mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
864b6ba5d3
commit
d9b50410b4
@ -53,54 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3874",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3874"
|
||||
"name": "35881",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35881"
|
||||
},
|
||||
{
|
||||
"name": "23880",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23880"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1734",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1734"
|
||||
},
|
||||
{
|
||||
"name" : "35880",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35880"
|
||||
},
|
||||
{
|
||||
"name" : "35881",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35881"
|
||||
},
|
||||
{
|
||||
"name" : "35882",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35882"
|
||||
},
|
||||
{
|
||||
"name" : "35883",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35883"
|
||||
},
|
||||
{
|
||||
"name" : "35884",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35884"
|
||||
},
|
||||
{
|
||||
"name": "35885",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35885"
|
||||
},
|
||||
{
|
||||
"name" : "35886",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35886"
|
||||
"name": "cgx-pathcgx-file-include(34188)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34188"
|
||||
},
|
||||
{
|
||||
"name": "25214",
|
||||
@ -108,9 +78,39 @@
|
||||
"url": "http://secunia.com/advisories/25214"
|
||||
},
|
||||
{
|
||||
"name" : "cgx-pathcgx-file-include(34188)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34188"
|
||||
"name": "ADV-2007-1734",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1734"
|
||||
},
|
||||
{
|
||||
"name": "35886",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35886"
|
||||
},
|
||||
{
|
||||
"name": "3874",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3874"
|
||||
},
|
||||
{
|
||||
"name": "35884",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35884"
|
||||
},
|
||||
{
|
||||
"name": "35883",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35883"
|
||||
},
|
||||
{
|
||||
"name": "35880",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35880"
|
||||
},
|
||||
{
|
||||
"name": "35882",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35882"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "102965",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102965-1"
|
||||
},
|
||||
{
|
||||
"name" : "24466",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24466"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2190",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2190"
|
||||
},
|
||||
{
|
||||
"name" : "36592",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/36592"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:1092",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1092"
|
||||
},
|
||||
{
|
||||
"name" : "1018253",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018253"
|
||||
"name": "solaris-nfs-xdr-dos(34857)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34857"
|
||||
},
|
||||
{
|
||||
"name": "25668",
|
||||
@ -88,9 +63,34 @@
|
||||
"url": "http://secunia.com/advisories/25668"
|
||||
},
|
||||
{
|
||||
"name" : "solaris-nfs-xdr-dos(34857)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34857"
|
||||
"name": "36592",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36592"
|
||||
},
|
||||
{
|
||||
"name": "1018253",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018253"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2190",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2190"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:1092",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1092"
|
||||
},
|
||||
{
|
||||
"name": "24466",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24466"
|
||||
},
|
||||
{
|
||||
"name": "102965",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102965-1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "36230",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36230"
|
||||
},
|
||||
{
|
||||
"name": "20070602 MyEvent1.6 (template.php) Remote File Inclusion Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "20070602 Re:MyEvent1.6 (template.php) Remote File Inclusion Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/470348/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "36230",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/36230"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,70 +52,75 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "26083",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26083"
|
||||
},
|
||||
{
|
||||
"name": "33220",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33220"
|
||||
},
|
||||
{
|
||||
"name": "20070628 FLEA-2007-0030-1: avahi avahi-glib avahi-sharp",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/472443/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://avahi.org/milestone/Avahi%200.6.20",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://avahi.org/milestone/Avahi%200.6.20"
|
||||
},
|
||||
{
|
||||
"name" : "http://avahi.org/changeset/1482",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://avahi.org/changeset/1482"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1690",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2008/dsa-1690"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:185",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:185"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2007:014",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-696-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-696-1"
|
||||
},
|
||||
{
|
||||
"name" : "24614",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24614"
|
||||
},
|
||||
{
|
||||
"name" : "37507",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/37507"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2317",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2317"
|
||||
},
|
||||
{
|
||||
"name": "1018706",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018706"
|
||||
},
|
||||
{
|
||||
"name": "33279",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33279"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2007:014",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
|
||||
},
|
||||
{
|
||||
"name": "24614",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24614"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2317",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2317"
|
||||
},
|
||||
{
|
||||
"name": "37507",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/37507"
|
||||
},
|
||||
{
|
||||
"name": "25811",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25811"
|
||||
},
|
||||
{
|
||||
"name" : "26083",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26083"
|
||||
"name": "MDKSA-2007:185",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:185"
|
||||
},
|
||||
{
|
||||
"name": "http://avahi.org/changeset/1482",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://avahi.org/changeset/1482"
|
||||
},
|
||||
{
|
||||
"name": "USN-696-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-696-1"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1690",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1690"
|
||||
},
|
||||
{
|
||||
"name": "26791",
|
||||
@ -123,14 +128,9 @@
|
||||
"url": "http://secunia.com/advisories/26791"
|
||||
},
|
||||
{
|
||||
"name" : "33279",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33279"
|
||||
},
|
||||
{
|
||||
"name" : "33220",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33220"
|
||||
"name": "http://avahi.org/milestone/Avahi%200.6.20",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://avahi.org/milestone/Avahi%200.6.20"
|
||||
},
|
||||
{
|
||||
"name": "avahi-assert-dos(35036)",
|
||||
|
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071112 CVE-2007-3694: Cross site scripting (XSS) in broadcast machine",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/483575/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.int21.de/cve/CVE-2007-3694-bm.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.int21.de/cve/CVE-2007-3694-bm.html"
|
||||
},
|
||||
{
|
||||
"name": "26407",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26407"
|
||||
},
|
||||
{
|
||||
"name": "20071112 CVE-2007-3694: Cross site scripting (XSS) in broadcast machine",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/483575/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "3363",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3363"
|
||||
},
|
||||
{
|
||||
"name": "http://www.int21.de/cve/CVE-2007-3694-bm.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.int21.de/cve/CVE-2007-3694-bm.html"
|
||||
},
|
||||
{
|
||||
"name": "broadcast-machine-login-xss(38418)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "eqdkpplus-multiple-unspecified(35763)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35763"
|
||||
},
|
||||
{
|
||||
"name": "26267",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26267"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=528450&group_id=167016",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "25172",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25172"
|
||||
},
|
||||
{
|
||||
"name" : "26267",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26267"
|
||||
},
|
||||
{
|
||||
"name" : "eqdkpplus-multiple-unspecified(35763)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35763"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,21 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/474809/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "25181",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25181"
|
||||
},
|
||||
{
|
||||
"name": "20070802 RE: Re: Guidance Software response to iSEC report on EnCase",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/475335/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "46996",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/46996"
|
||||
},
|
||||
{
|
||||
"name": "[sleuthkit-announce] 20070614 TSK 2.09 Released and new Wiki",
|
||||
"refsource": "MLIST",
|
||||
@ -71,16 +81,6 @@
|
||||
"name": "http://www.isecpartners.com/files/iSEC-Breaking_Forensics_Software-Paper.v1_1.BH2007.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.isecpartners.com/files/iSEC-Breaking_Forensics_Software-Paper.v1_1.BH2007.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "25181",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25181"
|
||||
},
|
||||
{
|
||||
"name" : "46996",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/46996"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,25 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070906 Sophos Anti-Virus 6.5.4 Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/478708/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.sophos.com/support/knowledgebase/article/29150.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.sophos.com/support/knowledgebase/article/29150.html"
|
||||
},
|
||||
{
|
||||
"name" : "25572",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25572"
|
||||
"name": "3107",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3107"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3077",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3077"
|
||||
},
|
||||
{
|
||||
"name": "http://www.sophos.com/support/knowledgebase/article/29150.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.sophos.com/support/knowledgebase/article/29150.html"
|
||||
},
|
||||
{
|
||||
"name": "37527",
|
||||
"refsource": "OSVDB",
|
||||
@ -82,15 +77,20 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26714"
|
||||
},
|
||||
{
|
||||
"name" : "3107",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3107"
|
||||
},
|
||||
{
|
||||
"name": "sophos-zip-xss(36478)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36478"
|
||||
},
|
||||
{
|
||||
"name": "20070906 Sophos Anti-Virus 6.5.4 Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/478708/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "25572",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25572"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071114 Six Remote Memory Corruption Vulnerabilities in IBM WebSphere MQ 6.0",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/483708/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.irmplc.com/index.php/111-Vendor-Alerts#IBM",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.irmplc.com/index.php/111-Vendor-Alerts#IBM"
|
||||
"name": "45302",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/45302"
|
||||
},
|
||||
{
|
||||
"name": "26441",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26441"
|
||||
},
|
||||
{
|
||||
"name" : "45302",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/45302"
|
||||
},
|
||||
{
|
||||
"name": "3381",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3381"
|
||||
},
|
||||
{
|
||||
"name": "http://www.irmplc.com/index.php/111-Vendor-Alerts#IBM",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.irmplc.com/index.php/111-Vendor-Alerts#IBM"
|
||||
},
|
||||
{
|
||||
"name": "20071114 Six Remote Memory Corruption Vulnerabilities in IBM WebSphere MQ 6.0",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/483708/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "39002",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/39002"
|
||||
},
|
||||
{
|
||||
"name": "20071203 Snitz2000 SQL Injection: A user can gain admin level",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/484541/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4687",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4687"
|
||||
"name": "27911",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27911"
|
||||
},
|
||||
{
|
||||
"name": "26688",
|
||||
@ -68,14 +73,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/26688"
|
||||
},
|
||||
{
|
||||
"name" : "39002",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/39002"
|
||||
},
|
||||
{
|
||||
"name" : "27911",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/27911"
|
||||
"name": "4687",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4687"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4766",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4766"
|
||||
},
|
||||
{
|
||||
"name" : "26989",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26989"
|
||||
},
|
||||
{
|
||||
"name": "39620",
|
||||
"refsource": "OSVDB",
|
||||
@ -76,6 +66,16 @@
|
||||
"name": "mblog-index-file-include(39234)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39234"
|
||||
},
|
||||
{
|
||||
"name": "26989",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26989"
|
||||
},
|
||||
{
|
||||
"name": "4766",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4766"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-1150",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[mediawiki-announce] 20100407 MediaWiki security update: 1.15.3 and 1.16.0beta2",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-April/000090.html"
|
||||
"name": "ADV-2010-1055",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1055"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100406 CVE Request: MediaWiki 1.15.3 -- Login CSRF",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2010/04/07/1"
|
||||
"name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_16_0beta2/phase3/RELEASE-NOTES",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_16_0beta2/phase3/RELEASE-NOTES"
|
||||
},
|
||||
{
|
||||
"name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_3/phase3/RELEASE-NOTES",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_3/phase3/RELEASE-NOTES"
|
||||
},
|
||||
{
|
||||
"name": "http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.0beta2.patch.gz",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.0beta2.patch.gz"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100407 Re: CVE Request: MediaWiki 1.15.3 -- Login CSRF",
|
||||
@ -73,39 +83,29 @@
|
||||
"url": "http://download.wikimedia.org/mediawiki/1.15/mediawiki-1.15.3.patch.gz"
|
||||
},
|
||||
{
|
||||
"name" : "http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.0beta2.patch.gz",
|
||||
"name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=23076",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.0beta2.patch.gz"
|
||||
"url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=23076"
|
||||
},
|
||||
{
|
||||
"name" : "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_3/phase3/RELEASE-NOTES",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_3/phase3/RELEASE-NOTES"
|
||||
"name": "[mediawiki-announce] 20100407 MediaWiki security update: 1.15.3 and 1.16.0beta2",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-April/000090.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_16_0beta2/phase3/RELEASE-NOTES",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_16_0beta2/phase3/RELEASE-NOTES"
|
||||
"name": "[oss-security] 20100406 CVE Request: MediaWiki 1.15.3 -- Login CSRF",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/04/07/1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=580418",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=580418"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.wikimedia.org/show_bug.cgi?id=23076",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.wikimedia.org/show_bug.cgi?id=23076"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2041",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2010/dsa-2041"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-1055",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/1055"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "13880",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/13880"
|
||||
},
|
||||
{
|
||||
"name" : "40870",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/40870"
|
||||
},
|
||||
{
|
||||
"name": "36028",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36028"
|
||||
},
|
||||
{
|
||||
"name": "13880",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/13880"
|
||||
},
|
||||
{
|
||||
"name": "smartasp-default-xss(59473)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59473"
|
||||
},
|
||||
{
|
||||
"name": "40870",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/40870"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2010-5122",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2014-0811",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN24730765/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2014-000012",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000012"
|
||||
},
|
||||
{
|
||||
"name": "65742",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/65742"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2014-000012",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000012"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@mozilla.org",
|
||||
"ID": "CVE-2014-1545",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,140 +52,140 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2014/mfsa2014-55.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2014/mfsa2014-55.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1018783",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1018783"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1107432",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1107432"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2955",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2955"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2960",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2960"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2962",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2962"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201504-01",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0855",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0858",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:0824",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0797",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0819",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2265-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2265-1"
|
||||
},
|
||||
{
|
||||
"name" : "67975",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/67975"
|
||||
},
|
||||
{
|
||||
"name" : "1030404",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1030404"
|
||||
},
|
||||
{
|
||||
"name" : "58984",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/58984"
|
||||
},
|
||||
{
|
||||
"name": "59229",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59229"
|
||||
},
|
||||
{
|
||||
"name" : "59275",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59275"
|
||||
"name": "openSUSE-SU-2014:0819",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html"
|
||||
},
|
||||
{
|
||||
"name" : "59318",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59318"
|
||||
},
|
||||
{
|
||||
"name" : "59614",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59614"
|
||||
},
|
||||
{
|
||||
"name" : "59377",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59377"
|
||||
"name": "SUSE-SU-2014:0824",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name": "59387",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59387"
|
||||
},
|
||||
{
|
||||
"name": "67975",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/67975"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018783",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1018783"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2962",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2962"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0855",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0797",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html"
|
||||
},
|
||||
{
|
||||
"name": "59614",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59614"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201504-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201504-01"
|
||||
},
|
||||
{
|
||||
"name": "1030404",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030404"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0858",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "59377",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59377"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2014/mfsa2014-55.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-55.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1107432",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107432"
|
||||
},
|
||||
{
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2960",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2960"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2955",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2955"
|
||||
},
|
||||
{
|
||||
"name": "59318",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59318"
|
||||
},
|
||||
{
|
||||
"name": "58984",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/58984"
|
||||
},
|
||||
{
|
||||
"name": "59425",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59425"
|
||||
},
|
||||
{
|
||||
"name": "59275",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59275"
|
||||
},
|
||||
{
|
||||
"name": "59486",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59486"
|
||||
},
|
||||
{
|
||||
"name": "USN-2265-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2265-1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20140305 CVE-2014-1599 - 39 Type-1 XSS in SFR DSL/Fiber Box",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/531349/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "65973",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/65973"
|
||||
},
|
||||
{
|
||||
"name": "20140305 CVE-2014-1599 - 39 Type-1 XSS in SFR DSL/Fiber Box",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/531349/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"ID": "CVE-2014-5422",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-5723",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
"name": "VU#797657",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/797657"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name" : "VU#797657",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/797657"
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,80 +52,80 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150309 tcpdump 4.7.2 remote crashes",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/534829/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1201798",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201798"
|
||||
},
|
||||
{
|
||||
"name" : "http://advisories.mageia.org/MGASA-2015-0114.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://advisories.mageia.org/MGASA-2015-0114.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3193",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3193"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2015-4939",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153834.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201510-04",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201510-04"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2015:125",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:125"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2015:182",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:182"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1871",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1871"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:0616",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2580-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2580-1"
|
||||
},
|
||||
{
|
||||
"name": "73021",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/73021"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2015-4939",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153834.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2015:125",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:125"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1871",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1871"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
|
||||
},
|
||||
{
|
||||
"name": "1031937",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031937"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201510-04",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201510-04"
|
||||
},
|
||||
{
|
||||
"name": "http://advisories.mageia.org/MGASA-2015-0114.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://advisories.mageia.org/MGASA-2015-0114.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2580-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2580-1"
|
||||
},
|
||||
{
|
||||
"name": "20150309 tcpdump 4.7.2 remote crashes",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/534829/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0616",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2015:182",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:182"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3193",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3193"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-6201",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2016-1000339",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,9 +58,9 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0"
|
||||
"name": "RHSA-2018:2669",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2",
|
||||
@ -73,19 +73,19 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:2669",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2669"
|
||||
"name": "USN-3727-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3727-1/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:2927",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3727-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3727-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2016-10150",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20170118 CVE request Kernel: kvm: use-after-free issue while creating devices",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2017/01/18/10"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0f1d21c1ccb1da66629627a74059dd7f5ac9c61",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0f1d21c1ccb1da66629627a74059dd7f5ac9c61"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.13",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.13"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1414506",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1414506"
|
||||
"name": "[oss-security] 20170118 CVE request Kernel: kvm: use-after-free issue while creating devices",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/01/18/10"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/torvalds/linux/commit/a0f1d21c1ccb1da66629627a74059dd7f5ac9c61",
|
||||
@ -81,6 +71,16 @@
|
||||
"name": "95672",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95672"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0f1d21c1ccb1da66629627a74059dd7f5ac9c61",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0f1d21c1ccb1da66629627a74059dd7f5ac9c61"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1414506",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414506"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-4245",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,25 +53,15 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
|
||||
"name": "SUSE-SU-2016:1826",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201607-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201607-03"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:1423",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1423"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2016:1826",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1802",
|
||||
"refsource": "SUSE",
|
||||
@ -82,6 +72,16 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91725"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-25.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2016:1423",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2016:1423"
|
||||
},
|
||||
{
|
||||
"name": "1036280",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://blog.fuzzing-project.org/44-dosfstools-fsck.vfat-Several-invalid-memory-accesses.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://blog.fuzzing-project.org/44-dosfstools-fsck.vfat-Several-invalid-memory-accesses.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/dosfstools/dosfstools/commit/e8eff147e9da1185f9afd5b25948153a3b97cf52",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/dosfstools/dosfstools/commit/e8eff147e9da1185f9afd5b25948153a3b97cf52"
|
||||
"name": "openSUSE-SU-2016:1461",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/dosfstools/dosfstools/issues/25",
|
||||
@ -68,29 +63,34 @@
|
||||
"url": "https://github.com/dosfstools/dosfstools/issues/25"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/dosfstools/dosfstools/issues/26",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/dosfstools/dosfstools/issues/26"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1461",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-06/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:2233",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-09/msg00014.html"
|
||||
"name": "https://blog.fuzzing-project.org/44-dosfstools-fsck.vfat-Several-invalid-memory-accesses.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://blog.fuzzing-project.org/44-dosfstools-fsck.vfat-Several-invalid-memory-accesses.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2986-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2986-1"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/dosfstools/dosfstools/issues/26",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/dosfstools/dosfstools/issues/26"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:2233",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name": "90311",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/90311"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/dosfstools/dosfstools/commit/e8eff147e9da1185f9afd5b25948153a3b97cf52",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/dosfstools/dosfstools/commit/e8eff147e9da1185f9afd5b25948153a3b97cf52"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-8422",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "40682",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/40682/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.alienvault.com/forums/discussion/7766/security-advisory-alienvault-5-3-2-address-70-vulnerabilities",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.alienvault.com/forums/discussion/7766/security-advisory-alienvault-5-3-2-address-70-vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name": "40682",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/40682/"
|
||||
},
|
||||
{
|
||||
"name": "93864",
|
||||
"refsource": "BID",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-9302",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-9501",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,16 +52,36 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20161130 cve-request: linux kernel - memory leak in xfs attribute mechanism.",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/11/30/1"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2e83b79b2d6c78bf1b4aa227938a214dcbddc83f",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2e83b79b2d6c78bf1b4aa227938a214dcbddc83f"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2669",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2669"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/torvalds/linux/commit/2e83b79b2d6c78bf1b4aa227938a214dcbddc83f",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/torvalds/linux/commit/2e83b79b2d6c78bf1b4aa227938a214dcbddc83f"
|
||||
},
|
||||
{
|
||||
"name": "94593",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94593"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2077",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2077"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1842",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1842"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1",
|
||||
"refsource": "CONFIRM",
|
||||
@ -73,29 +93,9 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396941"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/2e83b79b2d6c78bf1b4aa227938a214dcbddc83f",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/torvalds/linux/commit/2e83b79b2d6c78bf1b4aa227938a214dcbddc83f"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2669",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2669"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1842",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1842"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2077",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2077"
|
||||
},
|
||||
{
|
||||
"name" : "94593",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94593"
|
||||
"name": "[oss-security] 20161130 cve-request: linux kernel - memory leak in xfs attribute mechanism.",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/11/30/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
|
||||
"DATE_ASSIGNED": "2019-03-06T22:44:37.388179",
|
||||
"ID": "CVE-2019-1003039",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
|
@ -73,15 +73,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102889",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102889"
|
||||
},
|
||||
{
|
||||
"name": "107217",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/107217"
|
||||
},
|
||||
{
|
||||
"name": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102889",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102889"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user