mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
2f479effaa
commit
d8c2c35cb2
@ -58,9 +58,9 @@
|
||||
"url": "http://www.iss.net/security_center/alerts/advise113.php"
|
||||
},
|
||||
{
|
||||
"name" : "20020201-01-P",
|
||||
"refsource" : "SGI",
|
||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20020201-01-P"
|
||||
"name": "irix-snmp-bo(7846)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/7846.php"
|
||||
},
|
||||
{
|
||||
"name": "4421",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/4421"
|
||||
},
|
||||
{
|
||||
"name" : "irix-snmp-bo(7846)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/7846.php"
|
||||
"name": "20020201-01-P",
|
||||
"refsource": "SGI",
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20020201-01-P"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://online.securityfocus.com/archive/1/250815"
|
||||
},
|
||||
{
|
||||
"name" : "3896",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/3896"
|
||||
},
|
||||
{
|
||||
"name": "chinput-long-env-bo(7911)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/7911.php"
|
||||
},
|
||||
{
|
||||
"name": "3896",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/3896"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "SGI",
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20020504-01-I"
|
||||
},
|
||||
{
|
||||
"name" : "irix-fsrxfs-gain-privileges(9042)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/9042.php"
|
||||
},
|
||||
{
|
||||
"name": "4706",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/4706"
|
||||
},
|
||||
{
|
||||
"name": "irix-fsrxfs-gain-privileges(9042)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/9042.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "A071202-1",
|
||||
"refsource" : "ATSTAKE",
|
||||
"url" : "http://www.atstake.com/research/advisories/2002/a071202-1.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://www.pingtel.com/PingtelAtStakeAdvisoryResponse.jsp",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.pingtel.com/PingtelAtStakeAdvisoryResponse.jsp"
|
||||
},
|
||||
{
|
||||
"name": "A071202-1",
|
||||
"refsource": "ATSTAKE",
|
||||
"url": "http://www.atstake.com/research/advisories/2002/a071202-1.txt"
|
||||
},
|
||||
{
|
||||
"name": "5221",
|
||||
"refsource": "BID",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ncipher-consolecallback-passphrase-leak(9354)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/9354.php"
|
||||
},
|
||||
{
|
||||
"name": "20020617 nCipher Advisory #4: Console Java apps can leak passphrases on Windows",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "5024",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5024"
|
||||
},
|
||||
{
|
||||
"name" : "ncipher-consolecallback-passphrase-leak(9354)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/9354.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-054"
|
||||
},
|
||||
{
|
||||
"name" : "win-zip-incorrect-path(10252)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/10252.php"
|
||||
},
|
||||
{
|
||||
"name": "5876",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5876"
|
||||
},
|
||||
{
|
||||
"name": "win-zip-incorrect-path(10252)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/10252.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "CSSA-2002-SCO.41",
|
||||
"refsource" : "CALDERA",
|
||||
"url" : "ftp://ftp.sco.com/pub/updates/OpenUNIX/CSSA-2002-SCO.41"
|
||||
"name": "6025",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/6025"
|
||||
},
|
||||
{
|
||||
"name": "openunix-unixware-rcp-dos(10425)",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.iss.net/security_center/static/10425.php"
|
||||
},
|
||||
{
|
||||
"name" : "6025",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/6025"
|
||||
"name": "CSSA-2002-SCO.41",
|
||||
"refsource": "CALDERA",
|
||||
"url": "ftp://ftp.sco.com/pub/updates/OpenUNIX/CSSA-2002-SCO.41"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020820 vulnerabilities in scponly",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://online.securityfocus.com/archive/1/288245"
|
||||
},
|
||||
{
|
||||
"name": "http://www.sublimation.org/scponly/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.sublimation.org/scponly/"
|
||||
},
|
||||
{
|
||||
"name" : "5526",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/5526"
|
||||
},
|
||||
{
|
||||
"name": "scponly-ssh-env-upload(9913)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/9913.php"
|
||||
},
|
||||
{
|
||||
"name": "20020820 vulnerabilities in scponly",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://online.securityfocus.com/archive/1/288245"
|
||||
},
|
||||
{
|
||||
"name": "5526",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5526"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020903 SecuRemote usernames can be guessed or sniffed using IKE exchange",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/290202"
|
||||
"name": "20020903 Check Point statement on use of IKE Aggressive Mode",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2002-September/001223.html"
|
||||
},
|
||||
{
|
||||
"name": "20020911 RE: SecuRemote usernames can be guessed or sniffed using IKE",
|
||||
@ -63,29 +63,9 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=103176164729351&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.nta-monitor.com/news/checkpoint.htm",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.nta-monitor.com/news/checkpoint.htm"
|
||||
},
|
||||
{
|
||||
"name" : "20020903 Check Point statement on use of IKE Aggressive Mode",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2002-September/001223.html"
|
||||
},
|
||||
{
|
||||
"name" : "20020905 RE: SecuRemote usernames can be guessed or sniffed using IKE exchange",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=103124812629621&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.checkpoint.com/techsupport/alerts/ike.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.checkpoint.com/techsupport/alerts/ike.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.securiteam.com/securitynews/5TP040U8AW.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.securiteam.com/securitynews/5TP040U8AW.html"
|
||||
"name": "5607",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5607"
|
||||
},
|
||||
{
|
||||
"name": "VU#886601",
|
||||
@ -93,14 +73,34 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/886601"
|
||||
},
|
||||
{
|
||||
"name" : "5607",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/5607"
|
||||
"name": "http://www.nta-monitor.com/news/checkpoint.htm",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.nta-monitor.com/news/checkpoint.htm"
|
||||
},
|
||||
{
|
||||
"name": "http://www.checkpoint.com/techsupport/alerts/ike.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.checkpoint.com/techsupport/alerts/ike.html"
|
||||
},
|
||||
{
|
||||
"name": "20020903 SecuRemote usernames can be guessed or sniffed using IKE exchange",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/290202"
|
||||
},
|
||||
{
|
||||
"name": "20020905 RE: SecuRemote usernames can be guessed or sniffed using IKE exchange",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=103124812629621&w=2"
|
||||
},
|
||||
{
|
||||
"name": "fw1-ike-username-enumeration(10034)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10034"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securiteam.com/securitynews/5TP040U8AW.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securiteam.com/securitynews/5TP040U8AW.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20021101 Weak Password Encryption Scheme in Integrated Dialer",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-10/0438.html"
|
||||
},
|
||||
{
|
||||
"name": "integrated-dialer-weak-encryption(10517)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/10517.php"
|
||||
},
|
||||
{
|
||||
"name": "20021101 Weak Password Encryption Scheme in Integrated Dialer",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0438.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "BEA02-21.00",
|
||||
"refsource" : "BEA",
|
||||
"url" : "http://dev2dev.bea.com/pub/advisory/39"
|
||||
},
|
||||
{
|
||||
"name": "weblogic-servlet-ejb-security-removal(10291)",
|
||||
"refsource": "XF",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "5846",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5846"
|
||||
},
|
||||
{
|
||||
"name": "BEA02-21.00",
|
||||
"refsource": "BEA",
|
||||
"url": "http://dev2dev.bea.com/pub/advisory/39"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -67,15 +67,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/6343"
|
||||
},
|
||||
{
|
||||
"name" : "ikonboard-xforwardedfor-header-xss(10799)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/10799"
|
||||
},
|
||||
{
|
||||
"name": "ikonboard-html-photo-xss(10797)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/10797.php"
|
||||
},
|
||||
{
|
||||
"name": "ikonboard-xforwardedfor-header-xss(10799)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10799"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20030403 SRT2003-04-03-1300 - Interbase ISC_LOCK_ENV overflow",
|
||||
"refsource" : "VULNWATCH",
|
||||
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0003.html"
|
||||
},
|
||||
{
|
||||
"name": "20030403 SRT2003-04-03-1300 - Interbase ISC_LOCK_ENV overflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "http://www.secnetops.com/research/advisories/SRT2003-04-03-1300.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.secnetops.com/research/advisories/SRT2003-04-03-1300.txt"
|
||||
},
|
||||
{
|
||||
"name": "20030403 SRT2003-04-03-1300 - Interbase ISC_LOCK_ENV overflow",
|
||||
"refsource": "VULNWATCH",
|
||||
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050515 Ultimate Forum Password Database Vulnerability",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2005-05/0350.html"
|
||||
},
|
||||
{
|
||||
"name": "1013974",
|
||||
"refsource": "SECTRACK",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "15374",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15374"
|
||||
},
|
||||
{
|
||||
"name": "20050515 Ultimate Forum Password Database Vulnerability",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-05/0350.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[strongSwan] 20090527 [strongSwan] ANNOUNCE: strongSwan 4.3.1 and 4.2.15 released",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.strongswan.org/pipermail/users/2009-May/003457.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://download.strongswan.org/CHANGES4.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://download.strongswan.org/CHANGES4.txt"
|
||||
"name": "35296",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35296"
|
||||
},
|
||||
{
|
||||
"name": "http://download.strongswan.org/patches/03_invalid_ike_state_patch/strongswan-4.x.x_invalid_ike_state.patch",
|
||||
@ -68,39 +63,44 @@
|
||||
"url": "http://download.strongswan.org/patches/03_invalid_ike_state_patch/strongswan-4.x.x_invalid_ike_state.patch"
|
||||
},
|
||||
{
|
||||
"name" : "http://download.strongswan.org/patches/03_invalid_ike_state_patch/strongswan-4.x.x_invalid_ike_state.readme",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://download.strongswan.org/patches/03_invalid_ike_state_patch/strongswan-4.x.x_invalid_ike_state.readme"
|
||||
"name": "36922",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36922"
|
||||
},
|
||||
{
|
||||
"name": "[strongSwan] 20090527 [strongSwan] ANNOUNCE: strongSwan 4.3.1 and 4.2.15 released",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.strongswan.org/pipermail/users/2009-May/003457.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1899",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2009/dsa-1899"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2009:012",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "35178",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/35178"
|
||||
},
|
||||
{
|
||||
"name" : "35296",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/35296"
|
||||
},
|
||||
{
|
||||
"name": "35685",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35685"
|
||||
},
|
||||
{
|
||||
"name" : "36922",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/36922"
|
||||
"name": "SUSE-SR:2009:012",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "http://download.strongswan.org/CHANGES4.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://download.strongswan.org/CHANGES4.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://download.strongswan.org/patches/03_invalid_ike_state_patch/strongswan-4.x.x_invalid_ike_state.readme",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://download.strongswan.org/patches/03_invalid_ike_state_patch/strongswan-4.x.x_invalid_ike_state.readme"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2012-0111",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201204-01",
|
||||
"refsource": "GENTOO",
|
||||
@ -67,16 +62,21 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00041.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16722",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16722"
|
||||
},
|
||||
{
|
||||
"name": "48755",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48755"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16722",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16722"
|
||||
},
|
||||
{
|
||||
"name": "50897",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2012-0169",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS12-023",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-023"
|
||||
},
|
||||
{
|
||||
"name" : "TA12-101A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA12-101A.html"
|
||||
},
|
||||
{
|
||||
"name" : "52902",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/52902"
|
||||
},
|
||||
{
|
||||
"name": "81127",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/81127"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:15611",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15611"
|
||||
"name": "MS12-023",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-023"
|
||||
},
|
||||
{
|
||||
"name": "1026901",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1026901"
|
||||
},
|
||||
{
|
||||
"name": "TA12-101A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA12-101A.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:15611",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15611"
|
||||
},
|
||||
{
|
||||
"name": "ms-ie-jscript9-code-exec(74380)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74380"
|
||||
},
|
||||
{
|
||||
"name": "52902",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/52902"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"ID": "CVE-2012-3017",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-02.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-02.pdf"
|
||||
},
|
||||
{
|
||||
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-617264.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-617264.pdf"
|
||||
},
|
||||
{
|
||||
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-02.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-02.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2012-3309",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://en.securitylab.ru/lab/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://en.securitylab.ru/lab/"
|
||||
},
|
||||
{
|
||||
"name" : "http://en.securitylab.ru/lab/PT-2012-15",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://en.securitylab.ru/lab/PT-2012-15"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg21609223",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg21609223"
|
||||
},
|
||||
{
|
||||
"name": "infosphere-gaurdium-csrf(77745)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77745"
|
||||
},
|
||||
{
|
||||
"name": "1027455",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1027455"
|
||||
},
|
||||
{
|
||||
"name" : "infosphere-gaurdium-csrf(77745)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/77745"
|
||||
"name": "http://en.securitylab.ru/lab/PT-2012-15",
|
||||
"refsource": "MISC",
|
||||
"url": "http://en.securitylab.ru/lab/PT-2012-15"
|
||||
},
|
||||
{
|
||||
"name": "http://en.securitylab.ru/lab/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://en.securitylab.ru/lab/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2012-3645",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5400",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5400"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5485",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5485"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2012-09-19-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5503",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5503"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2012-07-25-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2012-09-12-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2012-09-19-1",
|
||||
"name": "APPLE-SA-2012-07-25-1",
|
||||
"refsource": "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5400",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5400"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/18874"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vulnerability-lab.com/get_content.php?id=513",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.vulnerability-lab.com/get_content.php?id=513"
|
||||
},
|
||||
{
|
||||
"name": "53491",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53491"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vulnerability-lab.com/get_content.php?id=513",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.vulnerability-lab.com/get_content.php?id=513"
|
||||
},
|
||||
{
|
||||
"name": "49132",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2012-4659",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -58,20 +58,15 @@
|
||||
"url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-3g-a11.c?r1=45337&r2=45336&pathrev=45337"
|
||||
},
|
||||
{
|
||||
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45337",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45337"
|
||||
"name": "oval:org.mitre.oval:def:16044",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16044"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2012-39.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2012-39.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7801",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7801"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2012:1633",
|
||||
"refsource": "SUSE",
|
||||
@ -83,9 +78,14 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16044",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16044"
|
||||
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45337",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45337"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7801",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7801"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-2033",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "97137",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97137"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207601",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207601"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207602",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207602"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207615",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207615"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207617",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207617"
|
||||
},
|
||||
{
|
||||
"name" : "97137",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/97137"
|
||||
},
|
||||
{
|
||||
"name": "1038138",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038138"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207602",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207602"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207617",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207617"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-087-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-087-01"
|
||||
"name": "97170",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97170"
|
||||
},
|
||||
{
|
||||
"name": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-327980.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-327980.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "97170",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/97170"
|
||||
},
|
||||
{
|
||||
"name": "1038160",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038160"
|
||||
},
|
||||
{
|
||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-087-01",
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-087-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0351",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0351"
|
||||
},
|
||||
{
|
||||
"name": "99184",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99184"
|
||||
},
|
||||
{
|
||||
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0351",
|
||||
"refsource": "MISC",
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0351"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-FireSIGHT"
|
||||
},
|
||||
{
|
||||
"name" : "99460",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/99460"
|
||||
},
|
||||
{
|
||||
"name": "1038826",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038826"
|
||||
},
|
||||
{
|
||||
"name": "99460",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99460"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "anemec@redhat.com",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2017-7530",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -65,6 +65,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "100151",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/100151"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7530",
|
||||
"refsource": "CONFIRM",
|
||||
@ -74,11 +79,6 @@
|
||||
"name": "RHSA-2017:1758",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1758"
|
||||
},
|
||||
{
|
||||
"name" : "100151",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/100151"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "psampaio@redhat.com",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2018-14653",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -63,9 +63,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20181105 [SECURITY] [DLA 1565-1] glusterfs security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html"
|
||||
"name": "RHSA-2018:3431",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3431"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14653",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14653"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:3431",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:3431"
|
||||
"name": "[debian-lts-announce] 20181105 [SECURITY] [DLA 1565-1] glusterfs security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:3432",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.kryptowire.com/portal/android-firmware-defcon-2018/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.kryptowire.com/portal/android-firmware-defcon-2018/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.kryptowire.com/portal/wp-content/uploads/2018/12/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.kryptowire.com/portal/wp-content/uploads/2018/12/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf"
|
||||
},
|
||||
{
|
||||
"name": "https://www.kryptowire.com/portal/android-firmware-defcon-2018/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.kryptowire.com/portal/android-firmware-defcon-2018/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-15348",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -67,15 +67,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20181107 Cisco Content Security Management Appliance (SMA) Cross-Site Scripting Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sma-xss"
|
||||
},
|
||||
{
|
||||
"name": "105858",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105858"
|
||||
},
|
||||
{
|
||||
"name": "20181107 Cisco Content Security Management Appliance (SMA) Cross-Site Scripting Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-sma-xss"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"DATE_PUBLIC": "2018-10-02T00:00:00",
|
||||
"ID": "CVE-2018-9508",
|
||||
"STATE": "PUBLIC"
|
||||
@ -54,9 +54,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://android.googlesource.com/platform/system/bt/+/e8bbf5b0889790cf8616f4004867f0ff656f0551",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://android.googlesource.com/platform/system/bt/+/e8bbf5b0889790cf8616f4004867f0ff656f0551"
|
||||
"name": "105482",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105482"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2018-10-01,",
|
||||
@ -64,9 +64,9 @@
|
||||
"url": "https://source.android.com/security/bulletin/2018-10-01,"
|
||||
},
|
||||
{
|
||||
"name" : "105482",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/105482"
|
||||
"name": "https://android.googlesource.com/platform/system/bt/+/e8bbf5b0889790cf8616f4004867f0ff656f0551",
|
||||
"refsource": "MISC",
|
||||
"url": "https://android.googlesource.com/platform/system/bt/+/e8bbf5b0889790cf8616f4004867f0ff656f0551"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2018-9557",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2018-12-01",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2018-12-01"
|
||||
},
|
||||
{
|
||||
"name": "106147",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106147"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2018-12-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2018-12-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user