mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
919fabd459
commit
e513d6d06f
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010410 Oracle Application Server shared library buffer overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=98692227816141&w=2"
|
||||
},
|
||||
{
|
||||
"name": "2569",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2569"
|
||||
},
|
||||
{
|
||||
"name": "20010410 Oracle Application Server shared library buffer overflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=98692227816141&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "4993",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4993"
|
||||
"name": "fgallery-fimrss-sql-injection(39964)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39964"
|
||||
},
|
||||
{
|
||||
"name": "27464",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27464"
|
||||
},
|
||||
{
|
||||
"name": "4993",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4993"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0349",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0349"
|
||||
},
|
||||
{
|
||||
"name" : "fgallery-fimrss-sql-injection(39964)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39964"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "GLSA-201111-07",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201111-07.xml"
|
||||
},
|
||||
{
|
||||
"name": "3632",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3632"
|
||||
},
|
||||
{
|
||||
"name": "28833",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28833"
|
||||
},
|
||||
{
|
||||
"name": "27660",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27660"
|
||||
},
|
||||
{
|
||||
"name": "20080206 Chat vulnerabilities in TinTin++ 1.97.9",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -62,30 +82,10 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://aluigi.altervista.org/adv/rintintin-adv.txt"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201111-07",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201111-07.xml"
|
||||
},
|
||||
{
|
||||
"name" : "27660",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27660"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0449",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0449"
|
||||
},
|
||||
{
|
||||
"name" : "28833",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28833"
|
||||
},
|
||||
{
|
||||
"name" : "3632",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3632"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2008-1157",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,30 +57,30 @@
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080313-ipm.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "28249",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28249"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0876",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0876/references"
|
||||
},
|
||||
{
|
||||
"name": "cisco-ciscoworks-ipm-command-execution(41208)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41208"
|
||||
},
|
||||
{
|
||||
"name": "1019611",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1019611"
|
||||
},
|
||||
{
|
||||
"name": "28249",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28249"
|
||||
},
|
||||
{
|
||||
"name": "29376",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29376"
|
||||
},
|
||||
{
|
||||
"name" : "cisco-ciscoworks-ipm-command-execution(41208)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41208"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://downloads.securityfocus.com/vulnerabilities/exploits/28138.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://downloads.securityfocus.com/vulnerabilities/exploits/28138.html"
|
||||
"name": "imagevue-path-xss(41169)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41169"
|
||||
},
|
||||
{
|
||||
"name": "28138",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/28138"
|
||||
},
|
||||
{
|
||||
"name" : "imagevue-path-xss(41169)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41169"
|
||||
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/28138.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/28138.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20080311 CVE request: insecure X11 handling in ltsp",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/03/11/2"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20080312 Re: CVE request: insecure X11 handling in ltsp",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/03/12/3"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462"
|
||||
"name": "1019940",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1019940"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1561",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2008/dsa-1561"
|
||||
"name": "[oss-security] 20080311 CVE request: insecure X11 handling in ltsp",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/03/11/2"
|
||||
},
|
||||
{
|
||||
"name": "USN-610-1",
|
||||
@ -83,20 +78,25 @@
|
||||
"url": "http://www.securityfocus.com/bid/28960"
|
||||
},
|
||||
{
|
||||
"name" : "1019940",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1019940"
|
||||
"name": "30099",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30099"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1561",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1561"
|
||||
},
|
||||
{
|
||||
"name": "29959",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29959"
|
||||
},
|
||||
{
|
||||
"name" : "30099",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30099"
|
||||
},
|
||||
{
|
||||
"name": "ltsp-ldm-weak-security(42080)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080521 [DSECRG-08-020] Alcatel OmniPCX Office Remote Comand Execution",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/492383/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "5662",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -68,29 +63,34 @@
|
||||
"url": "http://www1.alcatel-lucent.com/psirt/statements/2008001/OXOrexec.htm"
|
||||
},
|
||||
{
|
||||
"name" : "28758",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28758"
|
||||
"name": "29798",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29798"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-1057",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1057"
|
||||
},
|
||||
{
|
||||
"name" : "1020082",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1020082"
|
||||
},
|
||||
{
|
||||
"name" : "29798",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29798"
|
||||
},
|
||||
{
|
||||
"name": "omnipcx-cgiscript-info-disclosure(41560)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41560"
|
||||
},
|
||||
{
|
||||
"name": "28758",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28758"
|
||||
},
|
||||
{
|
||||
"name": "20080521 [DSECRG-08-020] Alcatel OmniPCX Office Remote Comand Execution",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/492383/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1020082",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020082"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2008-1836",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,21 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "MDVSA-2008:088",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:088"
|
||||
},
|
||||
{
|
||||
"name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=881",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=881"
|
||||
},
|
||||
{
|
||||
"name" : "http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2008-09-15",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-3900",
|
||||
"refsource": "FEDORA",
|
||||
@ -78,14 +73,19 @@
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200805-19.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2008:088",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:088"
|
||||
"name": "APPLE-SA-2008-09-15",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2008:024",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html"
|
||||
"name": "http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html"
|
||||
},
|
||||
{
|
||||
"name": "29891",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29891"
|
||||
},
|
||||
{
|
||||
"name": "TA08-260A",
|
||||
@ -103,34 +103,34 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2584"
|
||||
},
|
||||
{
|
||||
"name" : "29891",
|
||||
"name": "31882",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29891"
|
||||
},
|
||||
{
|
||||
"name" : "30253",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30253"
|
||||
"url": "http://secunia.com/advisories/31882"
|
||||
},
|
||||
{
|
||||
"name": "30328",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30328"
|
||||
},
|
||||
{
|
||||
"name": "clamav-rfc2231-dos(41868)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41868"
|
||||
},
|
||||
{
|
||||
"name": "30253",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30253"
|
||||
},
|
||||
{
|
||||
"name": "31576",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31576"
|
||||
},
|
||||
{
|
||||
"name" : "31882",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31882"
|
||||
},
|
||||
{
|
||||
"name" : "clamav-rfc2231-dos(41868)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41868"
|
||||
"name": "SUSE-SA:2008:024",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/495674/100/0/threaded"
|
||||
"name": "31567",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31567"
|
||||
},
|
||||
{
|
||||
"name": "30797",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30797"
|
||||
},
|
||||
{
|
||||
"name": "xinelib-openrafile-bo(44642)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44642"
|
||||
},
|
||||
{
|
||||
"name": "33544",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33544"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=619869",
|
||||
@ -67,6 +82,61 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.ocert.org/analysis/2008-008/analysis.txt"
|
||||
},
|
||||
{
|
||||
"name": "xinelib-parseblockgroup-bo(44634)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44634"
|
||||
},
|
||||
{
|
||||
"name": "4648",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4648"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2427",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2427"
|
||||
},
|
||||
{
|
||||
"name": "31827",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31827"
|
||||
},
|
||||
{
|
||||
"name": "47744",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/47744"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-7572",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2009:004",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "31502",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31502"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2382",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2382"
|
||||
},
|
||||
{
|
||||
"name": "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/495674/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2009:020",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2009-0542",
|
||||
"refsource": "FEDORA",
|
||||
@ -76,76 +146,6 @@
|
||||
"name": "FEDORA-2008-7512",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-7572",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2009:020",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2009:004",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "30797",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30797"
|
||||
},
|
||||
{
|
||||
"name" : "47744",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/47744"
|
||||
},
|
||||
{
|
||||
"name" : "31827",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31827"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2382",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2382"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2427",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2427"
|
||||
},
|
||||
{
|
||||
"name" : "31502",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31502"
|
||||
},
|
||||
{
|
||||
"name" : "31567",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31567"
|
||||
},
|
||||
{
|
||||
"name" : "33544",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33544"
|
||||
},
|
||||
{
|
||||
"name" : "4648",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4648"
|
||||
},
|
||||
{
|
||||
"name" : "xinelib-openrafile-bo(44642)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44642"
|
||||
},
|
||||
{
|
||||
"name" : "xinelib-parseblockgroup-bo(44634)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44634"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2008-5437",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html"
|
||||
},
|
||||
{
|
||||
"name" : "33177",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/33177"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-0115",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/0115"
|
||||
"name": "33525",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33525"
|
||||
},
|
||||
{
|
||||
"name": "51352",
|
||||
@ -78,9 +68,19 @@
|
||||
"url": "http://www.securitytracker.com/id?1021561"
|
||||
},
|
||||
{
|
||||
"name" : "33525",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33525"
|
||||
"name": "ADV-2009-0115",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0115"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html"
|
||||
},
|
||||
{
|
||||
"name": "33177",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33177"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2008-5445",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090115 Oracle Secure Backup's observiced.exe Denial Of Service vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/500113/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.fortiguardcenter.com/advisory/FGA-2009-02.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.fortiguardcenter.com/advisory/FGA-2009-02.html"
|
||||
},
|
||||
{
|
||||
"name": "33525",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33525"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-0115",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0115"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/33177"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-0115",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/0115"
|
||||
},
|
||||
{
|
||||
"name" : "33525",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33525"
|
||||
"name": "20090115 Oracle Secure Backup's observiced.exe Denial Of Service vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/500113/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2008-5464",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-0444",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,69 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=907218",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=907218"
|
||||
},
|
||||
{
|
||||
"name" : "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/ce04db4aba39",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/ce04db4aba39"
|
||||
},
|
||||
{
|
||||
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056"
|
||||
"name": "oval:org.mitre.oval:def:16614",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16614"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201406-32",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMU02874",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=136733161405818&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02857",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=136439120408139&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101103",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=136439120408139&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101184",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=136733161405818&w=2"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:095",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:095"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0237",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0237.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0247",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0247.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0377",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html"
|
||||
"name": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/ce04db4aba39",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/ce04db4aba39"
|
||||
},
|
||||
{
|
||||
"name": "TA13-032A",
|
||||
@ -128,14 +83,59 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/858729"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16614",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16614"
|
||||
"name": "RHSA-2013:0237",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0237.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02857",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=136439120408139&w=2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0247",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0247.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMU02874",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=907218",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=907218"
|
||||
},
|
||||
{
|
||||
"name": "SSRT101103",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=136439120408139&w=2"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0377",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:19349",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19349"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html"
|
||||
},
|
||||
{
|
||||
"name": "SSRT101184",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=136733161405818&w=2"
|
||||
},
|
||||
{
|
||||
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2013-0625",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/advisories/apsa13-01.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/advisories/apsa13-01.html"
|
||||
"name": "57164",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/57164"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb13-03.html",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb13-03.html"
|
||||
},
|
||||
{
|
||||
"name" : "57164",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/57164"
|
||||
"name": "http://www.adobe.com/support/security/advisories/apsa13-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/advisories/apsa13-01.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-3141",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS13-047",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-047"
|
||||
},
|
||||
{
|
||||
"name": "TA13-168A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-168A"
|
||||
},
|
||||
{
|
||||
"name": "MS13-047",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-047"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:15981",
|
||||
"refsource": "OVAL",
|
||||
|
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20130703 Multiple Vulnerabilities in Kasseler CMS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://seclists.org/bugtraq/2013/Jul/26"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html"
|
||||
"name": "94779",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/94779"
|
||||
},
|
||||
{
|
||||
"name": "https://www.htbridge.com/advisory/HTB23158",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.htbridge.com/advisory/HTB23158"
|
||||
},
|
||||
{
|
||||
"name": "20130703 Multiple Vulnerabilities in Kasseler CMS",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://seclists.org/bugtraq/2013/Jul/26"
|
||||
},
|
||||
{
|
||||
"name": "http://diff.kasseler-cms.net/svn.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://diff.kasseler-cms.net/svn.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://diff.kasseler-cms.net/svn/patches/1232.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://diff.kasseler-cms.net/svn/patches/1232.html"
|
||||
},
|
||||
{
|
||||
"name" : "94779",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/94779"
|
||||
},
|
||||
{
|
||||
"name": "kasselercms-cve20133727-admin-sql-injection(85407)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85407"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/122282/Kasseler-CMS-2-r1223-CSRF-XSS-SQL-Injection.html"
|
||||
},
|
||||
{
|
||||
"name": "http://diff.kasseler-cms.net/svn/patches/1232.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://diff.kasseler-cms.net/svn/patches/1232.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-4557",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,15 +53,30 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20131110 Re: CVE Request: multiple vulnerabilities in spip",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/11/10/4"
|
||||
"name": "DSA-2794",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2013/dsa-2794"
|
||||
},
|
||||
{
|
||||
"name": "http://www.spip.net/fr_article5646.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.spip.net/fr_article5646.html"
|
||||
},
|
||||
{
|
||||
"name": "1029317",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029317"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20131110 Re: CVE Request: multiple vulnerabilities in spip",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/11/10/4"
|
||||
},
|
||||
{
|
||||
"name": "55551",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/55551"
|
||||
},
|
||||
{
|
||||
"name": "http://www.spip.net/fr_article5648.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,21 +86,6 @@
|
||||
"name": "http://zone.spip.org/trac/spip-zone/changeset/75105/_core_/securite/ecran_securite.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://zone.spip.org/trac/spip-zone/changeset/75105/_core_/securite/ecran_securite.php"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2794",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2013/dsa-2794"
|
||||
},
|
||||
{
|
||||
"name" : "1029317",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1029317"
|
||||
},
|
||||
{
|
||||
"name" : "55551",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/55551"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2013-4822",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-6382",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,51 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20131122 Linux kernel CVE fixes",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/11/22/5"
|
||||
},
|
||||
{
|
||||
"name" : "[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.spinics.net/lists/xfs/msg23343.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1033603",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1033603"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2113-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2113-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2117-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2117-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2109-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2109-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2110-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2110-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2128-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2128-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2129-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2129-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2135-1",
|
||||
"refsource": "UBUNTU",
|
||||
@ -108,24 +63,69 @@
|
||||
"url": "http://www.ubuntu.com/usn/USN-2138-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2139-1",
|
||||
"name": "USN-2113-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2139-1"
|
||||
"url": "http://www.ubuntu.com/usn/USN-2113-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2141-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2141-1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20131122 Linux kernel CVE fixes",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/11/22/5"
|
||||
},
|
||||
{
|
||||
"name": "USN-2110-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2110-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2129-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2129-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2128-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2128-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2139-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2139-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2158-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2158-1"
|
||||
},
|
||||
{
|
||||
"name": "USN-2117-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2117-1"
|
||||
},
|
||||
{
|
||||
"name": "63889",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/63889"
|
||||
},
|
||||
{
|
||||
"name": "USN-2109-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2109-1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1033603",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033603"
|
||||
},
|
||||
{
|
||||
"name": "[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.spinics.net/lists/xfs/msg23343.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://src.chromium.org/viewvc/chrome?revision=237115&view=revision",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://src.chromium.org/viewvc/chrome?revision=237115&view=revision"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:0243",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,20 +72,10 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=321940"
|
||||
},
|
||||
{
|
||||
"name" : "https://src.chromium.org/viewvc/chrome?revision=237115&view=revision",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://src.chromium.org/viewvc/chrome?revision=237115&view=revision"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2862",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2862"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0243",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,6 +53,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1039598",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039598"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,11 +67,6 @@
|
||||
"name": "101479",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101479"
|
||||
},
|
||||
{
|
||||
"name" : "1039598",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039598"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-wms1"
|
||||
},
|
||||
{
|
||||
"name" : "101489",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/101489"
|
||||
},
|
||||
{
|
||||
"name": "1039617",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039617"
|
||||
},
|
||||
{
|
||||
"name": "101489",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101489"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1039828",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039828"
|
||||
},
|
||||
{
|
||||
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-wsa",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "101932",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101932"
|
||||
},
|
||||
{
|
||||
"name" : "1039828",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039828"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.tcpdump.org/tcpdump-changes.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.tcpdump.org/tcpdump-changes.txt"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/the-tcpdump-group/tcpdump/commit/6fca58f5f9c96749a575f52e20598ad43f5bdf30",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/the-tcpdump-group/tcpdump/commit/6fca58f5f9c96749a575f52e20598ad43f5bdf30"
|
||||
"name": "GLSA-201709-23",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201709-23"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208221",
|
||||
@ -73,19 +68,24 @@
|
||||
"url": "http://www.debian.org/security/2017/dsa-3971"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201709-23",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201709-23"
|
||||
"name": "1039307",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039307"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/the-tcpdump-group/tcpdump/commit/6fca58f5f9c96749a575f52e20598ad43f5bdf30",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/the-tcpdump-group/tcpdump/commit/6fca58f5f9c96749a575f52e20598ad43f5bdf30"
|
||||
},
|
||||
{
|
||||
"name": "http://www.tcpdump.org/tcpdump-changes.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.tcpdump.org/tcpdump-changes.txt"
|
||||
},
|
||||
{
|
||||
"name": "RHEA-2018:0705",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHEA-2018:0705"
|
||||
},
|
||||
{
|
||||
"name" : "1039307",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039307"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"DATE_PUBLIC": "2018-01-02T00:00:00",
|
||||
"ID": "CVE-2017-13225",
|
||||
"STATE": "PUBLIC"
|
||||
@ -58,15 +58,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2018-01-01"
|
||||
},
|
||||
{
|
||||
"name" : "102420",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/102420"
|
||||
},
|
||||
{
|
||||
"name": "1040106",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040106"
|
||||
},
|
||||
{
|
||||
"name": "102420",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102420"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732"
|
||||
},
|
||||
{
|
||||
"name": "https://patchwork.kernel.org/patch/9919053/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://patchwork.kernel.org/patch/9919053/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732"
|
||||
},
|
||||
{
|
||||
"name": "100502",
|
||||
"refsource": "BID",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-17008",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-17009",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-17214",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,31 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20171223 [SECURITY] [DLA 1219-1] enigmail security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html"
|
||||
},
|
||||
{
|
||||
"name": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "https://enigmail.net/download/other/Enigmail%20Pentest%20Report%20by%20Cure53%20-%20Excerpt.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "https://lists.debian.org/debian-security-announce/2017/msg00333.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://lists.debian.org/debian-security-announce/2017/msg00333.html"
|
||||
},
|
||||
{
|
||||
"name": "https://sourceforge.net/p/enigmail/bugs/709/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://sourceforge.net/p/enigmail/bugs/709/"
|
||||
},
|
||||
{
|
||||
"name": "https://lists.debian.org/debian-security-announce/2017/msg00333.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://lists.debian.org/debian-security-announce/2017/msg00333.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mail-archive.com/enigmail-users@enigmail.net/msg04280.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.mail-archive.com/enigmail-users@enigmail.net/msg04280.html"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20171223 [SECURITY] [DLA 1219-1] enigmail security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00021.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4070",
|
||||
"refsource": "DEBIAN",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.hyuki.com/yukiwiki/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.hyuki.com/yukiwiki/"
|
||||
},
|
||||
{
|
||||
"name": "JVN#36343375",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN36343375/index.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.hyuki.com/yukiwiki/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.hyuki.com/yukiwiki/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,30 +53,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1041520",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041520"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20181119 [SECURITY] [DLA 1580-1] systemd security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1534701",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1534701"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:0260",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:0260"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1534701",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534701"
|
||||
},
|
||||
{
|
||||
"name": "USN-3558-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3558-1/"
|
||||
},
|
||||
{
|
||||
"name" : "1041520",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041520"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,30 +91,30 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1447080"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2018-13/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2018-13/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2018-11/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2018-11/"
|
||||
},
|
||||
{
|
||||
"name": "1040896",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040896"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2018-12/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2018-12/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2018-13/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2018-13/"
|
||||
},
|
||||
{
|
||||
"name": "104136",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104136"
|
||||
},
|
||||
{
|
||||
"name" : "1040896",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040896"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user