mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
0d5f7ed9e8
commit
da46f359ab
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://osvdb.org/ref/22/22247-aquifer.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://osvdb.org/ref/22/22247-aquifer.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20060124 vendor ack/fix: Aquifer CMS Index.asp Keyword Variable XSS (fwd)",
|
"name": "20060124 vendor ack/fix: Aquifer CMS Index.asp Keyword Variable XSS (fwd)",
|
||||||
"refsource": "VIM",
|
"refsource": "VIM",
|
||||||
"url": "http://attrition.org/pipermail/vim/2006-January/000509.html"
|
"url": "http://attrition.org/pipermail/vim/2006-January/000509.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "16162",
|
"name": "18326",
|
||||||
"refsource" : "BID",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/bid/16162"
|
"url": "http://secunia.com/advisories/18326"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-0074",
|
"name": "ADV-2006-0074",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/0074"
|
"url": "http://www.vupen.com/english/advisories/2006/0074"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://osvdb.org/ref/22/22247-aquifer.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://osvdb.org/ref/22/22247-aquifer.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "16162",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/16162"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "22247",
|
"name": "22247",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/22247"
|
"url": "http://www.osvdb.org/22247"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18326",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/18326"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,25 +53,25 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://devel.webwork.rochester.edu/twiki/bin/view/Webwork/WeBWorKRelease2pt1pt4",
|
"name": "ADV-2006-0319",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://devel.webwork.rochester.edu/twiki/bin/view/Webwork/WeBWorKRelease2pt1pt4"
|
"url": "http://www.vupen.com/english/advisories/2006/0319"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "16371",
|
"name": "16371",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/16371"
|
"url": "http://www.securityfocus.com/bid/16371"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2006-0319",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/0319"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "18594",
|
"name": "18594",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/18594"
|
"url": "http://secunia.com/advisories/18594"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://devel.webwork.rochester.edu/twiki/bin/view/Webwork/WeBWorKRelease2pt1pt4",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://devel.webwork.rochester.edu/twiki/bin/view/Webwork/WeBWorKRelease2pt1pt4"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "webwork-unknown-command-execution(24322)",
|
"name": "webwork-unknown-command-execution(24322)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -57,16 +57,6 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/423901/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/423901/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2006-0449",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/0449"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "22978",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/22978"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1015581",
|
"name": "1015581",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
@ -76,6 +66,16 @@
|
|||||||
"name": "neomail-neomail-script-xss(24470)",
|
"name": "neomail-neomail-script-xss(24470)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24470"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24470"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-0449",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/0449"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22978",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/22978"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060222 South River WebDrive Buffer Overflow Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/425785/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "webdrive-name-bo(24903)",
|
"name": "webdrive-name-bo(24903)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24903"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24903"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060222 South River WebDrive Buffer Overflow Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/425785/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "http://www.securityfocus.com/archive/1/426538/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/426538/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.joomla.org/content/view/938/78/",
|
"name": "19105",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.joomla.org/content/view/938/78/"
|
"url": "http://secunia.com/advisories/19105"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "23817",
|
"name": "23817",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://www.osvdb.org/23817"
|
"url": "http://www.osvdb.org/23817"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "19105",
|
"name": "http://www.joomla.org/content/view/938/78/",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/19105"
|
"url": "http://www.joomla.org/content/view/938/78/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "527",
|
"name": "527",
|
||||||
|
@ -53,39 +53,39 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://hamid.ir/security/nodez.txt",
|
"name": "19165",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://hamid.ir/security/nodez.txt"
|
"url": "http://secunia.com/advisories/19165"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "17066",
|
"name": "17066",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/17066"
|
"url": "http://www.securityfocus.com/bid/17066"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://hamid.ir/security/nodez.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://hamid.ir/security/nodez.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-0899",
|
"name": "ADV-2006-0899",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/0899"
|
"url": "http://www.vupen.com/english/advisories/2006/0899"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "23776",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/23776"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1015747",
|
"name": "1015747",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1015747"
|
"url": "http://securitytracker.com/id?1015747"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "19165",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/19165"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "nodez-op-xss(25121)",
|
"name": "nodez-op-xss(25121)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25121"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25121"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23776",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/23776"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,26 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://osvdb.org/ref/24/24233-tilde.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://osvdb.org/ref/24/24233-tilde.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17299",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/17299"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-1145",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/1145"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "24233",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/24233"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "19447",
|
"name": "19447",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -81,6 +61,26 @@
|
|||||||
"name": "tildecms-index-sql-injection(25510)",
|
"name": "tildecms-index-sql-injection(25510)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25510"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25510"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://osvdb.org/ref/24/24233-tilde.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://osvdb.org/ref/24/24233-tilde.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "24233",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/24233"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-1145",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/1145"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "17299",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/17299"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "http://www.kapda.ir/advisory-313.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.kapda.ir/advisory-313.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20060418 [KAPDA::#41] - Mambo/Joomla rss component vulnerability",
|
"name": "20060418 [KAPDA::#41] - Mambo/Joomla rss component vulnerability",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "http://irannetjob.com/content/view/209/28/",
|
"name": "http://irannetjob.com/content/view/209/28/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://irannetjob.com/content/view/209/28/"
|
"url": "http://irannetjob.com/content/view/209/28/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.kapda.ir/advisory-313.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.kapda.ir/advisory-313.html"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2006-3437",
|
"ID": "CVE-2006-3437",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060726 EzUpload multi file vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/441172/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "19175",
|
"name": "19175",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "1305",
|
"name": "1305",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/1305"
|
"url": "http://securityreason.com/securityalert/1305"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060726 EzUpload multi file vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/441172/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "solaris-listener-dos(28420)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28420"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "102576",
|
"name": "102576",
|
||||||
"refsource": "SUNALERT",
|
"refsource": "SUNALERT",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "1016706",
|
"name": "1016706",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1016706"
|
"url": "http://securitytracker.com/id?1016706"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "solaris-listener-dos(28420)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28420"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2006-09-29",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20271",
|
"name": "20271",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/20271"
|
"url": "http://www.securityfocus.com/bid/20271"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-3852",
|
"name": "macos-cfnetwork-ssl-spoofing(29277)",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "XF",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/3852"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29277"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29267",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/29267"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1016952",
|
"name": "1016952",
|
||||||
@ -83,9 +73,19 @@
|
|||||||
"url": "http://secunia.com/advisories/22187"
|
"url": "http://secunia.com/advisories/22187"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "macos-cfnetwork-ssl-spoofing(29277)",
|
"name": "ADV-2006-3852",
|
||||||
"refsource" : "XF",
|
"refsource": "VUPEN",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29277"
|
"url": "http://www.vupen.com/english/advisories/2006/3852"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2006-09-29",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29267",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/29267"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.gulftech.org/?node=research&article_id=00111-08282006&",
|
"name": "21659",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.gulftech.org/?node=research&article_id=00111-08282006&"
|
"url": "http://secunia.com/advisories/21659"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://cubecart.com/site/forums/index.php?showtopic=21540",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://cubecart.com/site/forums/index.php?showtopic=21540"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.cubecart.com/site/forums/index.php?s=5e34938dc670782af211587b8a450c90&act=Attach&type=post&id=697",
|
"name": "http://www.cubecart.com/site/forums/index.php?s=5e34938dc670782af211587b8a450c90&act=Attach&type=post&id=697",
|
||||||
@ -73,9 +68,14 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/19782"
|
"url": "http://www.securityfocus.com/bid/19782"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "21659",
|
"name": "http://cubecart.com/site/forums/index.php?showtopic=21540",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/21659"
|
"url": "http://cubecart.com/site/forums/index.php?showtopic=21540"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.gulftech.org/?node=research&article_id=00111-08282006&",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.gulftech.org/?node=research&article_id=00111-08282006&"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060907 CORE-2006-0322: Multiple vulnerabilities in ICQ Toolbar 1.3 for Internet Explorer",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/445515/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1510",
|
"name": "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1510",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1510"
|
"url": "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1510"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-3528",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/3528"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "icq-toolbar-rss-feed-xss(28809)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28809"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "19900",
|
"name": "19900",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/19900"
|
"url": "http://www.securityfocus.com/bid/19900"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-3528",
|
"name": "20060907 CORE-2006-0322: Multiple vulnerabilities in ICQ Toolbar 1.3 for Internet Explorer",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/3528"
|
"url": "http://www.securityfocus.com/archive/1/445515/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "21809",
|
"name": "21809",
|
||||||
@ -81,11 +86,6 @@
|
|||||||
"name": "1523",
|
"name": "1523",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/1523"
|
"url": "http://securityreason.com/securityalert/1523"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "icq-toolbar-rss-feed-xss(28809)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28809"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,45 +52,45 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060920 Cisco Security Advisory: Cisco Intrusion Prevention System Management Interface Denial of Service and Fragmented Packet Evasion Vulnerabilities",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20060920-ips.shtml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#658884",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/658884"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20127",
|
"name": "20127",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/20127"
|
"url": "http://www.securityfocus.com/bid/20127"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2006-3721",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/3721"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "29036",
|
"name": "29036",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/29036"
|
"url": "http://www.osvdb.org/29036"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20060920 Cisco Security Advisory: Cisco Intrusion Prevention System Management Interface Denial of Service and Fragmented Packet Evasion Vulnerabilities",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060920-ips.shtml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "cisco-ips-frag-bypass(29058)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29058"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1016891",
|
"name": "1016891",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1016891"
|
"url": "http://securitytracker.com/id?1016891"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#658884",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/658884"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "22022",
|
"name": "22022",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/22022"
|
"url": "http://secunia.com/advisories/22022"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "cisco-ips-frag-bypass(29058)",
|
"name": "ADV-2006-3721",
|
||||||
"refsource" : "XF",
|
"refsource": "VUPEN",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29058"
|
"url": "http://www.vupen.com/english/advisories/2006/3721"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "12806",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/12806"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "65010",
|
"name": "65010",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -72,6 +67,11 @@
|
|||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2010/1288"
|
"url": "http://www.vupen.com/english/advisories/2010/1288"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "12806",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "http://www.exploit-db.com/exploits/12806"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "cmscout-search-xss(58996)",
|
"name": "cmscout-search-xss(58996)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2011:039",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://code.google.com/p/chromium/issues/detail?id=43488",
|
"name": "http://code.google.com/p/chromium/issues/detail?id=43488",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -63,34 +68,29 @@
|
|||||||
"url": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html"
|
"url": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "MDVSA-2011:039",
|
"name": "ADV-2010-2722",
|
||||||
"refsource" : "MANDRIVA",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
|
"url": "http://www.vupen.com/english/advisories/2010/2722"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1006-1",
|
"name": "USN-1006-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1006-1"
|
"url": "http://www.ubuntu.com/usn/USN-1006-1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:11884",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11884"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "41856",
|
"name": "41856",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/41856"
|
"url": "http://secunia.com/advisories/41856"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2010-2722",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2010/2722"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2011-0552",
|
"name": "ADV-2011-0552",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2011/0552"
|
"url": "http://www.vupen.com/english/advisories/2011/0552"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:11884",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11884"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2010-3436",
|
"ID": "CVE-2010-3436",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,60 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://security-tracker.debian.org/tracker/CVE-2010-3436",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://security-tracker.debian.org/tracker/CVE-2010-3436"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://svn.php.net/viewvc/php/php-src/trunk/main/fopen_wrappers.c?r1=303824&r2=303823&pathrev=303824",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://svn.php.net/viewvc/php/php-src/trunk/main/fopen_wrappers.c?r1=303824&r2=303823&pathrev=303824"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://svn.php.net/viewvc?view=revision&revision=303824",
|
"name": "http://svn.php.net/viewvc?view=revision&revision=303824",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://svn.php.net/viewvc?view=revision&revision=303824"
|
"url": "http://svn.php.net/viewvc?view=revision&revision=303824"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.php.net/ChangeLog-5.php",
|
"name": "ADV-2011-0077",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.php.net/ChangeLog-5.php"
|
"url": "http://www.vupen.com/english/advisories/2011/0077"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.php.net/archive/2010.php#id2010-12-10-1",
|
"name": "42812",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.php.net/archive/2010.php#id2010-12-10-1"
|
"url": "http://secunia.com/advisories/42812"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.php.net/releases/5_2_15.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.php.net/releases/5_2_15.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.php.net/releases/5_3_4.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.php.net/releases/5_3_4.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT4581",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT4581"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT5002",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT5002"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2011-03-21-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2011-10-12-3",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MDVSA-2010:218",
|
"name": "MDVSA-2010:218",
|
||||||
@ -113,9 +73,19 @@
|
|||||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:218"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:218"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SSA:2010-357-01",
|
"name": "http://www.php.net/releases/5_3_4.php",
|
||||||
"refsource" : "SLACKWARE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.490619"
|
"url": "http://www.php.net/releases/5_3_4.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://svn.php.net/viewvc/php/php-src/trunk/main/fopen_wrappers.c?r1=303824&r2=303823&pathrev=303824",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://svn.php.net/viewvc/php/php-src/trunk/main/fopen_wrappers.c?r1=303824&r2=303823&pathrev=303824"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2011-03-21-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1042-1",
|
"name": "USN-1042-1",
|
||||||
@ -128,14 +98,19 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/44723"
|
"url": "http://www.securityfocus.com/bid/44723"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "42729",
|
"name": "http://www.php.net/ChangeLog-5.php",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/42729"
|
"url": "http://www.php.net/ChangeLog-5.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "42812",
|
"name": "APPLE-SA-2011-10-12-3",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "APPLE",
|
||||||
"url" : "http://secunia.com/advisories/42812"
|
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSA:2010-357-01",
|
||||||
|
"refsource": "SLACKWARE",
|
||||||
|
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.490619"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2010-3313",
|
"name": "ADV-2010-3313",
|
||||||
@ -143,9 +118,34 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2010/3313"
|
"url": "http://www.vupen.com/english/advisories/2010/3313"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2011-0077",
|
"name": "http://www.php.net/archive/2010.php#id2010-12-10-1",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/0077"
|
"url": "http://www.php.net/archive/2010.php#id2010-12-10-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.php.net/releases/5_2_15.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.php.net/releases/5_2_15.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT5002",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT5002"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "42729",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/42729"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://security-tracker.debian.org/tracker/CVE-2010-3436",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://security-tracker.debian.org/tracker/CVE-2010-3436"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT4581",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT4581"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2010-3701",
|
"ID": "CVE-2010-3701",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "RHSA-2010:0756",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2010-0756.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=634014",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=634014",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -62,11 +67,6 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=640006"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=640006"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2010:0756",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0756.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2010:0757",
|
"name": "RHSA-2010:0757",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2010-3878",
|
"ID": "CVE-2010-3878",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=604617",
|
"name": "RHSA-2010:0938",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=604617"
|
"url": "http://www.redhat.com/support/errata/RHSA-2010-0938.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2010:0937",
|
"name": "RHSA-2010:0937",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0937.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2010-0937.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2010:0938",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=604617",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0938.html"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=604617"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2010:0939",
|
"name": "RHSA-2010:0939",
|
||||||
|
@ -52,11 +52,31 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "40391",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/40391"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "14239",
|
"name": "14239",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/14239"
|
"url": "http://www.exploit-db.com/exploits/14239"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "66013",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/66013"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "autodealer-info-sql-injection(60061)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60061"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "8489",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/8489"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.org/1007-exploits/bsautodealer-sql.txt",
|
"name": "http://packetstormsecurity.org/1007-exploits/bsautodealer-sql.txt",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -66,26 +86,6 @@
|
|||||||
"name": "41384",
|
"name": "41384",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/41384"
|
"url": "http://www.securityfocus.com/bid/41384"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "66013",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/66013"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "40391",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/40391"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "8489",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/8489"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "autodealer-info-sql-injection(60061)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/60061"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20110207 ZDI-11-050: IBM Informix Dynamic Server SET ENVIRONMENT Remote Code Execution Vulnerability",
|
"name": "ADV-2011-0309",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/516250/100/0/threaded"
|
"url": "http://www.vupen.com/english/advisories/2011/0309"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ibm",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ibm"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://zerodayinitiative.com/advisories/ZDI-11-050/",
|
"name": "http://zerodayinitiative.com/advisories/ZDI-11-050/",
|
||||||
@ -72,25 +67,30 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/46230"
|
"url": "http://www.securityfocus.com/bid/46230"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "43212",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/43212"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "8078",
|
"name": "8078",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/8078"
|
"url": "http://securityreason.com/securityalert/8078"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2011-0309",
|
"name": "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ibm",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/0309"
|
"url": "http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ibm"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "43212",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/43212"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ibm-informix-dynamic-oninit-bo(65209)",
|
"name": "ibm-informix-dynamic-oninit-bo(65209)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65209"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65209"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20110207 ZDI-11-050: IBM Informix Dynamic Server SET ENVIRONMENT Remote Code Execution Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/516250/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-1184",
|
"ID": "CVE-2011-1184",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,34 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://svn.apache.org/viewvc?view=rev&rev=1087655",
|
"name": "MDVSA-2011:156",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MANDRIVA",
|
||||||
"url" : "http://svn.apache.org/viewvc?view=rev&rev=1087655"
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:156"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://svn.apache.org/viewvc?view=rev&rev=1158180",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://svn.apache.org/viewvc?view=rev&rev=1158180"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://svn.apache.org/viewvc?view=rev&rev=1159309",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://svn.apache.org/viewvc?view=rev&rev=1159309"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://tomcat.apache.org/security-5.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://tomcat.apache.org/security-5.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://tomcat.apache.org/security-6.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://tomcat.apache.org/security-6.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://tomcat.apache.org/security-7.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://tomcat.apache.org/security-7.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-2401",
|
"name": "DSA-2401",
|
||||||
@ -88,64 +63,9 @@
|
|||||||
"url": "http://www.debian.org/security/2012/dsa-2401"
|
"url": "http://www.debian.org/security/2012/dsa-2401"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "HPSBUX02860",
|
"name": "SUSE-SU-2012:0155",
|
||||||
"refsource" : "HP",
|
"refsource": "SUSE",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT101146",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBST02955",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBOV02762",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT100825",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2011:156",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:156"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2011:1845",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1845.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2012:0074",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0074.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2012:0075",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0075.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2012:0076",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0076.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2012:0077",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0077.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2012:0078",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0078.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2012:0325",
|
"name": "RHSA-2012:0325",
|
||||||
@ -153,24 +73,104 @@
|
|||||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-0325.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-0325.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2012:0155",
|
"name": "HPSBUX02860",
|
||||||
"refsource" : "SUSE",
|
"refsource": "HP",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00002.html"
|
"url": "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://svn.apache.org/viewvc?view=rev&rev=1159309",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://svn.apache.org/viewvc?view=rev&rev=1159309"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2012:0078",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-0078.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2011:1845",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2011-1845.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://svn.apache.org/viewvc?view=rev&rev=1158180",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://svn.apache.org/viewvc?view=rev&rev=1158180"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2012:0075",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-0075.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2012:0074",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-0074.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://tomcat.apache.org/security-7.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://tomcat.apache.org/security-7.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBOV02762",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://svn.apache.org/viewvc?view=rev&rev=1087655",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://svn.apache.org/viewvc?view=rev&rev=1087655"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://tomcat.apache.org/security-6.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://tomcat.apache.org/security-6.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "57126",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/57126"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT100825",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://tomcat.apache.org/security-5.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://tomcat.apache.org/security-5.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2012:0208",
|
"name": "openSUSE-SU-2012:0208",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00006.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00006.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT101146",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2012:0076",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-0076.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBST02955",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:19169",
|
"name": "oval:org.mitre.oval:def:19169",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19169"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19169"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "57126",
|
"name": "RHSA-2012:0077",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://secunia.com/advisories/57126"
|
"url": "http://rhn.redhat.com/errata/RHSA-2012-0077.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@ubuntu.com",
|
||||||
"ID": "CVE-2011-1828",
|
"ID": "CVE-2011-1828",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://launchpad.net/bugs/771553",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://launchpad.net/bugs/771553"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-1127-1",
|
"name": "USN-1127-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
@ -67,20 +62,25 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/47679"
|
"url": "http://www.securityfocus.com/bid/47679"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "44413",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/44413"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2011-1143",
|
"name": "ADV-2011-1143",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2011/1143"
|
"url": "http://www.vupen.com/english/advisories/2011/1143"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://launchpad.net/bugs/771553",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://launchpad.net/bugs/771553"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "usbcreator-unspecified-sec-bypass(67241)",
|
"name": "usbcreator-unspecified-sec-bypass(67241)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67241"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67241"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "44413",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/44413"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.simonroses.com/wp-content/uploads/2011/05/SRF-SA-2011-01.txt",
|
"name": "8250",
|
||||||
"refsource" : "MISC",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.simonroses.com/wp-content/uploads/2011/05/SRF-SA-2011-01.txt"
|
"url": "http://securityreason.com/securityalert/8250"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "47765",
|
"name": "47765",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/47765"
|
"url": "http://www.securityfocus.com/bid/47765"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "8250",
|
"name": "http://www.simonroses.com/wp-content/uploads/2011/05/SRF-SA-2011-01.txt",
|
||||||
"refsource" : "SREASON",
|
"refsource": "MISC",
|
||||||
"url" : "http://securityreason.com/securityalert/8250"
|
"url": "http://www.simonroses.com/wp-content/uploads/2011/05/SRF-SA-2011-01.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-1924",
|
"ID": "CVE-2011-1924",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,20 +53,25 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[tor-announce] 20110228 Tor 0.2.1.30 is released",
|
"name": "43548",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html"
|
"url": "http://secunia.com/advisories/43548"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=705192",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=705192"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=705194",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=705194",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=705194"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=705194"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "44862",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/44862"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "46618",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/46618"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e",
|
"name": "https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -78,19 +83,14 @@
|
|||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "46618",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=705192",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/46618"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=705192"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "43548",
|
"name": "[tor-announce] 20110228 Tor 0.2.1.30 is released",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MLIST",
|
||||||
"url" : "http://secunia.com/advisories/43548"
|
"url": "https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "44862",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/44862"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://sitewat.ch/Advisory/View/4",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://sitewat.ch/Advisory/View/4"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "51276",
|
"name": "51276",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/51276"
|
"url": "http://www.securityfocus.com/bid/51276"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://sitewat.ch/Advisory/View/4",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://sitewat.ch/Advisory/View/4"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20111127 Wordpress skysa-official plugin Cross-Site Scripting Vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/520662/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "50824",
|
"name": "50824",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "skysaappbar-skysa-xss(71486)",
|
"name": "skysaappbar-skysa-xss(71486)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71486"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71486"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20111127 Wordpress skysa-official plugin Cross-Site Scripting Vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/520662/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2014-3369",
|
"ID": "CVE-2014-3369",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=35828",
|
"name": "60850",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=35828"
|
"url": "http://secunia.com/advisories/60850"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20141015 Multiple Vulnerabilities in Cisco TelePresence Video Communication Server and Cisco Expressway Software",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-vcs"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1031055",
|
"name": "1031055",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://www.securitytracker.com/id/1031055"
|
"url": "http://www.securitytracker.com/id/1031055"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "60850",
|
"name": "20141015 Multiple Vulnerabilities in Cisco TelePresence Video Communication Server and Cisco Expressway Software",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CISCO",
|
||||||
"url" : "http://secunia.com/advisories/60850"
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-vcs"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35828",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35828"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2014-3515",
|
"ID": "CVE-2014-3515",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,15 +58,45 @@
|
|||||||
"url": "http://git.php.net/?p=php-src.git;a=commit;h=88223c5245e9b470e1e6362bfd96829562ffe6ab"
|
"url": "http://git.php.net/?p=php-src.git;a=commit;h=88223c5245e9b470e1e6362bfd96829562ffe6ab"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.php.net/ChangeLog-5.php",
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21683486",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.php.net/ChangeLog-5.php"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683486"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2014:1766",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugs.php.net/bug.php?id=67492",
|
"name": "https://bugs.php.net/bug.php?id=67492",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugs.php.net/bug.php?id=67492"
|
"url": "https://bugs.php.net/bug.php?id=67492"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBUX03102",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-2974",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2014/dsa-2974"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "59794",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/59794"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.php.net/ChangeLog-5.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.php.net/ChangeLog-5.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "60998",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/60998"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT6443",
|
"name": "http://support.apple.com/kb/HT6443",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -78,59 +108,29 @@
|
|||||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21683486",
|
"name": "RHSA-2014:1765",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21683486"
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2974",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-2974"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBUX03102",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SSRT101681",
|
"name": "SSRT101681",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
|
"url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:1765",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:1766",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2014:1236",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "68237",
|
"name": "68237",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/68237"
|
"url": "http://www.securityfocus.com/bid/68237"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "59794",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/59794"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "59831",
|
"name": "59831",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/59831"
|
"url": "http://secunia.com/advisories/59831"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "60998",
|
"name": "openSUSE-SU-2014:1236",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "SUSE",
|
||||||
"url" : "http://secunia.com/advisories/60998"
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20140514 Re: Mumble 1.2.6: Mumble-SA-2014-005 and Mumble-SA-2014-006",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2014/05/15/4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20140515 Mumble 1.2.6: Mumble-SA-2014-005 and Mumble-SA-2014-006",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2014/05/15/1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://mumble.info/security/Mumble-SA-2014-006.txt",
|
"name": "http://mumble.info/security/Mumble-SA-2014-006.txt",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -71,6 +61,16 @@
|
|||||||
"name": "67401",
|
"name": "67401",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/67401"
|
"url": "http://www.securityfocus.com/bid/67401"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140514 Re: Mumble 1.2.6: Mumble-SA-2014-005 and Mumble-SA-2014-006",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2014/05/15/4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140515 Mumble 1.2.6: Mumble-SA-2014-005 and Mumble-SA-2014-006",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2014/05/15/1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-7424",
|
"ID": "CVE-2014-7424",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#483761",
|
"name": "VU#483761",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20141008 CVE request for VDSM denial of service",
|
"name": "[oss-security] 20141008 Re: CVE request for VDSM denial of service",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2014/10/08/6"
|
"url": "http://www.openwall.com/lists/oss-security/2014/10/08/16"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20141008 Re: CVE request for VDSM denial of service",
|
"name": "[oss-security] 20141008 Re: CVE request for VDSM denial of service",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.openwall.com/lists/oss-security/2014/10/08/18"
|
"url": "http://www.openwall.com/lists/oss-security/2014/10/08/18"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20141008 Re: CVE request for VDSM denial of service",
|
"name": "[oss-security] 20141008 CVE request for VDSM denial of service",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2014/10/08/16"
|
"url": "http://www.openwall.com/lists/oss-security/2014/10/08/6"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1150812",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1150812",
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://drupal.org/node/2254925",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://drupal.org/node/2254925"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.drupal.org/node/2254835",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.drupal.org/node/2254835"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.drupal.org/node/2254837",
|
"name": "https://www.drupal.org/node/2254837",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -76,6 +66,16 @@
|
|||||||
"name": "58318",
|
"name": "58318",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/58318"
|
"url": "http://secunia.com/advisories/58318"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://drupal.org/node/2254925",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://drupal.org/node/2254925"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.drupal.org/node/2254835",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.drupal.org/node/2254835"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,29 +58,29 @@
|
|||||||
"url": "http://www.securityfocus.com/archive/1/534360/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/534360/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20141231 [KIS-2014-15] Osclass <= 3.4.2 (ajax.php) Local File Inclusion Vulnerability",
|
"name": "71841",
|
||||||
"refsource" : "FULLDISC",
|
"refsource": "BID",
|
||||||
"url" : "http://seclists.org/fulldisclosure/2014/Dec/133"
|
"url": "http://www.securityfocus.com/bid/71841"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://karmainsecurity.com/KIS-2014-15",
|
"name": "http://karmainsecurity.com/KIS-2014-15",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://karmainsecurity.com/KIS-2014-15"
|
"url": "http://karmainsecurity.com/KIS-2014-15"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/",
|
"name": "http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/"
|
"url": "http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "71841",
|
"name": "http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.html",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/71841"
|
"url": "http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20141231 [KIS-2014-15] Osclass <= 3.4.2 (ajax.php) Local File Inclusion Vulnerability",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2014/Dec/133"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2014-8232",
|
"ID": "CVE-2014-8232",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2014-9622",
|
"ID": "CVE-2014-9622",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20141114 xdg-open RCE",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://seclists.org/fulldisclosure/2014/Nov/36"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20150117 Re: CVE Request: xdg-utils: xdg-open: command injection vulnerability",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2015/01/17/10"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=66670",
|
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=66670",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -72,6 +62,26 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugs.gentoo.org/show_bug.cgi?id=472888"
|
"url": "https://bugs.gentoo.org/show_bug.cgi?id=472888"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20141114 xdg-open RCE",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2014/Nov/36"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20150117 Re: CVE Request: xdg-utils: xdg-open: command injection vulnerability",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2015/01/17/10"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "62155",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/62155"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "71284",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/71284"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-3131",
|
"name": "DSA-3131",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
@ -81,16 +91,6 @@
|
|||||||
"name": "GLSA-201701-09",
|
"name": "GLSA-201701-09",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
"url": "https://security.gentoo.org/glsa/201701-09"
|
"url": "https://security.gentoo.org/glsa/201701-09"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "71284",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/71284"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "62155",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/62155"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,50 +52,50 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20160602 Re: ImageMagick CVEs",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2016/06/02/13"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=36ed9419a68cb1356b1843b48cc12788179cdaee",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=36ed9419a68cb1356b1843b48cc12788179cdaee"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343502",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343502",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343502"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343502"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SUSE-SU-2016:1782",
|
"name": "openSUSE-SU-2016:1833",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:1783",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2016:1784",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:1724",
|
"name": "openSUSE-SU-2016:1724",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:1782",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20160602 Re: ImageMagick CVEs",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2016/06/02/13"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:1748",
|
"name": "openSUSE-SU-2016:1748",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2016:1833",
|
"name": "SUSE-SU-2016:1784",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2016:1783",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=36ed9419a68cb1356b1843b48cc12788179cdaee",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=36ed9419a68cb1356b1843b48cc12788179cdaee"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-3131-1",
|
"name": "USN-3131-1",
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-2080",
|
"ID": "CVE-2016-2080",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://support.f5.com/kb/en-us/solutions/public/k/11/sol11772107.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.f5.com/kb/en-us/solutions/public/k/11/sol11772107.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1035520",
|
"name": "1035520",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1035520"
|
"url": "http://www.securitytracker.com/id/1035520"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.f5.com/kb/en-us/solutions/public/k/11/sol11772107.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.f5.com/kb/en-us/solutions/public/k/11/sol11772107.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2016-2486",
|
"ID": "CVE-2016-2486",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://source.android.com/security/bulletin/2016-06-01.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://source.android.com/security/bulletin/2016-06-01.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://android.googlesource.com/platform/frameworks/av/+/ad40e57890f81a3cf436c5f06da66396010bd9e5",
|
"name": "https://android.googlesource.com/platform/frameworks/av/+/ad40e57890f81a3cf436c5f06da66396010bd9e5",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/ad40e57890f81a3cf436c5f06da66396010bd9e5"
|
"url": "https://android.googlesource.com/platform/frameworks/av/+/ad40e57890f81a3cf436c5f06da66396010bd9e5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://source.android.com/security/bulletin/2016-06-01.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://source.android.com/security/bulletin/2016-06-01.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-2743",
|
"ID": "CVE-2016-2743",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@mozilla.org",
|
||||||
"ID": "CVE-2016-2830",
|
"ID": "CVE-2016-2830",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.mozilla.org/security/announce/2016/mfsa2016-63.html",
|
"name": "DSA-3640",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://www.mozilla.org/security/announce/2016/mfsa2016-63.html"
|
"url": "http://www.debian.org/security/2016/dsa-3640"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1255270",
|
"name": "1036508",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1255270"
|
"url": "http://www.securitytracker.com/id/1036508"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
|
||||||
@ -68,44 +68,44 @@
|
|||||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-3640",
|
"name": "USN-3044-1",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://www.debian.org/security/2016/dsa-3640"
|
"url": "http://www.ubuntu.com/usn/USN-3044-1"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201701-15",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201701-15"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2016:1551",
|
"name": "RHSA-2016:1551",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2016-1551.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1551.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201701-15",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201701-15"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1255270",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1255270"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2016:1964",
|
"name": "openSUSE-SU-2016:1964",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2016:2026",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-3044-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-3044-1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "92261",
|
"name": "92261",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/92261"
|
"url": "http://www.securityfocus.com/bid/92261"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1036508",
|
"name": "http://www.mozilla.org/security/announce/2016/mfsa2016-63.html",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1036508"
|
"url": "http://www.mozilla.org/security/announce/2016/mfsa2016-63.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2016:2026",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -73,15 +73,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21997340",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21997340"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "96614",
|
"name": "96614",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/96614"
|
"url": "http://www.securityfocus.com/bid/96614"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg21997340",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg21997340"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20160630 [CVE-2016-6130] Double-Fetch Vulnerability in Linux-4.5/drivers/s390/char/sclp_ctl.c",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/538803/30/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.kernel.org/show_bug.cgi?id=116741",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.kernel.org/show_bug.cgi?id=116741"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6",
|
"name": "https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -81,6 +66,21 @@
|
|||||||
"name": "91540",
|
"name": "91540",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/91540"
|
"url": "http://www.securityfocus.com/bid/91540"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20160630 [CVE-2016-6130] Double-Fetch Vulnerability in Linux-4.5/drivers/s390/char/sclp_ctl.c",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/538803/30/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.kernel.org/show_bug.cgi?id=116741",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.kernel.org/show_bug.cgi?id=116741"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2016-6702",
|
"ID": "CVE-2016-6702",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2016-7760",
|
"ID": "CVE-2016-7760",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -80,19 +80,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1350683",
|
"name": "RHSA-2017:1106",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1350683"
|
"url": "https://access.redhat.com/errata/RHSA-2017:1106"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-10/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-10/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-11/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-11/"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www.mozilla.org/security/advisories/mfsa2017-12/",
|
"name": "https://www.mozilla.org/security/advisories/mfsa2017-12/",
|
||||||
@ -100,39 +90,49 @@
|
|||||||
"url": "https://www.mozilla.org/security/advisories/mfsa2017-12/"
|
"url": "https://www.mozilla.org/security/advisories/mfsa2017-12/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-13/",
|
"name": "https://www.mozilla.org/security/advisories/mfsa2017-11/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-13/"
|
"url": "https://www.mozilla.org/security/advisories/mfsa2017-11/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-3831",
|
"name": "https://www.mozilla.org/security/advisories/mfsa2017-10/",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://www.debian.org/security/2017/dsa-3831"
|
"url": "https://www.mozilla.org/security/advisories/mfsa2017-10/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2017:1104",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1104"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2017:1106",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1106"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2017:1201",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1201"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "97940",
|
"name": "97940",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/97940"
|
"url": "http://www.securityfocus.com/bid/97940"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3831",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "https://www.debian.org/security/2017/dsa-3831"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.mozilla.org/security/advisories/mfsa2017-13/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.mozilla.org/security/advisories/mfsa2017-13/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1038320",
|
"name": "1038320",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1038320"
|
"url": "http://www.securitytracker.com/id/1038320"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1350683",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1350683"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2017:1104",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2017:1104"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2017:1201",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2017:1201"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2017-5525",
|
"ID": "CVE-2017-5525",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20170118 CVE request Qemu: audio: memory leakage in ac97 device",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2017/01/17/19"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20170118 Re: CVE request Qemu: audio: memory leakage in ac97 device",
|
"name": "[oss-security] 20170118 Re: CVE request Qemu: audio: memory leakage in ac97 device",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -67,11 +62,6 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
|
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=12351a91da97b414eec8cdb09f1d9f41e535a401",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=12351a91da97b414eec8cdb09f1d9f41e535a401"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "GLSA-201702-28",
|
"name": "GLSA-201702-28",
|
||||||
"refsource": "GENTOO",
|
"refsource": "GENTOO",
|
||||||
@ -81,6 +71,16 @@
|
|||||||
"name": "95671",
|
"name": "95671",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/95671"
|
"url": "http://www.securityfocus.com/bid/95671"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=12351a91da97b414eec8cdb09f1d9f41e535a401",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=12351a91da97b414eec8cdb09f1d9f41e535a401"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20170118 CVE request Qemu: audio: memory leakage in ac97 device",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2017/01/17/19"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2017-5580",
|
"ID": "CVE-2017-5580",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20170124 CVE request Virglrenderer: OOB access while parsing texture instruction",
|
"name": "GLSA-201707-06",
|
||||||
"refsource" : "MLIST",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2017/01/24/5"
|
"url": "https://security.gentoo.org/glsa/201707-06"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20170125 Re: CVE request Virglrenderer: OOB access while parsing texture instruction",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2017/01/25/5"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0",
|
"name": "[virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0",
|
||||||
@ -72,15 +67,20 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://cgit.freedesktop.org/virglrenderer/commit/src/gallium/auxiliary/tgsi/tgsi_text.c?id=28894a30a17a84529be102b21118e55d6c9f23fa"
|
"url": "https://cgit.freedesktop.org/virglrenderer/commit/src/gallium/auxiliary/tgsi/tgsi_text.c?id=28894a30a17a84529be102b21118e55d6c9f23fa"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "GLSA-201707-06",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201707-06"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "95782",
|
"name": "95782",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/95782"
|
"url": "http://www.securityfocus.com/bid/95782"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20170124 CVE request Virglrenderer: OOB access while parsing texture instruction",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2017/01/24/5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20170125 Re: CVE request Virglrenderer: OOB access while parsing texture instruction",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2017/01/25/5"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user