mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
f7b9d251af
commit
e2f2e8a6fc
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-056.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-056.htm"
|
||||
},
|
||||
{
|
||||
"name" : "102033",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102033-1"
|
||||
},
|
||||
{
|
||||
"name" : "16245",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16245"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0200",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0200"
|
||||
"name": "oval:org.mitre.oval:def:662",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A662"
|
||||
},
|
||||
{
|
||||
"name": "22441",
|
||||
@ -78,14 +63,14 @@
|
||||
"url": "http://www.osvdb.org/22441"
|
||||
},
|
||||
{
|
||||
"name" : "22442",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/22442"
|
||||
"name": "102033",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102033-1"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:662",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A662"
|
||||
"name": "ADV-2006-0200",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0200"
|
||||
},
|
||||
{
|
||||
"name": "1015492",
|
||||
@ -93,9 +78,19 @@
|
||||
"url": "http://securitytracker.com/id?1015492"
|
||||
},
|
||||
{
|
||||
"name" : "18498",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18498"
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-056.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-056.htm"
|
||||
},
|
||||
{
|
||||
"name": "16245",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16245"
|
||||
},
|
||||
{
|
||||
"name": "solaris-lpsched-dos(24127)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24127"
|
||||
},
|
||||
{
|
||||
"name": "19087",
|
||||
@ -103,9 +98,14 @@
|
||||
"url": "http://secunia.com/advisories/19087"
|
||||
},
|
||||
{
|
||||
"name" : "solaris-lpsched-dos(24127)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24127"
|
||||
"name": "22442",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/22442"
|
||||
},
|
||||
{
|
||||
"name": "18498",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18498"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060122 Newsphp Multiple SQL Injection Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/423129/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "16339",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16339"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0341",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0341"
|
||||
},
|
||||
{
|
||||
"name": "22717",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/22717"
|
||||
},
|
||||
{
|
||||
"name": "20060122 Newsphp Multiple SQL Injection Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/423129/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "18624",
|
||||
"refsource": "SECUNIA",
|
||||
@ -81,6 +71,16 @@
|
||||
"name": "newsphp-index-sql-injection(24320)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24320"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0341",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0341"
|
||||
},
|
||||
{
|
||||
"name": "16339",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16339"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,55 +52,55 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060224 Advisory: CilemNews System <= 1.1 Remote SQL",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://marc.info/?l=full-disclosure&m=114079912721723&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20060224 Advisory: CilemNews System <= 1.1 Remote SQL Injection Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-02/0449.html"
|
||||
},
|
||||
{
|
||||
"name" : "1562",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/1562"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.nukedx.com/?viewdoc=10",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.nukedx.com/?viewdoc=10"
|
||||
},
|
||||
{
|
||||
"name": "16813",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16813"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0881",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0881"
|
||||
},
|
||||
{
|
||||
"name" : "23618",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/23618"
|
||||
},
|
||||
{
|
||||
"name": "1015677",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015677"
|
||||
},
|
||||
{
|
||||
"name" : "19157",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19157"
|
||||
"name": "23618",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/23618"
|
||||
},
|
||||
{
|
||||
"name": "20060224 Advisory: CilemNews System <= 1.1 Remote SQL Injection Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-02/0449.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.nukedx.com/?viewdoc=10",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.nukedx.com/?viewdoc=10"
|
||||
},
|
||||
{
|
||||
"name": "1562",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/1562"
|
||||
},
|
||||
{
|
||||
"name": "20060224 Advisory: CilemNews System <= 1.1 Remote SQL",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://marc.info/?l=full-disclosure&m=114079912721723&w=2"
|
||||
},
|
||||
{
|
||||
"name": "cilemnews-sql-injection(24920)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24920"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0881",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0881"
|
||||
},
|
||||
{
|
||||
"name": "19157",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19157"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060609 myPHP Guestbook 2.0.2 XSS Vulnerabilitie",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/436842/100/0/threaded"
|
||||
"name": "myphpguestbook-index-xss(27074)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27074"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2308",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://securityreason.com/securityalert/1110"
|
||||
},
|
||||
{
|
||||
"name" : "myphpguestbook-index-xss(27074)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27074"
|
||||
"name": "20060609 myPHP Guestbook 2.0.2 XSS Vulnerabilitie",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/436842/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://pridels0.blogspot.com/2006/06/uebimiau-webmail-xss-vuln.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://pridels0.blogspot.com/2006/06/uebimiau-webmail-xss-vuln.html"
|
||||
"name": "uebimiau-multiple-scripts-xss(27371)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27371"
|
||||
},
|
||||
{
|
||||
"name": "18643",
|
||||
@ -63,9 +63,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/18643"
|
||||
},
|
||||
{
|
||||
"name" : "22375",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22375"
|
||||
"name": "20804",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20804"
|
||||
},
|
||||
{
|
||||
"name": "http://pridels0.blogspot.com/2006/06/uebimiau-webmail-xss-vuln.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://pridels0.blogspot.com/2006/06/uebimiau-webmail-xss-vuln.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2513",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2513"
|
||||
},
|
||||
{
|
||||
"name" : "20804",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20804"
|
||||
},
|
||||
{
|
||||
"name" : "uebimiau-multiple-scripts-xss(27371)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27371"
|
||||
"name": "22375",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22375"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,44 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060715 MiniBB Forum <= 1.5a Remote File Include Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/440132/100/0/threaded"
|
||||
"name": "1016507",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016507"
|
||||
},
|
||||
{
|
||||
"name": "2030",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2030"
|
||||
},
|
||||
{
|
||||
"name": "1245",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1245"
|
||||
},
|
||||
{
|
||||
"name": "http://advisories.echo.or.id/adv/adv39-matdhule-2006.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://advisories.echo.or.id/adv/adv39-matdhule-2006.txt"
|
||||
},
|
||||
{
|
||||
"name": "20060715 MiniBB Forum <= 1.5a Remote File Include Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/440132/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "18998",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18998"
|
||||
},
|
||||
{
|
||||
"name" : "28594",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/28594"
|
||||
},
|
||||
{
|
||||
"name" : "1016507",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016507"
|
||||
},
|
||||
{
|
||||
"name" : "1245",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1245"
|
||||
},
|
||||
{
|
||||
"name": "minibb-multiple-scripts-file-include(27749)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27749"
|
||||
},
|
||||
{
|
||||
"name": "28594",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/28594"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060809 Stack and heap overflows in MODPlug Tracker/OpenMPT 1.17.02.43 and libmodplug 0.8",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/442721/100/100/threaded"
|
||||
"name": "21418",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21418"
|
||||
},
|
||||
{
|
||||
"name" : "http://aluigi.altervista.org/adv/mptho-adv.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://aluigi.altervista.org/adv/mptho-adv.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/?id=bc2cdd57d549ab3ba59782e9b395d0cd683fd3ac",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/?id=bc2cdd57d549ab3ba59782e9b395d0cd683fd3ac"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=497154",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=497154"
|
||||
"name": "openmpt-readsample-bo(28309)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28309"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200612-04",
|
||||
@ -78,19 +68,9 @@
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200612-04.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2007:001",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:001"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:0477",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://rhn.redhat.com/errata/RHSA-2011-0477.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2006:023",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
|
||||
"name": "19448",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19448"
|
||||
},
|
||||
{
|
||||
"name": "USN-521-1",
|
||||
@ -98,24 +78,14 @@
|
||||
"url": "http://www.ubuntu.com/usn/usn-521-1"
|
||||
},
|
||||
{
|
||||
"name" : "19448",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19448"
|
||||
"name": "SUSE-SR:2006:023",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3231",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3231"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4310",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4310"
|
||||
},
|
||||
{
|
||||
"name" : "21418",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21418"
|
||||
"name": "http://aluigi.altervista.org/adv/mptho-adv.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://aluigi.altervista.org/adv/mptho-adv.txt"
|
||||
},
|
||||
{
|
||||
"name": "22658",
|
||||
@ -123,14 +93,9 @@
|
||||
"url": "http://secunia.com/advisories/22658"
|
||||
},
|
||||
{
|
||||
"name" : "22080",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22080"
|
||||
},
|
||||
{
|
||||
"name" : "23294",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23294"
|
||||
"name": "20060809 Stack and heap overflows in MODPlug Tracker/OpenMPT 1.17.02.43 and libmodplug 0.8",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/442721/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "23555",
|
||||
@ -138,24 +103,59 @@
|
||||
"url": "http://secunia.com/advisories/23555"
|
||||
},
|
||||
{
|
||||
"name" : "26979",
|
||||
"name": "22080",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/26979"
|
||||
"url": "http://secunia.com/advisories/22080"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4310",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4310"
|
||||
},
|
||||
{
|
||||
"name": "http://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/?id=bc2cdd57d549ab3ba59782e9b395d0cd683fd3ac",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/?id=bc2cdd57d549ab3ba59782e9b395d0cd683fd3ac"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2007:001",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:001"
|
||||
},
|
||||
{
|
||||
"name": "1397",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1397"
|
||||
},
|
||||
{
|
||||
"name": "26979",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26979"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0477",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://rhn.redhat.com/errata/RHSA-2011-0477.html"
|
||||
},
|
||||
{
|
||||
"name": "23294",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23294"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3231",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3231"
|
||||
},
|
||||
{
|
||||
"name": "openmpt-loadit-bo(28305)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28305"
|
||||
},
|
||||
{
|
||||
"name" : "openmpt-readsample-bo(28309)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28309"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=497154",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=497154"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,125 +52,125 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061130 Multiple Vendor libgsf Heap Overflow Vulnerability",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=446"
|
||||
},
|
||||
{
|
||||
"name" : "20061214 rPSA-2006-0232-1 libgsf",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/454389/30/9210/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.rpath.com/browse/RPL-857",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-857"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1221",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1221"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200612-13",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200612-13.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2006:220",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:220"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2007:0011",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2007-0011.html"
|
||||
},
|
||||
{
|
||||
"name" : "20070101-01-P",
|
||||
"refsource" : "SGI",
|
||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070101-01-P.asc"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2006:076",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0005.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-391-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-391-1"
|
||||
},
|
||||
{
|
||||
"name" : "21358",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21358"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:9413",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9413"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4784",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4784"
|
||||
},
|
||||
{
|
||||
"name" : "23164",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23164"
|
||||
},
|
||||
{
|
||||
"name" : "23166",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23166"
|
||||
},
|
||||
{
|
||||
"name": "23167",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23167"
|
||||
},
|
||||
{
|
||||
"name" : "23227",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23227"
|
||||
},
|
||||
{
|
||||
"name" : "23355",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23355"
|
||||
},
|
||||
{
|
||||
"name" : "23337",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23337"
|
||||
},
|
||||
{
|
||||
"name" : "23352",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23352"
|
||||
},
|
||||
{
|
||||
"name" : "23686",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23686"
|
||||
},
|
||||
{
|
||||
"name": "23920",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23920"
|
||||
},
|
||||
{
|
||||
"name": "23352",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23352"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200612-13",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200612-13.xml"
|
||||
},
|
||||
{
|
||||
"name": "USN-391-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-391-1"
|
||||
},
|
||||
{
|
||||
"name": "23227",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23227"
|
||||
},
|
||||
{
|
||||
"name": "21358",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21358"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:220",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:220"
|
||||
},
|
||||
{
|
||||
"name": "20061130 Multiple Vendor libgsf Heap Overflow Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=446"
|
||||
},
|
||||
{
|
||||
"name": "libgsf-metabat-bo(30611)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30611"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4784",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4784"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2006:076",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0005.html"
|
||||
},
|
||||
{
|
||||
"name": "20061214 rPSA-2006-0232-1 libgsf",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/454389/30/9210/threaded"
|
||||
},
|
||||
{
|
||||
"name": "23166",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23166"
|
||||
},
|
||||
{
|
||||
"name": "23337",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23337"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:9413",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9413"
|
||||
},
|
||||
{
|
||||
"name": "23355",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23355"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1221",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1221"
|
||||
},
|
||||
{
|
||||
"name": "23164",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23164"
|
||||
},
|
||||
{
|
||||
"name": "23686",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23686"
|
||||
},
|
||||
{
|
||||
"name": "20070101-01-P",
|
||||
"refsource": "SGI",
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070101-01-P.asc"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060901 SolpotCrew Advisory #7 - AlstraSoft Template Seller Remote File Include Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/445156/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "19769",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19769"
|
||||
},
|
||||
{
|
||||
"name": "20060901 SolpotCrew Advisory #7 - AlstraSoft Template Seller Remote File Include Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/445156/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1509",
|
||||
"refsource": "SREASON",
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060919 eSyndiCat Portal System XSS Vuln.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/446377/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20106",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20106"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3710",
|
||||
"refsource": "VUPEN",
|
||||
@ -73,14 +63,24 @@
|
||||
"url": "http://secunia.com/advisories/21979"
|
||||
},
|
||||
{
|
||||
"name" : "1618",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1618"
|
||||
"name": "20106",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20106"
|
||||
},
|
||||
{
|
||||
"name": "esyndicat-search-xss(29026)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29026"
|
||||
},
|
||||
{
|
||||
"name": "1618",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1618"
|
||||
},
|
||||
{
|
||||
"name": "20060919 eSyndiCat Portal System XSS Vuln.",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/446377/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://drupal.org/node/85050"
|
||||
},
|
||||
{
|
||||
"name" : "20126",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20126"
|
||||
"name": "searchkeywords-parameters-xss(29063)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29063"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3715",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://secunia.com/advisories/22021"
|
||||
},
|
||||
{
|
||||
"name" : "searchkeywords-parameters-xss(29063)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29063"
|
||||
"name": "20126",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20126"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf"
|
||||
},
|
||||
{
|
||||
"name": "23265",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23265"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://pridels0.blogspot.com/2006/04/kmail-23-vuln.html"
|
||||
},
|
||||
{
|
||||
"name" : "25065",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/25065"
|
||||
},
|
||||
{
|
||||
"name": "kmail-calendar-path-disclosure(26120)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26120"
|
||||
},
|
||||
{
|
||||
"name": "25065",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/25065"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.php-security.org/2010/05/30/mops-2010-047-php-trimltrimrtrim-interruption-information-leak-vulnerability/index.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.php-security.org/2010/05/30/mops-2010-047-php-trimltrimrtrim-interruption-information-leak-vulnerability/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.php-security.org/2010/05/30/mops-2010-048-php-substr_replace-interruption-information-leak-vulnerability/index.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.php-security.org/2010/05/30/mops-2010-048-php-substr_replace-interruption-information-leak-vulnerability/index.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBOV02763",
|
||||
"refsource": "HP",
|
||||
@ -78,14 +68,24 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2010:018",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html"
|
||||
"name": "http://www.php-security.org/2010/05/30/mops-2010-048-php-substr_replace-interruption-information-leak-vulnerability/index.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.php-security.org/2010/05/30/mops-2010-048-php-substr_replace-interruption-information-leak-vulnerability/index.html"
|
||||
},
|
||||
{
|
||||
"name": "php-substrreplace-info-disclosure(59220)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59220"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php-security.org/2010/05/30/mops-2010-047-php-trimltrimrtrim-interruption-information-leak-vulnerability/index.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.php-security.org/2010/05/30/mops-2010-047-php-trimltrimrtrim-interruption-information-leak-vulnerability/index.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2010:018",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-2524",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,70 +52,70 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100802 CVE-2010-2524 kernel: dns_resolver upcall security issue",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=128072090331700&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100802 Re: CVE-2010-2524 kernel: dns_resolver upcall security issue",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=128078387328921&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100803 Re: CVE-2010-2524 kernel: dns_resolver upcall security issue",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=128080755321157&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=612166",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=612166"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2010:172",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:172"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2010:0610",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0610.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2010:040",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-1000-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1000-1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100802 Re: CVE-2010-2524 kernel: dns_resolver upcall security issue",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=128078387328921&w=2"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2010:040",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
|
||||
},
|
||||
{
|
||||
"name": "43315",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43315"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100802 CVE-2010-2524 kernel: dns_resolver upcall security issue",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=128072090331700&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=612166",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=612166"
|
||||
},
|
||||
{
|
||||
"name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2010:172",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:172"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100803 Re: CVE-2010-2524 kernel: dns_resolver upcall security issue",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=128080755321157&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://service.real.com/realplayer/security/10152010_player/en/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://service.real.com/realplayer/security/10152010_player/en/"
|
||||
},
|
||||
{
|
||||
"name": "44144",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/44144"
|
||||
},
|
||||
{
|
||||
"name": "http://service.real.com/realplayer/security/10152010_player/en/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://service.real.com/realplayer/security/10152010_player/en/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2011-0169",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "safari-commandlineapi-xss(66006)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66006"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4566",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4566"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2011-03-09-2",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "46809",
|
||||
"refsource": "BID",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://www.securitytracker.com/id?1025183"
|
||||
},
|
||||
{
|
||||
"name" : "safari-commandlineapi-xss(66006)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/66006"
|
||||
"name": "APPLE-SA-2011-03-09-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2011-0395",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,46 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[dtcannounce] 20110303 Fwd: [SECURITY] [DSA 2179-1] dtc security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.gplhost.sg/lists/dtcannounce/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110222 CVE-2011-0436: dtc sends password of new users to site admin by unencrypted email",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2011/02/22/1"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614302",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614302"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=adffff7efb3687ff465ee0552a944dd3109f3cb0",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=adffff7efb3687ff465ee0552a944dd3109f3cb0"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=f8e3b2d7cc2da313addc05394568ab9599499285",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=f8e3b2d7cc2da313addc05394568ab9599499285"
|
||||
},
|
||||
{
|
||||
"name" : "http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog"
|
||||
},
|
||||
{
|
||||
"name" : "http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2179",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2011/dsa-2179"
|
||||
},
|
||||
{
|
||||
"name": "43523",
|
||||
"refsource": "SECUNIA",
|
||||
@ -102,10 +62,50 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0556"
|
||||
},
|
||||
{
|
||||
"name": "http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110222 CVE-2011-0436: dtc sends password of new users to site admin by unencrypted email",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2011/02/22/1"
|
||||
},
|
||||
{
|
||||
"name": "http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=adffff7efb3687ff465ee0552a944dd3109f3cb0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=adffff7efb3687ff465ee0552a944dd3109f3cb0"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2179",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2011/dsa-2179"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614302",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614302"
|
||||
},
|
||||
{
|
||||
"name": "http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=f8e3b2d7cc2da313addc05394568ab9599499285",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=f8e3b2d7cc2da313addc05394568ab9599499285"
|
||||
},
|
||||
{
|
||||
"name": "dtc-passwords-info-disc(65898)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65898"
|
||||
},
|
||||
{
|
||||
"name": "http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog"
|
||||
},
|
||||
{
|
||||
"name": "[dtcannounce] 20110303 Fwd: [SECURITY] [DSA 2179-1] dtc security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.gplhost.sg/lists/dtcannounce/msg00025.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-0567",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-11-065/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-11-065/"
|
||||
"name": "ADV-2011-0492",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0492"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
|
||||
"name": "43470",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43470"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0301",
|
||||
@ -73,9 +73,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/46199"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:12248",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12248"
|
||||
"name": "ADV-2011-0337",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0337"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-11-065/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-065/"
|
||||
},
|
||||
{
|
||||
"name": "1025033",
|
||||
@ -83,19 +88,14 @@
|
||||
"url": "http://www.securitytracker.com/id?1025033"
|
||||
},
|
||||
{
|
||||
"name" : "43470",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43470"
|
||||
"name": "oval:org.mitre.oval:def:12248",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12248"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0337",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0337"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0492",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0492"
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2011-0673",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,40 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/css/P8/documents/100133352",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/css/P8/documents/100133352"
|
||||
},
|
||||
{
|
||||
"name" : "MS11-034",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
|
||||
},
|
||||
{
|
||||
"name": "TA11-102A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
|
||||
},
|
||||
{
|
||||
"name" : "47234",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/47234"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:12546",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12546"
|
||||
},
|
||||
{
|
||||
"name" : "1025345",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1025345"
|
||||
"name": "47234",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/47234"
|
||||
},
|
||||
{
|
||||
"name": "MS11-034",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0952",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0952"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/css/P8/documents/100133352",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/css/P8/documents/100133352"
|
||||
},
|
||||
{
|
||||
"name": "44156",
|
||||
@ -93,9 +88,14 @@
|
||||
"url": "http://secunia.com/advisories/44156"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0952",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0952"
|
||||
"name": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx"
|
||||
},
|
||||
{
|
||||
"name": "1025345",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1025345"
|
||||
},
|
||||
{
|
||||
"name": "mswin-win32k-var8-priv-escalation(66402)",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2011-0856",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,20 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21515110",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21515110"
|
||||
},
|
||||
{
|
||||
"name": "49989",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/49989"
|
||||
},
|
||||
{
|
||||
"name" : "46326",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/46326"
|
||||
"name": "rational-appscan-scan-code-execution(70044)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70044"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21515110",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21515110"
|
||||
},
|
||||
{
|
||||
"name": "46329",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://secunia.com/advisories/46329"
|
||||
},
|
||||
{
|
||||
"name" : "rational-appscan-scan-code-execution(70044)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/70044"
|
||||
"name": "46326",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/46326"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://git.gplhost.com/gitweb/?p=dtc.git;a=blob;f=debian/changelog;hb=3eb6ef5cea6c571aae5e49e1930de778eca280c3",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.gplhost.com/gitweb/?p=dtc.git;a=blob;f=debian/changelog;hb=3eb6ef5cea6c571aae5e49e1930de778eca280c3"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=637629",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "DSA-2365",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2011/dsa-2365"
|
||||
},
|
||||
{
|
||||
"name": "http://git.gplhost.com/gitweb/?p=dtc.git;a=blob;f=debian/changelog;hb=3eb6ef5cea6c571aae5e49e1930de778eca280c3",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.gplhost.com/gitweb/?p=dtc.git;a=blob;f=debian/changelog;hb=3eb6ef5cea6c571aae5e49e1930de778eca280c3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2014-3060",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685705"
|
||||
},
|
||||
{
|
||||
"name" : "IT03476",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IT03476"
|
||||
},
|
||||
{
|
||||
"name": "ibm-xc10-cve20143060-sec-bypass(93534)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93534"
|
||||
},
|
||||
{
|
||||
"name": "IT03476",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT03476"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@ubuntu.com",
|
||||
"ID": "CVE-2014-3202",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20140426 Re: Ubuntu 14.04: security problem in the lock screen",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2014/04/26/2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20140426 Ubuntu 14.04: security problem in the lock screen",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2014/04/26/1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140429 Re: Ubuntu 14.04: security problem in the lock screen",
|
||||
"refsource": "MLIST",
|
||||
@ -81,6 +71,16 @@
|
||||
"name": "https://bugs.launchpad.net/unity/+bug/1308750",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.launchpad.net/unity/+bug/1308750"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140426 Ubuntu 14.04: security problem in the lock screen",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2014/04/26/1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140426 Re: Ubuntu 14.04: security problem in the lock screen",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2014/04/26/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2014-3504",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,31 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc"
|
||||
},
|
||||
{
|
||||
"name" : "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201610-05",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201610-05"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:1059",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2315-1",
|
||||
"refsource": "UBUNTU",
|
||||
@ -92,10 +67,35 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60721"
|
||||
},
|
||||
{
|
||||
"name": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt"
|
||||
},
|
||||
{
|
||||
"name": "https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:1059",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201610-05",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201610-05"
|
||||
},
|
||||
{
|
||||
"name": "59584",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59584"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2014-3539",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20140917 Vulnerability in WP-Ban allows visitors to bypass the IP blacklist in some configurations (WordPress plugin)",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Sep/60"
|
||||
"name": "https://wordpress.org/plugins/wp-ban/changelog/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wordpress.org/plugins/wp-ban/changelog/"
|
||||
},
|
||||
{
|
||||
"name": "https://security.dxw.com/advisories/vulnerability-in-wp-ban-allows-visitors-to-bypass-the-ip-blacklist-in-some-configurations/",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "https://security.dxw.com/advisories/vulnerability-in-wp-ban-allows-visitors-to-bypass-the-ip-blacklist-in-some-configurations/"
|
||||
},
|
||||
{
|
||||
"name" : "https://wordpress.org/plugins/wp-ban/changelog/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://wordpress.org/plugins/wp-ban/changelog/"
|
||||
"name": "20140917 Vulnerability in WP-Ban allows visitors to bypass the IP blacklist in some configurations (WordPress plugin)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Sep/60"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-6750",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#483233",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-6825",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#957289",
|
||||
"refsource": "CERT-VN",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-6991",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "VU#194417",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/194417"
|
||||
},
|
||||
{
|
||||
"name" : "VU#582497",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/582497"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7757",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#756737",
|
||||
"refsource": "CERT-VN",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2014-7939",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "62665",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62665"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=399951",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=399951"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201502-13",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201502-13.xml"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:0093",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:0441",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "72288",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72288"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201502-13",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
|
||||
},
|
||||
{
|
||||
"name": "1031623",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031623"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0441",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:0093",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
|
||||
},
|
||||
{
|
||||
"name": "62383",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62383"
|
||||
},
|
||||
{
|
||||
"name" : "62665",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62665"
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=399951",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=399951"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2014-8834",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/HT204244",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/HT204244"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-01-27-4",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "1031650",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031650"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/HT204244",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/HT204244"
|
||||
},
|
||||
{
|
||||
"name": "macosx-cve20148834-info-disc(100531)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100531"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-01-27-4",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-8977",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[squid-announce] 20160216 Squid 3.5.14 is available",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.squid-cache.org/pipermail/squid-announce/2016-February/000037.html"
|
||||
},
|
||||
{
|
||||
"name" : "[squid-announce] 20160216 Squid 4.0.6 beta is available",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.squid-cache.org/pipermail/squid-announce/2016-February/000038.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.squid-cache.org/show_bug.cgi?id=4437",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.squid-cache.org/show_bug.cgi?id=4437"
|
||||
},
|
||||
{
|
||||
"name": "http://www.squid-cache.org/Advisories/SQUID-2016_1.txt",
|
||||
"refsource": "CONFIRM",
|
||||
@ -77,15 +62,30 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "1035045",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035045"
|
||||
},
|
||||
{
|
||||
"name": "[squid-announce] 20160216 Squid 4.0.6 beta is available",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.squid-cache.org/pipermail/squid-announce/2016-February/000038.html"
|
||||
},
|
||||
{
|
||||
"name": "[squid-announce] 20160216 Squid 3.5.14 is available",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.squid-cache.org/pipermail/squid-announce/2016-February/000037.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:2089",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"
|
||||
},
|
||||
{
|
||||
"name" : "1035045",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1035045"
|
||||
"name": "http://bugs.squid-cache.org/show_bug.cgi?id=4437",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.squid-cache.org/show_bug.cgi?id=4437"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-2438",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/security-impact-https-interception/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/security-impact-https-interception/"
|
||||
},
|
||||
{
|
||||
"name": "http://dx.doi.org/10.14722/ndss.2017.23456",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "https://jhalderm.com/pub/papers/interception-ndss17.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "https://jhalderm.com/pub/papers/interception-ndss17.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/security-impact-https-interception/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/security-impact-https-interception/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.freedesktop.org/show_bug.cgi?id=102151",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.freedesktop.org/show_bug.cgi?id=102151"
|
||||
},
|
||||
{
|
||||
"name": "https://cgit.freedesktop.org/exempi/commit/?id=65a8492832b7335ffabd01f5f64d89dec757c260",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "USN-3668-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3668-1/"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=102151",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=102151"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -98,16 +98,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/124756",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/124756"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22002809",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22002809"
|
||||
},
|
||||
{
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/124756",
|
||||
"refsource": "MISC",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/124756"
|
||||
},
|
||||
{
|
||||
"name": "98994",
|
||||
"refsource": "BID",
|
||||
|
@ -68,11 +68,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/134427",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/134427"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22014988",
|
||||
"refsource": "CONFIRM",
|
||||
@ -82,6 +77,11 @@
|
||||
"name": "103677",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103677"
|
||||
},
|
||||
{
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134427",
|
||||
"refsource": "MISC",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134427"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "95792",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95792"
|
||||
},
|
||||
{
|
||||
"name": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://crbug.com/666714",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://crbug.com/666714"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3776",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2017/dsa-3776"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-66",
|
||||
"refsource": "GENTOO",
|
||||
@ -78,14 +73,19 @@
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0206.html"
|
||||
},
|
||||
{
|
||||
"name" : "95792",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/95792"
|
||||
"name": "https://crbug.com/666714",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://crbug.com/666714"
|
||||
},
|
||||
{
|
||||
"name": "1037718",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037718"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3776",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3776"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,25 +55,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://cxf.apache.org/security-advisories.data/CVE-2017-5653.txt.asc?version=1&modificationDate=1492515074710&api=v2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://cxf.apache.org/security-advisories.data/CVE-2017-5653.txt.asc?version=1&modificationDate=1492515074710&api=v2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1832",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1832"
|
||||
},
|
||||
{
|
||||
"name" : "97968",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/97968"
|
||||
"name": "http://cxf.apache.org/security-advisories.data/CVE-2017-5653.txt.asc?version=1&modificationDate=1492515074710&api=v2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cxf.apache.org/security-advisories.data/CVE-2017-5653.txt.asc?version=1&modificationDate=1492515074710&api=v2"
|
||||
},
|
||||
{
|
||||
"name": "1038279",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038279"
|
||||
},
|
||||
{
|
||||
"name": "97968",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97968"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user