mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
afa014096c
commit
df1a0ba43d
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "ASB01-02",
|
|
||||||
"refsource" : "ALLAIRE",
|
|
||||||
"url" : "http://www.allaire.com/handlers/index.cfm?ID=19546&Method=Full"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "jrun-webinf-file-retrieval(6008)",
|
"name": "jrun-webinf-file-retrieval(6008)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6008"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6008"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ASB01-02",
|
||||||
|
"refsource": "ALLAIRE",
|
||||||
|
"url": "http://www.allaire.com/handlers/index.cfm?ID=19546&Method=Full"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20010617 Buffer Overflow in GazTek HTTP Daemon v1.4 (ghttpd)",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=99279182704674&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20010630 Advisory Ghttp 1.4",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=99406263214417&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "gaztek-ghttpd-bo(6702)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6702"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "2879",
|
"name": "2879",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -76,6 +61,21 @@
|
|||||||
"name": "2965",
|
"name": "2965",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/2965"
|
"url": "http://www.securityfocus.com/bid/2965"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20010617 Buffer Overflow in GazTek HTTP Daemon v1.4 (ghttpd)",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=99279182704674&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "gaztek-ghttpd-bo(6702)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6702"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20010630 Advisory Ghttp 1.4",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=99406263214417&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060425 Instant Photo Gallery <= Multiple XSS",
|
"name": "24985",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/432024/100/0/threaded"
|
"url": "http://www.osvdb.org/24985"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060427 Re: Instant Photo Gallery <= Multiple XSS",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/432241/100/0/threaded"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20060427 Instant Photo Gallery <= Multiple XSS (fwd)",
|
"name": "20060427 Instant Photo Gallery <= Multiple XSS (fwd)",
|
||||||
@ -72,15 +67,20 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/17696"
|
"url": "http://www.securityfocus.com/bid/17696"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "24985",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/24985"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "803",
|
"name": "803",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/803"
|
"url": "http://securityreason.com/securityalert/803"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060427 Re: Instant Photo Gallery <= Multiple XSS",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/432241/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060425 Instant Photo Gallery <= Multiple XSS",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/432024/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "HPSBST02112",
|
"name": "ADV-2006-1458",
|
||||||
"refsource" : "HP",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00642089"
|
"url": "http://www.vupen.com/english/advisories/2006/1458"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1015969",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1015969"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SSRT061129",
|
"name": "SSRT061129",
|
||||||
@ -68,24 +73,19 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/17638"
|
"url": "http://www.securityfocus.com/bid/17638"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-1458",
|
"name": "hp-storageworks-win-dos(25939)",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "XF",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/1458"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25939"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1015969",
|
"name": "HPSBST02112",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "HP",
|
||||||
"url" : "http://securitytracker.com/id?1015969"
|
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00642089"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "19752",
|
"name": "19752",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/19752"
|
"url": "http://secunia.com/advisories/19752"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "hp-storageworks-win-dos(25939)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25939"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,26 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://pridels0.blogspot.com/2006/05/cyberbuild-vuln.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://pridels0.blogspot.com/2006/05/cyberbuild-vuln.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17829",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/17829"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-1630",
|
"name": "ADV-2006-1630",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2006/1630"
|
"url": "http://www.vupen.com/english/advisories/2006/1630"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "25197",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/25197"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "25198",
|
"name": "25198",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
@ -83,14 +68,29 @@
|
|||||||
"url": "http://www.osvdb.org/25199"
|
"url": "http://www.osvdb.org/25199"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "19889",
|
"name": "25197",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://secunia.com/advisories/19889"
|
"url": "http://www.osvdb.org/25197"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://pridels0.blogspot.com/2006/05/cyberbuild-vuln.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://pridels0.blogspot.com/2006/05/cyberbuild-vuln.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "17829",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/17829"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "cyberbuild-multiple-xss(26202)",
|
"name": "cyberbuild-multiple-xss(26202)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26202"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26202"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "19889",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/19889"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,40 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060512 Multiple vulnerabilities in Raydium rev 309",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/433930/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://aluigi.altervista.org/adv/raydiumx-adv.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://aluigi.altervista.org/adv/raydiumx-adv.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "17986",
|
"name": "17986",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/17986"
|
"url": "http://www.securityfocus.com/bid/17986"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2006-1808",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/1808"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20097",
|
"name": "20097",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/20097"
|
"url": "http://secunia.com/advisories/20097"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "900",
|
"name": "ADV-2006-1808",
|
||||||
"refsource" : "SREASON",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://securityreason.com/securityalert/900"
|
"url": "http://www.vupen.com/english/advisories/2006/1808"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://aluigi.altervista.org/adv/raydiumx-adv.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://aluigi.altervista.org/adv/raydiumx-adv.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "raydium-raydiumnetworkread-bo(26516)",
|
"name": "raydium-raydiumnetworkread-bo(26516)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26516"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26516"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060512 Multiple vulnerabilities in Raydium rev 309",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/433930/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "900",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/900"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -62,6 +62,11 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/18184"
|
"url": "http://www.securityfocus.com/bid/18184"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "4nforum-modules-sql-injection(26729)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26729"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-2061",
|
"name": "ADV-2006-2061",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -76,11 +81,6 @@
|
|||||||
"name": "20374",
|
"name": "20374",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/20374"
|
"url": "http://secunia.com/advisories/20374"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "4nforum-modules-sql-injection(26729)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26729"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,30 +58,30 @@
|
|||||||
"url": "http://www.securityfocus.com/archive/1/435746/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/435746/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-2208",
|
"name": "20485",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/2208"
|
"url": "http://secunia.com/advisories/20485"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "26237",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/26237"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1009549",
|
"name": "1009549",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1009549"
|
"url": "http://securitytracker.com/id?1009549"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20485",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/20485"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1025",
|
"name": "1025",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/1025"
|
"url": "http://securityreason.com/securityalert/1025"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "26237",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/26237"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-2208",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/2208"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ashopkart-database-file-access(15599)",
|
"name": "ashopkart-database-file-access(15599)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060620 ULtimate PHP Board <= 1.96 GOLD Code Execution (exploit code)",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/437875/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt",
|
"name": "http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "1138",
|
"name": "1138",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/1138"
|
"url": "http://securityreason.com/securityalert/1138"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060620 ULtimate PHP Board <= 1.96 GOLD Code Execution (exploit code)",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/437875/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "30454",
|
"name": "selenium-server-uspecified-xss(30313)",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "XF",
|
||||||
"url" : "http://www.osvdb.org/30454"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30313"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "22927",
|
"name": "22927",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://secunia.com/advisories/22927"
|
"url": "http://secunia.com/advisories/22927"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "selenium-server-uspecified-xss(30313)",
|
"name": "30454",
|
||||||
"refsource" : "XF",
|
"refsource": "OSVDB",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30313"
|
"url": "http://www.osvdb.org/30454"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20061203 Vt-Forum Lite System V.1.3 Xss Vuln.",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/453452/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "21428",
|
"name": "21428",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/21428"
|
"url": "http://www.securityfocus.com/bid/21428"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2006-4850",
|
"name": "20061203 Vt-Forum Lite System V.1.3 Xss Vuln.",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/4850"
|
"url": "http://www.securityfocus.com/archive/1/453452/100/0/threaded"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "23226",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/23226"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "2011",
|
"name": "2011",
|
||||||
@ -81,6 +71,16 @@
|
|||||||
"name": "vtforum-multiple-xss(30725)",
|
"name": "vtforum-multiple-xss(30725)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30725"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30725"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23226",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/23226"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-4850",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/4850"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20061012 maluinfo version 206.2.38l Remote File Include Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/448639/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20507",
|
"name": "20507",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/20507"
|
"url": "http://www.securityfocus.com/bid/20507"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "2380",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/2380"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "maluinfo-bbusage-file-include(29516)",
|
"name": "maluinfo-bbusage-file-include(29516)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29516"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29516"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20061012 maluinfo version 206.2.38l Remote File Include Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/448639/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "2380",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/2380"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2011-0212",
|
"ID": "CVE-2011-0212",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2011-0233",
|
"ID": "CVE-2011-0233",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT4808",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT4808"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT4981",
|
"name": "http://support.apple.com/kb/HT4981",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.apple.com/kb/HT4981"
|
"url": "http://support.apple.com/kb/HT4981"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://support.apple.com/kb/HT4999",
|
"name": "APPLE-SA-2011-10-12-1",
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT4999"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2011-07-20-1",
|
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html"
|
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2011-10-11-1",
|
"name": "APPLE-SA-2011-10-11-1",
|
||||||
@ -78,9 +68,19 @@
|
|||||||
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html"
|
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2011-10-12-1",
|
"name": "http://support.apple.com/kb/HT4999",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT4999"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT4808",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT4808"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2011-07-20-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
|
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-0698",
|
"ID": "CVE-2011-0698",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,26 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "ADV-2011-0439",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2011/0439"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20110209 Django multiple flaws (CVEs inside)",
|
"name": "[oss-security] 20110209 Django multiple flaws (CVEs inside)",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://openwall.com/lists/oss-security/2011/02/09/6"
|
"url": "http://openwall.com/lists/oss-security/2011/02/09/6"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.djangoproject.com/weblog/2011/feb/08/security/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.djangoproject.com/weblog/2011/feb/08/security/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDVSA-2011:031",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "46296",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/46296"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "43230",
|
"name": "43230",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -83,9 +73,19 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2011/0372"
|
"url": "http://www.vupen.com/english/advisories/2011/0372"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2011-0439",
|
"name": "46296",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "BID",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2011/0439"
|
"url": "http://www.securityfocus.com/bid/46296"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2011:031",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:031"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.djangoproject.com/weblog/2011/feb/08/security/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.djangoproject.com/weblog/2011/feb/08/security/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2011-2426",
|
"ID": "CVE-2011-2426",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,26 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-26.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-26.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2011:1333",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1333.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2011:1063",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00025.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:14070",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14070"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:15366",
|
"name": "oval:org.mitre.oval:def:15366",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
@ -81,6 +61,26 @@
|
|||||||
"name": "48308",
|
"name": "48308",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/48308"
|
"url": "http://secunia.com/advisories/48308"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:14070",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14070"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2011:1063",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00025.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2011:1333",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2011-1333.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.adobe.com/support/security/bulletins/apsb11-26.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.adobe.com/support/security/bulletins/apsb11-26.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.contextis.com/resources/blog/webgl/",
|
"name": "48319",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "http://www.contextis.com/resources/blog/webgl/"
|
"url": "http://www.securityfocus.com/bid/48319"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.contextis.com/resources/blog/webgl2/",
|
"name": "http://www.contextis.com/resources/blog/webgl2/",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.contextis.com/resources/blog/webgl2/"
|
"url": "http://www.contextis.com/resources/blog/webgl2/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "48319",
|
"name": "http://www.contextis.com/resources/blog/webgl/",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/48319"
|
"url": "http://www.contextis.com/resources/blog/webgl/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20110627 Arbitrary files deletion in Novell File Reporter 1.0.4.2",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/518626/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://aluigi.org/adv/nfr_2-adv.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://aluigi.org/adv/nfr_2-adv.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1025716",
|
"name": "1025716",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
@ -72,6 +62,16 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/45071"
|
"url": "http://secunia.com/advisories/45071"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://aluigi.org/adv/nfr_2-adv.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://aluigi.org/adv/nfr_2-adv.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20110627 Arbitrary files deletion in Novell File Reporter 1.0.4.2",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/518626/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "8309",
|
"name": "8309",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2011-2852",
|
"ID": "CVE-2011-2852",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,21 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=91120",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=91120"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "75553",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/75553"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:14551",
|
"name": "oval:org.mitre.oval:def:14551",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
@ -76,6 +61,21 @@
|
|||||||
"name": "chrome-v8-code-execution(69879)",
|
"name": "chrome-v8-code-execution(69879)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69879"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69879"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://code.google.com/p/chromium/issues/detail?id=91120",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://code.google.com/p/chromium/issues/detail?id=91120"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "75553",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/75553"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://service.real.com/realplayer/security/08162011_player/en/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://service.real.com/realplayer/security/08162011_player/en/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1025943",
|
"name": "1025943",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1025943"
|
"url": "http://www.securitytracker.com/id?1025943"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://service.real.com/realplayer/security/08162011_player/en/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://service.real.com/realplayer/security/08162011_player/en/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.cnvd.org.cn/vulnerability/CNVD-2011-05348",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.cnvd.org.cn/vulnerability/CNVD-2011-05348"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-167-01.pdf",
|
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-167-01.pdf",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-167-01.pdf"
|
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-11-167-01.pdf"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.sunwayland.com.cn/news_info_.asp?Nid=3593",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.sunwayland.com.cn/news_info_.asp?Nid=3593"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "73123",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/73123"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1025673",
|
"name": "1025673",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1025673"
|
"url": "http://securitytracker.com/id?1025673"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "73123",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/73123"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-05348",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.cnvd.org.cn/vulnerability/CNVD-2011-05348"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "44990",
|
"name": "44990",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/44990"
|
"url": "http://secunia.com/advisories/44990"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.sunwayland.com.cn/news_info_.asp?Nid=3593",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.sunwayland.com.cn/news_info_.asp?Nid=3593"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2011-3509",
|
"ID": "CVE-2011-3509",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-3602",
|
"ID": "CVE-2011-3602",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,9 +58,9 @@
|
|||||||
"url": "http://www.openwall.com/lists/oss-security/2011/10/06/3"
|
"url": "http://www.openwall.com/lists/oss-security/2011/10/06/3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.litech.org/radvd/CHANGES",
|
"name": "DSA-2323",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://www.litech.org/radvd/CHANGES"
|
"url": "http://www.debian.org/security/2011/dsa-2323"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc",
|
"name": "https://github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "https://github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc"
|
"url": "https://github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-2323",
|
"name": "http://www.litech.org/radvd/CHANGES",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.debian.org/security/2011/dsa-2323"
|
"url": "http://www.litech.org/radvd/CHANGES"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1257-1",
|
"name": "USN-1257-1",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2011-3971",
|
"ID": "CVE-2011-3971",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,50 +52,50 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=110374",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=110374"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT5400",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT5400"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT5485",
|
"name": "http://support.apple.com/kb/HT5485",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://support.apple.com/kb/HT5485"
|
"url": "http://support.apple.com/kb/HT5485"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT5503",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT5503"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2012-07-25-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2012-09-12-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2012-09-19-1",
|
"name": "APPLE-SA-2012-09-19-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT5503",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT5503"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:14960",
|
"name": "oval:org.mitre.oval:def:14960",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14960"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14960"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://code.google.com/p/chromium/issues/detail?id=110374",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://code.google.com/p/chromium/issues/detail?id=110374"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2012-09-12-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2012-07-25-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT5400",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT5400"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2011-4098",
|
"ID": "CVE-2011-4098",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,20 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[cluster-devel] 20110912 [PATCH] GFS2: rewrite fallocate code to write blocks directly",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://www.redhat.com/archives/cluster-devel/2011-September/msg00064.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=64dd153c83743af81f20924c6343652d731eeecb",
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=64dd153c83743af81f20924c6343652d731eeecb",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=64dd153c83743af81f20924c6343652d731eeecb"
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=64dd153c83743af81f20924c6343652d731eeecb"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.2.bz2",
|
"name": "https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=fadca7bdc43b02f518585d9547019966415cadfd",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.2.bz2"
|
"url": "https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=fadca7bdc43b02f518585d9547019966415cadfd"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[cluster-devel] 20110912 [PATCH] GFS2: rewrite fallocate code to write blocks directly",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://www.redhat.com/archives/cluster-devel/2011-September/msg00064.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/torvalds/linux/commit/64dd153c83743af81f20924c6343652d731eeecb",
|
"name": "https://github.com/torvalds/linux/commit/64dd153c83743af81f20924c6343652d731eeecb",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "https://github.com/torvalds/linux/commit/64dd153c83743af81f20924c6343652d731eeecb"
|
"url": "https://github.com/torvalds/linux/commit/64dd153c83743af81f20924c6343652d731eeecb"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=fadca7bdc43b02f518585d9547019966415cadfd",
|
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.2.bz2",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=fadca7bdc43b02f518585d9547019966415cadfd"
|
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.2.bz2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,11 +57,26 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html"
|
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "49259",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/49259"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "82136",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/82136"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[rt-announce] 20120522 RT 4.0.6 Released - Security Release",
|
"name": "[rt-announce] 20120522 RT 4.0.6 Released - Security Release",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html"
|
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "rt-unspecified-sql-injection(75824)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75824"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[rt-announce] 20120522 Security vulnerabilities in RT",
|
"name": "[rt-announce] 20120522 Security vulnerabilities in RT",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -71,21 +86,6 @@
|
|||||||
"name": "53660",
|
"name": "53660",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/53660"
|
"url": "http://www.securityfocus.com/bid/53660"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "82136",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/82136"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "49259",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/49259"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "rt-unspecified-sql-injection(75824)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75824"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2013-1030",
|
"ID": "CVE-2013-1030",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT5880",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT5880"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2013-09-12-1",
|
"name": "APPLE-SA-2013-09-12-1",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
|
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT5880",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT5880"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2013-1257",
|
"ID": "CVE-2013-1257",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "TA13-043B",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:16176",
|
"name": "oval:org.mitre.oval:def:16176",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16176"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16176"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA13-043B",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2013-1380",
|
"ID": "CVE-2013-1380",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2013:0670",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.adobe.com/support/security/bulletins/apsb13-11.html",
|
"name": "http://www.adobe.com/support/security/bulletins/apsb13-11.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -67,11 +72,6 @@
|
|||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0730.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0730.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2013:0670",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:0672",
|
"name": "openSUSE-SU-2013:0672",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||||
"ID": "CVE-2013-5350",
|
"ID": "CVE-2013-5350",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://secunia.com/secunia_research/2014-1/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://secunia.com/secunia_research/2014-1/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.openpne.jp/archives/12293/",
|
"name": "https://www.openpne.jp/archives/12293/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -67,15 +62,20 @@
|
|||||||
"refsource": "JVN",
|
"refsource": "JVN",
|
||||||
"url": "http://jvn.jp/en/jp/JVN69986880/index.html"
|
"url": "http://jvn.jp/en/jp/JVN69986880/index.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "JVNDB-2014-000009",
|
|
||||||
"refsource" : "JVNDB",
|
|
||||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000009"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "54043",
|
"name": "54043",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/54043"
|
"url": "http://secunia.com/advisories/54043"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://secunia.com/secunia_research/2014-1/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://secunia.com/secunia_research/2014-1/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "JVNDB-2014-000009",
|
||||||
|
"refsource": "JVNDB",
|
||||||
|
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000009"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2013-5828",
|
"ID": "CVE-2013-5828",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "55322",
|
"name": "55322",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/55322"
|
"url": "http://secunia.com/advisories/55322"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2013-5831",
|
"ID": "CVE-2013-5831",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,39 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
|
"name": "RHSA-2014:0414",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
|
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT5982",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT5982"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2013-10-15-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBUX02943",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBUX02944",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:1440",
|
"name": "RHSA-2013:1440",
|
||||||
@ -93,44 +63,74 @@
|
|||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2013:1507",
|
"name": "63129",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "BID",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
|
"url": "http://www.securityfocus.com/bid/63129"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:1508",
|
"name": "RHSA-2013:1508",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "RHSA-2013:1793",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:0414",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2014:0414"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2013:1677",
|
"name": "SUSE-SU-2013:1677",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "63129",
|
"name": "HPSBUX02944",
|
||||||
"refsource" : "BID",
|
"refsource": "HP",
|
||||||
"url" : "http://www.securityfocus.com/bid/63129"
|
"url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBUX02943",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:19122",
|
"name": "oval:org.mitre.oval:def:19122",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19122"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19122"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2013:1793",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2013-10-15-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2013:1507",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT5982",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT5982"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "56338",
|
"name": "56338",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/56338"
|
"url": "http://secunia.com/advisories/56338"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2014-2120",
|
"ID": "CVE-2014-2120",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1029935",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1029935"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20140318 Cisco Adaptive Security Appliance WebVPN Login Page Cross-Site Scripting Vulnerability",
|
"name": "20140318 Cisco Adaptive Security Appliance WebVPN Login Page Cross-Site Scripting Vulnerability",
|
||||||
"refsource": "CISCO",
|
"refsource": "CISCO",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "66290",
|
"name": "66290",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/66290"
|
"url": "http://www.securityfocus.com/bid/66290"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1029935",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1029935"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2014-2144",
|
"ID": "CVE-2014-2144",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2014-2147",
|
"ID": "CVE-2014-2147",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -67,15 +67,15 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/72551"
|
"url": "http://www.securityfocus.com/bid/72551"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1031715",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1031715"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "cisco-prime-cve20142147-xfs(100755)",
|
"name": "cisco-prime-cve20142147-xfs(100755)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100755"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100755"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1031715",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1031715"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,31 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "33069",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/33069"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/126337/Wireshark-1.8.12-1.10.5-wiretap-mpeg.c-Stack-Buffer-Overflow.html",
|
"name": "http://packetstormsecurity.com/files/126337/Wireshark-1.8.12-1.10.5-wiretap-mpeg.c-Stack-Buffer-Overflow.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/126337/Wireshark-1.8.12-1.10.5-wiretap-mpeg.c-Stack-Buffer-Overflow.html"
|
"url": "http://packetstormsecurity.com/files/126337/Wireshark-1.8.12-1.10.5-wiretap-mpeg.c-Stack-Buffer-Overflow.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "104199",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/show/osvdb/104199"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "57489",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/57489"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2014:0341",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "57480",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/57480"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.wireshark.org/security/wnpa-sec-2014-04.html",
|
"name": "http://www.wireshark.org/security/wnpa-sec-2014-04.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -73,24 +88,9 @@
|
|||||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9843"
|
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9843"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=f567435ac7140c96a5de56dbce3d5e7659af4d09",
|
"name": "33069",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=f567435ac7140c96a5de56dbce3d5e7659af4d09"
|
"url": "http://www.exploit-db.com/exploits/33069"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2871",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-2871"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:0341",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0341.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:0342",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0342.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2014:0382",
|
"name": "openSUSE-SU-2014:0382",
|
||||||
@ -98,19 +98,9 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2014:0383",
|
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=f567435ac7140c96a5de56dbce3d5e7659af4d09",
|
||||||
"refsource" : "SUSE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html"
|
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=f567435ac7140c96a5de56dbce3d5e7659af4d09"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "66066",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/66066"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "104199",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/show/osvdb/104199"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1029907",
|
"name": "1029907",
|
||||||
@ -118,14 +108,24 @@
|
|||||||
"url": "http://www.securitytracker.com/id/1029907"
|
"url": "http://www.securitytracker.com/id/1029907"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "57480",
|
"name": "openSUSE-SU-2014:0383",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "SUSE",
|
||||||
"url" : "http://secunia.com/advisories/57480"
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "57489",
|
"name": "DSA-2871",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://secunia.com/advisories/57489"
|
"url": "http://www.debian.org/security/2014/dsa-2871"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2014:0342",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-0342.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "66066",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/66066"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2014-2814",
|
"ID": "CVE-2014-2814",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "MS14-042",
|
"name": "59780",
|
||||||
"refsource" : "MS",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-042"
|
"url": "http://secunia.com/advisories/59780"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "297262",
|
|
||||||
"refsource" : "MSKB",
|
|
||||||
"url" : "https://support.microsoft.com/kb/2972621"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "68393",
|
"name": "68393",
|
||||||
@ -73,9 +68,14 @@
|
|||||||
"url": "http://www.securitytracker.com/id/1030538"
|
"url": "http://www.securitytracker.com/id/1030538"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "59780",
|
"name": "297262",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MSKB",
|
||||||
"url" : "http://secunia.com/advisories/59780"
|
"url": "https://support.microsoft.com/kb/2972621"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MS14-042",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-042"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2014-6344",
|
"ID": "CVE-2014-6344",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "MS14-065",
|
"name": "1031185",
|
||||||
"refsource" : "MS",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065"
|
"url": "http://www.securitytracker.com/id/1031185"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "70346",
|
"name": "70346",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/70346"
|
"url": "http://www.securityfocus.com/bid/70346"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1031185",
|
"name": "MS14-065",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MS",
|
||||||
"url" : "http://www.securitytracker.com/id/1031185"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2014-6468",
|
"ID": "CVE-2014-6468",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,29 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
|
"name": "61609",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
|
"url": "http://secunia.com/advisories/61609"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://linux.oracle.com/errata/ELSA-2014-1636",
|
"name": "61928",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://linux.oracle.com/errata/ELSA-2014-1636"
|
"url": "http://secunia.com/advisories/61928"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21692299",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21692299"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201502-12",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://security.gentoo.org/glsa/glsa-201502-12.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:1636",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1636.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "70488",
|
"name": "70488",
|
||||||
@ -88,14 +73,29 @@
|
|||||||
"url": "http://secunia.com/advisories/60416"
|
"url": "http://secunia.com/advisories/60416"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "61609",
|
"name": "RHSA-2014:1636",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "REDHAT",
|
||||||
"url" : "http://secunia.com/advisories/61609"
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "61928",
|
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/61928"
|
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://linux.oracle.com/errata/ELSA-2014-1636",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://linux.oracle.com/errata/ELSA-2014-1636"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201502-12",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21692299",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692299"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2014-6575",
|
"ID": "CVE-2014-6575",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1031583",
|
"name": "1031583",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1031583"
|
"url": "http://www.securitytracker.com/id/1031583"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-6791",
|
"ID": "CVE-2014-6791",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#322809",
|
"name": "VU#322809",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0134"
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0134"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "96687",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/96687"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1038006",
|
"name": "1038006",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1038006"
|
"url": "http://www.securitytracker.com/id/1038006"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "96687",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/96687"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"ID": "CVE-2017-0468",
|
"ID": "CVE-2017-0468",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -66,15 +66,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "96717",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/96717"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1037968",
|
"name": "1037968",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1037968"
|
"url": "http://www.securitytracker.com/id/1037968"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "96717",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/96717"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-16461",
|
"ID": "CVE-2017-16461",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -109,14 +109,9 @@
|
|||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/135859"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22013375",
|
"name": "103130",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22013375"
|
"url": "http://www.securityfocus.com/bid/103130"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22012828",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22012828"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22013432",
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg22013432",
|
||||||
@ -124,9 +119,14 @@
|
|||||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22013432"
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg22013432"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "103130",
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg22012828",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/103130"
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg22012828"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg22013375",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg22013375"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-1820",
|
"ID": "CVE-2017-1820",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4084",
|
"ID": "CVE-2017-4084",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4286",
|
"ID": "CVE-2017-4286",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4372",
|
"ID": "CVE-2017-4372",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4432",
|
"ID": "CVE-2017-4432",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4482",
|
"ID": "CVE-2017-4482",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user