mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
96c0e67373
commit
da30d8a7fe
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@debian.org",
|
||||
"ID": "CVE-2006-0599",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi/0003-r1472-Do-not-distinguish-between-invalid-user-name-and-invalid-password.txt?bug=349528;msg=15;att=3",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi/0003-r1472-Do-not-distinguish-between-invalid-user-name-and-invalid-password.txt?bug=349528;msg=15;att=3"
|
||||
"name": "16579",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16579"
|
||||
},
|
||||
{
|
||||
"name": "elog-elog-elogd-user-enumeration(24706)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24706"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349528",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349528"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-967",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-967"
|
||||
},
|
||||
{
|
||||
"name" : "16579",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16579"
|
||||
},
|
||||
{
|
||||
"name": "18783",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18783"
|
||||
},
|
||||
{
|
||||
"name" : "elog-elog-elogd-user-enumeration(24706)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24706"
|
||||
"name": "DSA-967",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-967"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi/0003-r1472-Do-not-distinguish-between-invalid-user-name-and-invalid-password.txt?bug=349528;msg=15;att=3",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi/0003-r1472-Do-not-distinguish-between-invalid-user-name-and-invalid-password.txt?bug=349528;msg=15;att=3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060211 [eVuln] phphg Guestbook Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/424740/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://evuln.com/vulns/58/summary.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://evuln.com/vulns/58/summary.html"
|
||||
"name": "ADV-2006-0480",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0480"
|
||||
},
|
||||
{
|
||||
"name": "16541",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16541"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0480",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0480"
|
||||
},
|
||||
{
|
||||
"name": "1015620",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015620"
|
||||
},
|
||||
{
|
||||
"name": "http://evuln.com/vulns/58/summary.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://evuln.com/vulns/58/summary.html"
|
||||
},
|
||||
{
|
||||
"name": "18758",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18758"
|
||||
},
|
||||
{
|
||||
"name": "20060211 [eVuln] phphg Guestbook Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/424740/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://browserfun.blogspot.com/2006/07/mobb-1-adodbrecordset-filter-property.html"
|
||||
},
|
||||
{
|
||||
"name": "ie-adodb-recordset-dos(27596)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27596"
|
||||
},
|
||||
{
|
||||
"name": "18773",
|
||||
"refsource": "BID",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "26834",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/26834"
|
||||
},
|
||||
{
|
||||
"name" : "ie-adodb-recordset-dos(27596)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27596"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -63,29 +63,29 @@
|
||||
"url": "http://retrogod.altervista.org/pivot_130RC2_xpl.html"
|
||||
},
|
||||
{
|
||||
"name" : "18881",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18881"
|
||||
},
|
||||
{
|
||||
"name" : "27512",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/27512"
|
||||
"name": "pivot-editnew-file-include(27679)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27679"
|
||||
},
|
||||
{
|
||||
"name": "20962",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20962"
|
||||
},
|
||||
{
|
||||
"name": "18881",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18881"
|
||||
},
|
||||
{
|
||||
"name": "1214",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1214"
|
||||
},
|
||||
{
|
||||
"name" : "pivot-editnew-file-include(27679)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27679"
|
||||
"name": "27512",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/27512"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=325285",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=325285"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1148",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1148"
|
||||
},
|
||||
{
|
||||
"name": "19453",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19453"
|
||||
},
|
||||
{
|
||||
"name": "21502",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21502"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=325285",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=325285"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3250",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3250"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1148",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1148"
|
||||
},
|
||||
{
|
||||
"name": "16594",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/16594"
|
||||
},
|
||||
{
|
||||
"name" : "21502",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21502"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "21347",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21347"
|
||||
},
|
||||
{
|
||||
"name": "19421",
|
||||
"refsource": "BID",
|
||||
@ -67,11 +72,6 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/27789"
|
||||
},
|
||||
{
|
||||
"name" : "21347",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21347"
|
||||
},
|
||||
{
|
||||
"name": "netiouscms-sessionmgmt-session-hijacking(28264)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,46 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060929 Matasano Advisory: MacOS X Mach Exception Server Privilege Escalation",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/447396/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.matasano.com/log/530/matasano-advisory-macos-x-mach-exception-server-privilege-escalation/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.matasano.com/log/530/matasano-advisory-macos-x-mach-exception-server-privilege-escalation/"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2006-09-29",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA06-275A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-275A.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#838404",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/838404"
|
||||
},
|
||||
{
|
||||
"name": "20271",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20271"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3852",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3852"
|
||||
},
|
||||
{
|
||||
"name" : "29269",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/29269"
|
||||
},
|
||||
{
|
||||
"name": "1016954",
|
||||
"refsource": "SECTRACK",
|
||||
@ -102,11 +67,46 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22187"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3852",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3852"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2006-09-29",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "20060929 Matasano Advisory: MacOS X Mach Exception Server Privilege Escalation",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/447396/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "VU#838404",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/838404"
|
||||
},
|
||||
{
|
||||
"name": "29269",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/29269"
|
||||
},
|
||||
{
|
||||
"name": "TA06-275A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA06-275A.html"
|
||||
},
|
||||
{
|
||||
"name": "1663",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1663"
|
||||
},
|
||||
{
|
||||
"name": "http://www.matasano.com/log/530/matasano-advisory-macos-x-mach-exception-server-privilege-escalation/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.matasano.com/log/530/matasano-advisory-macos-x-mach-exception-server-privilege-escalation/"
|
||||
},
|
||||
{
|
||||
"name": "macos-kernel-code-execution(29281)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "21661",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21661"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3394",
|
||||
"refsource": "VUPEN",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "28247",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/28247"
|
||||
},
|
||||
{
|
||||
"name" : "21661",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21661"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "2798",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/2798"
|
||||
},
|
||||
{
|
||||
"name" : "21145",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21145"
|
||||
"name": "powies-matchdetail-sql-injection(30360)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30360"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4611",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://secunia.com/advisories/22966"
|
||||
},
|
||||
{
|
||||
"name" : "powies-matchdetail-sql-injection(30360)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30360"
|
||||
"name": "21145",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21145"
|
||||
},
|
||||
{
|
||||
"name": "2798",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2798"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "2846",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/2846"
|
||||
},
|
||||
{
|
||||
"name": "21292",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21292"
|
||||
},
|
||||
{
|
||||
"name": "liberum-details-sql-injection(30485)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30485"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4704",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4704"
|
||||
},
|
||||
{
|
||||
"name" : "liberum-details-sql-injection(30485)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30485"
|
||||
"name": "2846",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2846"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "ADV-2006-4905",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4905"
|
||||
},
|
||||
{
|
||||
"name": "jowamp-execinbackground-command-execution(30781)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30781"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4905",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4905"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,34 +58,9 @@
|
||||
"url": "http://docs.info.apple.com/article.html?artnum=307177"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2007-12-14",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200701-15",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200701-15.xml"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200702-08",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200702-08.xml"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200705-20",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200705-20.xml"
|
||||
"name": "26049",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26049"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0062",
|
||||
@ -93,54 +68,14 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0062.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0072",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0072.html"
|
||||
"name": "24099",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24099"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2007:0073",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0073.html"
|
||||
},
|
||||
{
|
||||
"name" : "102732",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102732-1"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:003",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0003.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:010",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2007:045",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2007_45_java.html"
|
||||
},
|
||||
{
|
||||
"name" : "21674",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21674"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:9729",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9729"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-5075",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/5075"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-4224",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/4224"
|
||||
"name": "25404",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25404"
|
||||
},
|
||||
{
|
||||
"name": "1017427",
|
||||
@ -148,9 +83,64 @@
|
||||
"url": "http://securitytracker.com/id?1017427"
|
||||
},
|
||||
{
|
||||
"name" : "23398",
|
||||
"name": "24189",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23398"
|
||||
"url": "http://secunia.com/advisories/24189"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-5075",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/5075"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:045",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_45_java.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2007-12-14",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:003",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0003.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:9729",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9729"
|
||||
},
|
||||
{
|
||||
"name": "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.novell.com/techcenter/psdb/4f850d1e2b871db609de64ec70f0089c.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2007:010",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html"
|
||||
},
|
||||
{
|
||||
"name": "26119",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26119"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0072",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0072.html"
|
||||
},
|
||||
{
|
||||
"name": "21674",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21674"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-4224",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/4224"
|
||||
},
|
||||
{
|
||||
"name": "23650",
|
||||
@ -163,34 +153,44 @@
|
||||
"url": "http://secunia.com/advisories/23835"
|
||||
},
|
||||
{
|
||||
"name" : "24099",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24099"
|
||||
"name": "RHSA-2007:0073",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0073.html"
|
||||
},
|
||||
{
|
||||
"name" : "24189",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24189"
|
||||
},
|
||||
{
|
||||
"name" : "25404",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/25404"
|
||||
},
|
||||
{
|
||||
"name" : "26049",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26049"
|
||||
},
|
||||
{
|
||||
"name" : "26119",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26119"
|
||||
"name": "GLSA-200705-20",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200705-20.xml"
|
||||
},
|
||||
{
|
||||
"name": "28115",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28115"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200702-08",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200702-08.xml"
|
||||
},
|
||||
{
|
||||
"name": "23398",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23398"
|
||||
},
|
||||
{
|
||||
"name": "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.novell.com/techcenter/psdb/d2f549cc040cd81ae4a268bb5edfe918.html"
|
||||
},
|
||||
{
|
||||
"name": "102732",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102732-1"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200701-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200701-15.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "2850",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/2850"
|
||||
},
|
||||
{
|
||||
"name": "21313",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "exhibitengine-styles-file-include(30516)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30516"
|
||||
},
|
||||
{
|
||||
"name": "2850",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2850"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,25 +57,25 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/796618"
|
||||
},
|
||||
{
|
||||
"name" : "http://drupal.org/node/796620",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://drupal.org/node/796620"
|
||||
},
|
||||
{
|
||||
"name": "http://drupal.org/node/797208",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/797208"
|
||||
},
|
||||
{
|
||||
"name" : "40119",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/40119"
|
||||
"name": "http://drupal.org/node/796620",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/796620"
|
||||
},
|
||||
{
|
||||
"name": "39811",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/39811"
|
||||
},
|
||||
{
|
||||
"name": "40119",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/40119"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ipa.go.jp/about/press/20101012.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.ipa.go.jp/about/press/20101012.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www7a.biglobe.ne.jp/~schezo/dll_vul.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www7a.biglobe.ne.jp/~schezo/dll_vul.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVN#82752978",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/en/jp/JVN82752978/index.html"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2010-000037",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000037.html"
|
||||
},
|
||||
{
|
||||
"name": "JVN#82752978",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN82752978/index.html"
|
||||
},
|
||||
{
|
||||
"name": "41742",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41742"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ipa.go.jp/about/press/20101012.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.ipa.go.jp/about/press/20101012.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@ubuntu.com",
|
||||
"ID": "CVE-2010-2961",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ADV-2010-2342",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/2342"
|
||||
},
|
||||
{
|
||||
"name": "67914",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/67914"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.launchpad.net/ubuntu/+source/mountall/+bug/591807",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,20 +72,10 @@
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-985-1"
|
||||
},
|
||||
{
|
||||
"name" : "67914",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/67914"
|
||||
},
|
||||
{
|
||||
"name": "41351",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41351"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-2342",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/2342"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,39 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20100701 CVE request: moin multiple XSS",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=127799369406968&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100702 Re: CVE request: moin multiple XSS",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=127809682420259&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809"
|
||||
},
|
||||
{
|
||||
"name" : "http://hg.moinmo.in/moin/1.7/rev/37306fba2189",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://hg.moinmo.in/moin/1.7/rev/37306fba2189"
|
||||
},
|
||||
{
|
||||
"name" : "http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES"
|
||||
},
|
||||
{
|
||||
"name" : "http://hg.moinmo.in/moin/1.9/rev/e50b087c4572",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://hg.moinmo.in/moin/1.9/rev/e50b087c4572"
|
||||
},
|
||||
{
|
||||
"name" : "http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg"
|
||||
"name": "ADV-2010-1981",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1981"
|
||||
},
|
||||
{
|
||||
"name": "http://moinmo.in/MoinMoinRelease1.9",
|
||||
@ -97,15 +67,45 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://moinmo.in/SecurityFixes"
|
||||
},
|
||||
{
|
||||
"name": "40549",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/40549"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2083",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2010/dsa-2083"
|
||||
},
|
||||
{
|
||||
"name" : "40549",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/40549"
|
||||
"name": "http://hg.moinmo.in/moin/1.9/rev/e50b087c4572",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://hg.moinmo.in/moin/1.9/rev/e50b087c4572"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584809"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100701 CVE request: moin multiple XSS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=127799369406968&w=2"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100702 Re: CVE request: moin multiple XSS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=127809682420259&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://hg.moinmo.in/moin/1.9/raw-file/1.9.3/docs/CHANGES"
|
||||
},
|
||||
{
|
||||
"name": "http://hg.moinmo.in/moin/1.7/rev/37306fba2189",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://hg.moinmo.in/moin/1.7/rev/37306fba2189"
|
||||
},
|
||||
{
|
||||
"name": "40836",
|
||||
@ -113,9 +113,9 @@
|
||||
"url": "http://secunia.com/advisories/40836"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-1981",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/1981"
|
||||
"name": "http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://moinmo.in/MoinMoinBugs/1.9.2UnescapedInputForThemeAddMsg"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://qt.nokia.com/about/news/security-announcement-qt-creator-2.0.0-for-desktop-platforms",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://qt.nokia.com/about/news/security-announcement-qt-creator-2.0.0-for-desktop-platforms"
|
||||
"name": "ADV-2010-2559",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/2559"
|
||||
},
|
||||
{
|
||||
"name": "http://www.qt.gitorious.org/qt-creator/qt-creator/commit/3c00715c8e90c57953ec4a8716110f6954e524e4",
|
||||
@ -72,15 +72,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/43672"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-2559",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/2559"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-2560",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/2560"
|
||||
},
|
||||
{
|
||||
"name": "http://qt.nokia.com/about/news/security-announcement-qt-creator-2.0.0-for-desktop-platforms",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://qt.nokia.com/about/news/security-announcement-qt-creator-2.0.0-for-desktop-platforms"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2011-0173",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4581",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4581"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-03-21-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4581",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4581"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2011-0280",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBMA02629",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2011-03/0111.html"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT100381",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2011-03/0111.html"
|
||||
"name": "powermanager-unspecified-xss(66035)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66035"
|
||||
},
|
||||
{
|
||||
"name": "46830",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://secunia.com/advisories/43058"
|
||||
},
|
||||
{
|
||||
"name" : "powermanager-unspecified-xss(66035)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66035"
|
||||
"name": "HPSBMA02629",
|
||||
"refsource": "HP",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2011-03/0111.html"
|
||||
},
|
||||
{
|
||||
"name": "SSRT100381",
|
||||
"refsource": "HP",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2011-03/0111.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-0584",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-04.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-04.html"
|
||||
"name": "adobe-coldfusion-session-hijacking(65280)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65280"
|
||||
},
|
||||
{
|
||||
"name" : "46278",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/46278"
|
||||
"name": "ADV-2011-0334",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0334"
|
||||
},
|
||||
{
|
||||
"name": "1025036",
|
||||
@ -73,14 +73,14 @@
|
||||
"url": "http://secunia.com/advisories/43264"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0334",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0334"
|
||||
"name": "46278",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/46278"
|
||||
},
|
||||
{
|
||||
"name" : "adobe-coldfusion-session-hijacking(65280)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65280"
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb11-04.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb11-04.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2011-0705",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -58,24 +58,24 @@
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=71960"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html"
|
||||
"name": "google-chrome-webgl-dos(65740)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65740"
|
||||
},
|
||||
{
|
||||
"name": "46614",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/46614"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14559",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14559"
|
||||
},
|
||||
{
|
||||
"name" : "google-chrome-webgl-dos(65740)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65740"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2011-1262",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS11-050",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-050"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:12405",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12405"
|
||||
},
|
||||
{
|
||||
"name": "MS11-050",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-050"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,51 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20110327 TSSA-2011-01 xpdf : multiple vulnerabilities allow remote code execution",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/517205/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.toucan-system.com/advisories/tssa-2011-01.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.toucan-system.com/advisories/tssa-2011-01.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.foolabs.com/xpdf/download.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.foolabs.com/xpdf/download.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201701-57",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201701-57"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2012:144",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:1201",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#376500",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/376500"
|
||||
},
|
||||
{
|
||||
"name" : "1025266",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1025266"
|
||||
},
|
||||
{
|
||||
"name": "43823",
|
||||
"refsource": "SECUNIA",
|
||||
@ -112,10 +67,55 @@
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/8171"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kb.cert.org/vuls/id/MAPG-8ECL8X"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0728",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0728"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1201",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.foolabs.com/xpdf/download.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.foolabs.com/xpdf/download.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.toucan-system.com/advisories/tssa-2011-01.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.toucan-system.com/advisories/tssa-2011-01.txt"
|
||||
},
|
||||
{
|
||||
"name": "VU#376500",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/376500"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:144",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-57",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-57"
|
||||
},
|
||||
{
|
||||
"name": "1025266",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1025266"
|
||||
},
|
||||
{
|
||||
"name": "20110327 TSSA-2011-01 xpdf : multiple vulnerabilities allow remote code execution",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/517205/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-1957",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,54 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20110531 CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2011/05/31/20"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110601 Re: CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2011/06/01/1"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110601 Re: CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2011/06/01/11"
|
||||
},
|
||||
{
|
||||
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=36958",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=36958"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2011-07.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2011-07.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2011-08.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2011-08.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5876",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5876"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=710021",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=710021"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2274",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2011/dsa-2274"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2011-7821",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html"
|
||||
"name": "44958",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/44958"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-7846",
|
||||
@ -108,44 +63,89 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2011-7858",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html"
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2011-07.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2011-07.html"
|
||||
},
|
||||
{
|
||||
"name" : "48066",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/48066"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:14325",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14325"
|
||||
},
|
||||
{
|
||||
"name" : "44449",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/44449"
|
||||
},
|
||||
{
|
||||
"name" : "45149",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/45149"
|
||||
},
|
||||
{
|
||||
"name" : "44958",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/44958"
|
||||
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=36958",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=36958"
|
||||
},
|
||||
{
|
||||
"name": "48947",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48947"
|
||||
},
|
||||
{
|
||||
"name": "48066",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48066"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2011-08.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2011-08.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2274",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2011/dsa-2274"
|
||||
},
|
||||
{
|
||||
"name": "44449",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/44449"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:14325",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14325"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110601 Re: CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2011/06/01/11"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5876",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5876"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110601 Re: CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2011/06/01/1"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-7821",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html"
|
||||
},
|
||||
{
|
||||
"name": "wireshark-dicom-dos(67790)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67790"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110531 CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2011/05/31/20"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=710021",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=710021"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-7858",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html"
|
||||
},
|
||||
{
|
||||
"name": "45149",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/45149"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2011-5371",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2014-3179",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,55 +52,55 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_9.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_9.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=396447",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=396447"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=402255",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=402255"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=403596",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=403596"
|
||||
},
|
||||
{
|
||||
"name" : "https://crbug.com/411014",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://crbug.com/411014"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3039",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-3039"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201409-06",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201409-06.xml"
|
||||
},
|
||||
{
|
||||
"name": "https://crbug.com/411014",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://crbug.com/411014"
|
||||
},
|
||||
{
|
||||
"name": "69710",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/69710"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=396447",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=396447"
|
||||
},
|
||||
{
|
||||
"name": "google-chrome-cve20143179-unspec(95816)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95816"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=403596",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=403596"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_9.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2014/09/stable-channel-update_9.html"
|
||||
},
|
||||
{
|
||||
"name": "61446",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/61446"
|
||||
},
|
||||
{
|
||||
"name" : "google-chrome-cve20143179-unspec(95816)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95816"
|
||||
"name": "DSA-3039",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-3039"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,25 +57,25 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/33555"
|
||||
},
|
||||
{
|
||||
"name" : "http://bot24.blogspot.com/2014/05/auracms-30-cross-site-scripting-local.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://bot24.blogspot.com/2014/05/auracms-30-cross-site-scripting-local.html"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/126843/AuraCMS-3.0-Cross-Site-Scripting-Local-File-Inclusion.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/126843/AuraCMS-3.0-Cross-Site-Scripting-Local-File-Inclusion.html"
|
||||
},
|
||||
{
|
||||
"name" : "107554",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/show/osvdb/107554"
|
||||
},
|
||||
{
|
||||
"name": "58850",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/58850"
|
||||
},
|
||||
{
|
||||
"name": "http://bot24.blogspot.com/2014/05/auracms-30-cross-site-scripting-local.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bot24.blogspot.com/2014/05/auracms-30-cross-site-scripting-local.html"
|
||||
},
|
||||
{
|
||||
"name": "107554",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/show/osvdb/107554"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "70190",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/70190"
|
||||
},
|
||||
{
|
||||
"name": "20141008 Reflected Cross-Site Scripting (XSS) in EWWW Image Optimizer WordPress Plugin",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/533641/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.htbridge.com/advisory/HTB23234",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.htbridge.com/advisory/HTB23234"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/128621/WordPress-EWWW-Image-Optimizer-2.0.1-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/128621/WordPress-EWWW-Image-Optimizer-2.0.1-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "https://wordpress.org/plugins/ewww-image-optimizer/changelog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wordpress.org/plugins/ewww-image-optimizer/changelog"
|
||||
},
|
||||
{
|
||||
"name" : "70190",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/70190"
|
||||
"name": "http://packetstormsecurity.com/files/128621/WordPress-EWWW-Image-Optimizer-2.0.1-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/128621/WordPress-EWWW-Image-Optimizer-2.0.1-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.htbridge.com/advisory/HTB23234",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.htbridge.com/advisory/HTB23234"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2014-6485",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "61609",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/61609"
|
||||
},
|
||||
{
|
||||
"name": "70519",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/70519"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,20 +72,10 @@
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
|
||||
},
|
||||
{
|
||||
"name" : "70519",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/70519"
|
||||
},
|
||||
{
|
||||
"name": "61632",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/61632"
|
||||
},
|
||||
{
|
||||
"name" : "61609",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/61609"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7323",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
"name": "VU#942769",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/942769"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name" : "VU#942769",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/942769"
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-7479",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7535",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
"name": "VU#945849",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/945849"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name" : "VU#945849",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/945849"
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7744",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
"name": "VU#789913",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/789913"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name" : "VU#789913",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/789913"
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2014-8032",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150108 Cisco WebEx Meetings Server Password Encryption Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8032"
|
||||
},
|
||||
{
|
||||
"name" : "71947",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/71947"
|
||||
},
|
||||
{
|
||||
"name": "1031517",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031517"
|
||||
},
|
||||
{
|
||||
"name": "20150108 Cisco WebEx Meetings Server Password Encryption Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8032"
|
||||
},
|
||||
{
|
||||
"name": "cisco-webex-cve20148032-info-disc(100564)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100564"
|
||||
},
|
||||
{
|
||||
"name": "71947",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/71947"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-8649",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160408 CVE-2016-2170: Apache OFBiz information disclosure vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/538034/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/136639/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/136639/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html"
|
||||
},
|
||||
{
|
||||
"name": "http://ofbiz.apache.org/download.html#vulnerabilities",
|
||||
"refsource": "CONFIRM",
|
||||
@ -73,14 +63,9 @@
|
||||
"url": "https://blogs.apache.org/ofbiz/entry/announce_apache_ofbiz_12_04"
|
||||
},
|
||||
{
|
||||
"name" : "https://blogs.apache.org/ofbiz/entry/announce_apache_ofbiz_13_07",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://blogs.apache.org/ofbiz/entry/announce_apache_ofbiz_13_07"
|
||||
},
|
||||
{
|
||||
"name" : "https://cwiki.apache.org/confluence/display/OFBIZ/The+infamous+Java+serialization+vulnerability",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://cwiki.apache.org/confluence/display/OFBIZ/The+infamous+Java+serialization+vulnerability"
|
||||
"name": "1035513",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035513"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.apache.org/jira/browse/OFBIZ-6726",
|
||||
@ -88,9 +73,24 @@
|
||||
"url": "https://issues.apache.org/jira/browse/OFBIZ-6726"
|
||||
},
|
||||
{
|
||||
"name" : "1035513",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1035513"
|
||||
"name": "https://cwiki.apache.org/confluence/display/OFBIZ/The+infamous+Java+serialization+vulnerability",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cwiki.apache.org/confluence/display/OFBIZ/The+infamous+Java+serialization+vulnerability"
|
||||
},
|
||||
{
|
||||
"name": "20160408 CVE-2016-2170: Apache OFBiz information disclosure vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/538034/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://blogs.apache.org/ofbiz/entry/announce_apache_ofbiz_13_07",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://blogs.apache.org/ofbiz/entry/announce_apache_ofbiz_13_07"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/136639/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/136639/Apache-OFBiz-13.07.02-13.07.01-Information-Disclosure.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://downloads.asterisk.org/pub/security/AST-2016-003.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3700",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2016/dsa-3700"
|
||||
},
|
||||
{
|
||||
"name": "1034931",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1034931"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3700",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3700"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"ID": "CVE-2016-2291",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-2752",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "josh@bress.net",
|
||||
"ID": "CVE-2017-1001004",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/josdejong/typed-function/blob/master/HISTORY.md#2017-11-18-version-0106",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/josdejong/typed-function/blob/master/HISTORY.md#2017-11-18-version-0106"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/josdejong/typed-function/blob/master/HISTORY.md#2017-11-18-version-0106",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/josdejong/typed-function/blob/master/HISTORY.md#2017-11-18-version-0106"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "RHSA-2018:3083",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3083"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91",
|
||||
"refsource": "MISC",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/torvalds/linux/commit/6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91"
|
||||
"name": "USN-3619-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3619-2/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.4",
|
||||
@ -72,50 +77,45 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:3083",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:3083"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:3096",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:3096"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3619-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3619-1/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3619-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3619-2/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3653-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3653-1/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3653-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3653-2/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3655-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3655-1/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3655-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3655-2/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3653-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3653-1/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3657-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3657-1/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3655-1",
|
||||
"name": "RHSA-2018:3096",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3096"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/torvalds/linux/commit/6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/torvalds/linux/commit/6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91"
|
||||
},
|
||||
{
|
||||
"name": "USN-3619-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3655-1/"
|
||||
"url": "https://usn.ubuntu.com/3619-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -92,16 +92,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/126062",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/126062"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22003664",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22003664"
|
||||
},
|
||||
{
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/126062",
|
||||
"refsource": "MISC",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/126062"
|
||||
},
|
||||
{
|
||||
"name": "100139",
|
||||
"refsource": "BID",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-1888",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"name": "https://crbug.com/550017",
|
||||
"refsource": "MISC",
|
||||
"url": "https://crbug.com/550017"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3926",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2017/dsa-3926"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201709-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201709-15"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1833",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1833"
|
||||
"name": "DSA-3926",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3926"
|
||||
},
|
||||
{
|
||||
"name": "https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"name": "99950",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99950"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1833",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1833"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,6 +53,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1038377",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038377"
|
||||
},
|
||||
{
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03738en_us",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,11 +67,6 @@
|
||||
"name": "98088",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/98088"
|
||||
},
|
||||
{
|
||||
"name" : "1038377",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038377"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2017-5930",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20170207 Re: CVE request: PostfixAdmin allows to delete protected aliases",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2017/02/08/1"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20170209 Re: CVE request: PostfixAdmin allows to delete protected aliases",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2017/02/09/1"
|
||||
},
|
||||
{
|
||||
"name": "[postfixadmin-devel] 20170204 Security hole in AliasHandler",
|
||||
"refsource": "MLIST",
|
||||
@ -73,9 +63,9 @@
|
||||
"url": "https://github.com/postfixadmin/postfixadmin/blob/postfixadmin-3.0.2/CHANGELOG.TXT"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/postfixadmin/postfixadmin/pull/23",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/postfixadmin/postfixadmin/pull/23"
|
||||
"name": "96142",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96142"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2017:0488",
|
||||
@ -83,9 +73,19 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2017-02/msg00076.html"
|
||||
},
|
||||
{
|
||||
"name" : "96142",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/96142"
|
||||
"name": "[oss-security] 20170207 Re: CVE request: PostfixAdmin allows to delete protected aliases",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/02/08/1"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/postfixadmin/postfixadmin/pull/23",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/postfixadmin/postfixadmin/pull/23"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20170209 Re: CVE request: PostfixAdmin allows to delete protected aliases",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/02/09/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user