40 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2015-18.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2015-18.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188",
|
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188"
|
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b3b1f7c3aa2233a147294bad833b748d38fba84d",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b3b1f7c3aa2233a147294bad833b748d38fba84d"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "DSA-3277",
|
"name": "DSA-3277",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2015/dsa-3277"
|
"url": "http://www.debian.org/security/2015/dsa-3277"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "74630",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/74630"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.wireshark.org/security/wnpa-sec-2015-18.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.wireshark.org/security/wnpa-sec-2015-18.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201510-03",
|
"name": "GLSA-201510-03",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201510-03"
|
"url": "https://security.gentoo.org/glsa/201510-03"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "74630",
|
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b3b1f7c3aa2233a147294bad833b748d38fba84d",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/74630"
|
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b3b1f7c3aa2233a147294bad833b748d38fba84d"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2015-3876",
|
"ID": "CVE-2015-3876",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://twitter.com/4Dgifts/statuses/649589185792339968",
|
"name": "1033725",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://twitter.com/4Dgifts/statuses/649589185792339968"
|
"url": "http://www.securitytracker.com/id/1033725"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://code.google.com/p/android/issues/detail?id=182386",
|
"name": "https://code.google.com/p/android/issues/detail?id=182386",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://code.google.com/p/android/issues/detail?id=182386"
|
"url": "https://code.google.com/p/android/issues/detail?id=182386"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1033725",
|
"name": "http://twitter.com/4Dgifts/statuses/649589185792339968",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securitytracker.com/id/1033725"
|
"url": "http://twitter.com/4Dgifts/statuses/649589185792339968"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2015-4883",
|
"ID": "CVE-2015-4883",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,31 +52,51 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:2182",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "77161",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/77161"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2784-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2784-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:1905",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:2192",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:1906",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:2507",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:1928",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3381",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3381"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201603-11",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201603-11"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201603-14",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201603-14"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:1430",
|
"name": "RHSA-2016:1430",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
@ -87,65 +107,15 @@
|
|||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:2507",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:2508",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2015:2509",
|
"name": "RHSA-2015:2509",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2015:2518",
|
"name": "1033884",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2518.html"
|
"url": "http://www.securitytracker.com/id/1033884"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:1919",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:1920",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:1921",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:1926",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:1927",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2015:1928",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:0113",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:0270",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2015:2166",
|
"name": "SUSE-SU-2015:2166",
|
||||||
@ -153,39 +123,24 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2015:2168",
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
||||||
"refsource" : "SUSE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2015:2182",
|
"name": "openSUSE-SU-2016:0270",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2015:2192",
|
"name": "RHSA-2015:1919",
|
||||||
"refsource" : "SUSE",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2015:2216",
|
"name": "GLSA-201603-11",
|
||||||
"refsource" : "SUSE",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
|
"url": "https://security.gentoo.org/glsa/201603-11"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:2268",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:1874",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2015:1875",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2015:1902",
|
"name": "openSUSE-SU-2015:1902",
|
||||||
@ -193,39 +148,84 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2015:1905",
|
"name": "RHSA-2015:1920",
|
||||||
"refsource" : "SUSE",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2015:1906",
|
"name": "RHSA-2015:2518",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201603-14",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201603-14"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:2216",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:1927",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2015:1971",
|
"name": "openSUSE-SU-2015:1971",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:2268",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:2168",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:1921",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:1874",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3381",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2015/dsa-3381"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:1926",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2015:1875",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:2508",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:0113",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-2827-1",
|
"name": "USN-2827-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-2827-1"
|
"url": "http://www.ubuntu.com/usn/USN-2827-1"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2784-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2784-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "77161",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/77161"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1033884",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1033884"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://github.com/tinfoil/devise-two-factor/blob/master/UPGRADING.md",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/tinfoil/devise-two-factor/blob/master/UPGRADING.md"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20150917 Re: CVE Request: TOTP Replay Attack in Ruby library",
|
"name": "[oss-security] 20150917 Re: CVE Request: TOTP Replay Attack in Ruby library",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -62,25 +67,20 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2015/06/20/4"
|
"url": "http://www.openwall.com/lists/oss-security/2015/06/20/4"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "76789",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/76789"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466",
|
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466"
|
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://github.com/tinfoil/devise-two-factor/blob/master/UPGRADING.md",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/tinfoil/devise-two-factor/blob/master/UPGRADING.md"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608",
|
"name": "https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608"
|
"url": "https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "76789",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/76789"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2015-7397",
|
"ID": "CVE-2015-7397",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21969562",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21969562"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg24041142",
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg24041142",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg24041142"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg24041142"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "JR54295",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1JR54295"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1034640",
|
"name": "1034640",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034640"
|
"url": "http://www.securitytracker.com/id/1034640"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21969562",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21969562"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "JR54295",
|
||||||
|
"refsource": "AIXAPAR",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR54295"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2015-7549",
|
"ID": "CVE-2015-7549",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,14 +58,9 @@
|
|||||||
"url": "http://www.openwall.com/lists/oss-security/2015/12/14/2"
|
"url": "http://www.openwall.com/lists/oss-security/2015/12/14/2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://git.qemu.org/?p=qemu.git;a=commit;h=43b11a91dd861a946b231b89b754285",
|
"name": "80761",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "http://git.qemu.org/?p=qemu.git;a=commit;h=43b11a91dd861a946b231b89b754285"
|
"url": "http://www.securityfocus.com/bid/80761"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1291137",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1291137"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3471",
|
"name": "DSA-3471",
|
||||||
@ -73,9 +68,14 @@
|
|||||||
"url": "http://www.debian.org/security/2016/dsa-3471"
|
"url": "http://www.debian.org/security/2016/dsa-3471"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "FEDORA-2016-e9bba2bb01",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1291137",
|
||||||
"refsource" : "FEDORA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291137"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.qemu.org/?p=qemu.git;a=commit;h=43b11a91dd861a946b231b89b754285",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=43b11a91dd861a946b231b89b754285"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "GLSA-201602-01",
|
"name": "GLSA-201602-01",
|
||||||
@ -83,9 +83,9 @@
|
|||||||
"url": "https://security.gentoo.org/glsa/201602-01"
|
"url": "https://security.gentoo.org/glsa/201602-01"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "80761",
|
"name": "FEDORA-2016-e9bba2bb01",
|
||||||
"refsource" : "BID",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://www.securityfocus.com/bid/80761"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2015-8202",
|
"ID": "CVE-2015-8202",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2015-8746",
|
"ID": "CVE-2015-8746",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,21 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20160105 CVE request -- linux kernel: nfs: kernel panic occurs at nfs client when nfsv4.2 migration is executed",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2016/01/05/9"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18e3b739fdc826481c6a1335ce0c5b19b3d415da",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18e3b739fdc826481c6a1335ce0c5b19b3d415da"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.2",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1295802",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1295802",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -77,20 +62,35 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/torvalds/linux/commit/18e3b739fdc826481c6a1335ce0c5b19b3d415da"
|
"url": "https://github.com/torvalds/linux/commit/18e3b739fdc826481c6a1335ce0c5b19b3d415da"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2016:2574",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2574.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:2584",
|
"name": "RHSA-2016:2584",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-2584.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2584.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2016:2574",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-2574.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1034594",
|
"name": "1034594",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1034594"
|
"url": "http://www.securitytracker.com/id/1034594"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20160105 CVE request -- linux kernel: nfs: kernel panic occurs at nfs client when nfsv4.2 migration is executed",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2016/01/05/9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.2",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18e3b739fdc826481c6a1335ce0c5b19b3d415da",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18e3b739fdc826481c6a1335ce0c5b19b3d415da"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-0418",
|
"ID": "CVE-2016-0418",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2016-1111",
|
"ID": "CVE-2016-1111",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-273/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-273/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html",
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html"
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-02.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-273/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-273/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2016-1342",
|
"ID": "CVE-2016-1342",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-5513",
|
"ID": "CVE-2016-5513",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-5538",
|
"ID": "CVE-2016-5538",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2016-5618",
|
"ID": "CVE-2016-5618",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "40200",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/40200/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#856152",
|
"name": "VU#856152",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "92318",
|
"name": "92318",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/92318"
|
"url": "http://www.securityfocus.com/bid/92318"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "40200",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/40200/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2018-2243",
|
"ID": "CVE-2018-2243",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -61,16 +61,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://launchpad.support.sap.com/#/notes/2523961",
|
"name": "https://launchpad.support.sap.com/#/notes/2523961",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://launchpad.support.sap.com/#/notes/2523961"
|
"url": "https://launchpad.support.sap.com/#/notes/2523961"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "102448",
|
"name": "102448",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1040693",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1040693"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "103812",
|
"name": "103812",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/103812"
|
"url": "http://www.securityfocus.com/bid/103812"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1040693",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1040693"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "Secure@Microsoft.com",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2019-0588",
|
"ID": "CVE-2019-0588",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.ichain.co.jp/security20190311.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.ichain.co.jp/security20190311.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "JVN#11622218",
|
"name": "JVN#11622218",
|
||||||
"refsource": "JVN",
|
"refsource": "JVN",
|
||||||
"url": "http://jvn.jp/en/jp/JVN11622218/index.html"
|
"url": "http://jvn.jp/en/jp/JVN11622218/index.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.ichain.co.jp/security20190311.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.ichain.co.jp/security20190311.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user