mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
1c25d779f6
commit
e869493a9f
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20010813 Local exploit for TrollFTPD-1.26",
|
"name": "3174",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/203874"
|
"url": "http://www.securityfocus.com/bid/3174"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ftp://ftp.trolltech.com/freebies/ftpd/troll-ftpd-1.27.tar.gz",
|
"name": "ftp://ftp.trolltech.com/freebies/ftpd/troll-ftpd-1.27.tar.gz",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "ftp://ftp.trolltech.com/freebies/ftpd/troll-ftpd-1.27.tar.gz"
|
"url": "ftp://ftp.trolltech.com/freebies/ftpd/troll-ftpd-1.27.tar.gz"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20010813 Local exploit for TrollFTPD-1.26",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/203874"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "trollftpd-long-path-bo(6974)",
|
"name": "trollftpd-long-path-bo(6974)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6974"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6974"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "3174",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/3174"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,59 +53,59 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060425 Invision Vulnerabilities, including remote code execution",
|
"name": "17695",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/431990/100/0/threaded"
|
"url": "http://www.securityfocus.com/bid/17695"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "20060427 Re: Invision Vulnerabilities, including remote code execution",
|
"name": "20060427 Re: Invision Vulnerabilities, including remote code execution",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/432226/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/432226/100/0/threaded"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "invision-search-file-include(26070)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26070"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20060427 Invision Power Board 2.1.5 POC",
|
"name": "20060427 Invision Power Board 2.1.5 POC",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/432451/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/432451/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20060710 Re: RE: Invision Vulnerabilities, including remote code execution",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/439607/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://forums.invisionpower.com/index.php?showtopic=213374",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://forums.invisionpower.com/index.php?showtopic=213374"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17695",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/17695"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-1534",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/1534"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "25005",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/25005"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "19830",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/19830"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "796",
|
"name": "796",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/796"
|
"url": "http://securityreason.com/securityalert/796"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "invision-search-file-include(26070)",
|
"name": "19830",
|
||||||
"refsource" : "XF",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26070"
|
"url": "http://secunia.com/advisories/19830"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-1534",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/1534"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060425 Invision Vulnerabilities, including remote code execution",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/431990/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060710 Re: RE: Invision Vulnerabilities, including remote code execution",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/439607/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "25005",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/25005"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://forums.invisionpower.com/index.php?showtopic=213374",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://forums.invisionpower.com/index.php?showtopic=213374"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://evuln.com/vulns/128/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://evuln.com/vulns/128/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "17758",
|
"name": "17758",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/17758"
|
"url": "http://www.securityfocus.com/bid/17758"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "rupertsnewsscript-login-sql-injection(26144)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26144"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-1580",
|
"name": "ADV-2006-1580",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://secunia.com/advisories/19895"
|
"url": "http://secunia.com/advisories/19895"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "rupertsnewsscript-login-sql-injection(26144)",
|
"name": "http://evuln.com/vulns/128/",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26144"
|
"url": "http://evuln.com/vulns/128/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20060506 VisionSource CMS <= 0.6 XSS vectors",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/433129/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "17867",
|
"name": "17867",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/17867"
|
"url": "http://www.securityfocus.com/bid/17867"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20060506 VisionSource CMS <= 0.6 XSS vectors",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/433129/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "881",
|
"name": "881",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20060521 PHP Easy Galerie Index.PHP Remote File Include Vulnerability",
|
"name": "20245",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/434695/100/0/threaded"
|
"url": "http://secunia.com/advisories/20245"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18060",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/18060"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2006-1932",
|
"name": "ADV-2006-1932",
|
||||||
@ -68,9 +63,9 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2006/1932"
|
"url": "http://www.vupen.com/english/advisories/2006/1932"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "20245",
|
"name": "phpeasygalerie-index-file-include(26602)",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "XF",
|
||||||
"url" : "http://secunia.com/advisories/20245"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26602"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "936",
|
"name": "936",
|
||||||
@ -78,9 +73,14 @@
|
|||||||
"url": "http://securityreason.com/securityalert/936"
|
"url": "http://securityreason.com/securityalert/936"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "phpeasygalerie-index-file-include(26602)",
|
"name": "18060",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26602"
|
"url": "http://www.securityfocus.com/bid/18060"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060521 PHP Easy Galerie Index.PHP Remote File Include Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/434695/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,16 +57,6 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/434692/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/434692/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "ADV-2006-1933",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/1933"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20248",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/20248"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "937",
|
"name": "937",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
@ -76,6 +66,16 @@
|
|||||||
"name": "destineyls-index-path-disclosure(26611)",
|
"name": "destineyls-index-path-disclosure(26611)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26611"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26611"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20248",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/20248"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-1933",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/1933"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2006-3464",
|
"ID": "CVE-2006-3464",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,141 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://issues.rpath.com/browse/RPL-558",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://issues.rpath.com/browse/RPL-558"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-166.htm",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-166.htm"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1137",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2006/dsa-1137"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200608-07",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200608-07.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2006:136",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:136"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2006:137",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:137"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2006:0603",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0603.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2006:0648",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0648.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20060801-01-P",
|
"name": "20060801-01-P",
|
||||||
"refsource": "SGI",
|
"refsource": "SGI",
|
||||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P"
|
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20060901-01-P",
|
|
||||||
"refsource" : "SGI",
|
|
||||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSA:2006-230-01",
|
|
||||||
"refsource" : "SLACKWARE",
|
|
||||||
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.536600"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "103160",
|
|
||||||
"refsource" : "SUNALERT",
|
|
||||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103160-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "201331",
|
|
||||||
"refsource" : "SUNALERT",
|
|
||||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201331-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SA:2006:044",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2006_44_libtiff.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "2006-0044",
|
|
||||||
"refsource" : "TRUSTIX",
|
|
||||||
"url" : "http://lwn.net/Alerts/194228/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-330-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/usn-330-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "19286",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/19286"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:10916",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10916"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-3105",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/3105"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2007-4034",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2007/4034"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1016628",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1016628"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21370",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21370"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21274",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21274"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21290",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21290"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21334",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21334"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21392",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21392"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "21501",
|
"name": "21501",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/21501"
|
"url": "http://secunia.com/advisories/21501"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2006:136",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:136"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "21537",
|
"name": "21537",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -198,24 +78,9 @@
|
|||||||
"url": "http://secunia.com/advisories/21632"
|
"url": "http://secunia.com/advisories/21632"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "21598",
|
"name": "GLSA-200608-07",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://secunia.com/advisories/21598"
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-07.xml"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "22036",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/22036"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21304",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21304"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21319",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/21319"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "21338",
|
"name": "21338",
|
||||||
@ -223,14 +88,149 @@
|
|||||||
"url": "http://secunia.com/advisories/21338"
|
"url": "http://secunia.com/advisories/21338"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "21346",
|
"name": "USN-330-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/usn-330-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-166.htm",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-166.htm"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1016628",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1016628"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1137",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2006/dsa-1137"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21370",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/21346"
|
"url": "http://secunia.com/advisories/21370"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21598",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21598"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2006:0648",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2006-0648.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2006:137",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:137"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2007-4034",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2007/4034"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SA:2006:044",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/2006_44_libtiff.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21290",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21290"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21274",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21274"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-3105",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/3105"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2006:0603",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2006-0603.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060901-01-P",
|
||||||
|
"refsource": "SGI",
|
||||||
|
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21304",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21304"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSA:2006-230-01",
|
||||||
|
"refsource": "SLACKWARE",
|
||||||
|
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.536600"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://issues.rpath.com/browse/RPL-558",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://issues.rpath.com/browse/RPL-558"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "27832",
|
"name": "27832",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/27832"
|
"url": "http://secunia.com/advisories/27832"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21346",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21346"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "201331",
|
||||||
|
"refsource": "SUNALERT",
|
||||||
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201331-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "19286",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/19286"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21319",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21319"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21392",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21392"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21334",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/21334"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:10916",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10916"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "22036",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/22036"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "2006-0044",
|
||||||
|
"refsource": "TRUSTIX",
|
||||||
|
"url": "http://lwn.net/Alerts/194228/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "103160",
|
||||||
|
"refsource": "SUNALERT",
|
||||||
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103160-1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,25 +57,25 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/440417/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/440417/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "19016",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/19016"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "21085",
|
"name": "21085",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/21085"
|
"url": "http://secunia.com/advisories/21085"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1273",
|
"name": "19016",
|
||||||
"refsource" : "SREASON",
|
"refsource": "BID",
|
||||||
"url" : "http://securityreason.com/securityalert/1273"
|
"url": "http://www.securityfocus.com/bid/19016"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "zoho-html-xss(27818)",
|
"name": "zoho-html-xss(27818)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27818"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27818"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1273",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/1273"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,40 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20061117 20/20 auto gallery [ multiples injection sql ]",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/451947/100/100/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://s-a-p.ca/index.php?page=OurAdvisories&id=38",
|
"name": "http://s-a-p.ca/index.php?page=OurAdvisories&id=38",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=38"
|
"url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=38"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "21154",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/21154"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-4601",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/4601"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "22974",
|
"name": "22974",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/22974"
|
"url": "http://secunia.com/advisories/22974"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1916",
|
"name": "20061117 20/20 auto gallery [ multiples injection sql ]",
|
||||||
"refsource" : "SREASON",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://securityreason.com/securityalert/1916"
|
"url": "http://www.securityfocus.com/archive/1/451947/100/100/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2006-4601",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2006/4601"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "2020autogallery-vehicle-sql-injection(30400)",
|
"name": "2020autogallery-vehicle-sql-injection(30400)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30400"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30400"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1916",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/1916"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21154",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/21154"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://futomi.com/library/info/20061012.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://futomi.com/library/info/20061012.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "20506",
|
"name": "20506",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -67,6 +62,11 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/22351"
|
"url": "http://secunia.com/advisories/22351"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://futomi.com/library/info/20061012.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://futomi.com/library/info/20061012.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "kmail-cgi-authentication-bypass(29513)",
|
"name": "kmail-cgi-authentication-bypass(29513)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2011-0153",
|
"ID": "CVE-2011-0153",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT4554",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT4554"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://support.apple.com/kb/HT4564",
|
"name": "http://support.apple.com/kb/HT4564",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -77,6 +72,11 @@
|
|||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
|
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT4554",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT4554"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2011-03-09-2",
|
"name": "APPLE-SA-2011-03-09-2",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||||
"ID": "CVE-2011-0459",
|
"ID": "CVE-2011-0459",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "JVN#11424086",
|
|
||||||
"refsource" : "JVN",
|
|
||||||
"url" : "http://jvn.jp/en/jp/JVN11424086/index.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "JVNDB-2011-000023",
|
"name": "JVNDB-2011-000023",
|
||||||
"refsource": "JVNDB",
|
"refsource": "JVNDB",
|
||||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000023"
|
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000023"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "44058",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/44058"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "47271",
|
"name": "47271",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/47271"
|
"url": "http://www.securityfocus.com/bid/47271"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "44058",
|
"name": "JVN#11424086",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "JVN",
|
||||||
"url" : "http://secunia.com/advisories/44058"
|
"url": "http://jvn.jp/en/jp/JVN11424086/index.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2011-0787",
|
"ID": "CVE-2011-0787",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2011-2792",
|
"ID": "CVE-2011-2792",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=87148",
|
"name": "http://support.apple.com/kb/HT4981",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=87148"
|
"url": "http://support.apple.com/kb/HT4981"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "google-chrome-float-removal-ce(68954)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68954"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html",
|
"name": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html",
|
||||||
@ -63,19 +68,9 @@
|
|||||||
"url": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html"
|
"url": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://support.apple.com/kb/HT4981",
|
"name": "APPLE-SA-2011-10-12-1",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "APPLE",
|
||||||
"url" : "http://support.apple.com/kb/HT4981"
|
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT4999",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT4999"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT5000",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT5000"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2011-10-11-1",
|
"name": "APPLE-SA-2011-10-11-1",
|
||||||
@ -83,9 +78,9 @@
|
|||||||
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html"
|
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2011-10-12-1",
|
"name": "http://code.google.com/p/chromium/issues/detail?id=87148",
|
||||||
"refsource" : "APPLE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
|
"url": "http://code.google.com/p/chromium/issues/detail?id=87148"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2011-10-12-4",
|
"name": "APPLE-SA-2011-10-12-4",
|
||||||
@ -93,9 +88,9 @@
|
|||||||
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00004.html"
|
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00004.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "74242",
|
"name": "http://support.apple.com/kb/HT4999",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://osvdb.org/74242"
|
"url": "http://support.apple.com/kb/HT4999"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:14511",
|
"name": "oval:org.mitre.oval:def:14511",
|
||||||
@ -103,9 +98,14 @@
|
|||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14511"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14511"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "google-chrome-float-removal-ce(68954)",
|
"name": "74242",
|
||||||
"refsource" : "XF",
|
"refsource": "OSVDB",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68954"
|
"url": "http://osvdb.org/74242"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT5000",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT5000"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,39 +53,39 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.ibm.com/software/lotus/symphony/buzz.nsf/web_DisPlayPlugin?open&unid=9717F6F587AAA939852578D300404BCF&category=announcements",
|
"name": "48936",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "http://www.ibm.com/software/lotus/symphony/buzz.nsf/web_DisPlayPlugin?open&unid=9717F6F587AAA939852578D300404BCF&category=announcements"
|
"url": "http://www.securityfocus.com/bid/48936"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.ibm.com/software/lotus/symphony/idcontents/releasenotes/en/readme_fixpack3_standalone_long.htm",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.ibm.com/software/lotus/symphony/idcontents/releasenotes/en/readme_fixpack3_standalone_long.htm"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg21505448",
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg21505448",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg21505448"
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg21505448"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.ibm.com/software/lotus/symphony/buzz.nsf/web_DisPlayPlugin?open&unid=9717F6F587AAA939852578D300404BCF&category=announcements",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.ibm.com/software/lotus/symphony/buzz.nsf/web_DisPlayPlugin?open&unid=9717F6F587AAA939852578D300404BCF&category=announcements"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://www-304.ibm.com/jct03001c/software/lotus/symphony/idcontents/releasenotes/en/readme_embedded_in_fixpack3_long.htm",
|
"name": "https://www-304.ibm.com/jct03001c/software/lotus/symphony/idcontents/releasenotes/en/readme_embedded_in_fixpack3_long.htm",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://www-304.ibm.com/jct03001c/software/lotus/symphony/idcontents/releasenotes/en/readme_embedded_in_fixpack3_long.htm"
|
"url": "https://www-304.ibm.com/jct03001c/software/lotus/symphony/idcontents/releasenotes/en/readme_embedded_in_fixpack3_long.htm"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "48936",
|
"name": "http://www.ibm.com/software/lotus/symphony/idcontents/releasenotes/en/readme_fixpack3_standalone_long.htm",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/48936"
|
"url": "http://www.ibm.com/software/lotus/symphony/idcontents/releasenotes/en/readme_fixpack3_standalone_long.htm"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "74159",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/74159"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "lotus-symphony-doc-dos(68891)",
|
"name": "lotus-symphony-doc-dos(68891)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68891"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68891"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "74159",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/74159"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2011-3116",
|
"ID": "CVE-2011-3116",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2011-3276",
|
"ID": "CVE-2011-3276",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHP-Point-Of-Sale-10.7",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHP-Point-Of-Sale-10.7"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
|
"name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
|
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
|
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHP-Point-Of-Sale-10.7",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHP-Point-Of-Sale-10.7"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2011-4508",
|
"ID": "CVE-2011-4508",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf",
|
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf"
|
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "47090",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/47090"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://lcamtuf.coredump.cx/cachetime/",
|
"name": "http://lcamtuf.coredump.cx/cachetime/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "oval:org.mitre.oval:def:13770",
|
"name": "oval:org.mitre.oval:def:13770",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13770"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13770"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "47090",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/47090"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2011-4991",
|
"ID": "CVE-2011-4991",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2013-1181",
|
"ID": "CVE-2013-1181",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@adobe.com",
|
||||||
"ID": "CVE-2013-1365",
|
"ID": "CVE-2013-1365",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,20 +53,15 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb13-05.html",
|
"name": "SUSE-SU-2013:0296",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SUSE",
|
||||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb13-05.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:0254",
|
"name": "RHSA-2013:0254",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0254.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-0254.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2013:0296",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:0295",
|
"name": "openSUSE-SU-2013:0295",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
@ -81,6 +76,11 @@
|
|||||||
"name": "TA13-043A",
|
"name": "TA13-043A",
|
||||||
"refsource": "CERT",
|
"refsource": "CERT",
|
||||||
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.adobe.com/support/security/bulletins/apsb13-05.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.adobe.com/support/security/bulletins/apsb13-05.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-1813",
|
"ID": "CVE-2013-1813",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,29 +53,29 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[busybox] 20130722 1.21.0 is released",
|
"name": "https://support.t-mobile.com/docs/DOC-21994",
|
||||||
"refsource" : "MLIST",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.busybox.net/pipermail/busybox/2013-January/078864.html"
|
"url": "https://support.t-mobile.com/docs/DOC-21994"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701965",
|
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701965",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701965"
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701965"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://git.busybox.net/busybox/commit/?id=4609f477c7e043a4f6147dfe6e86b775da2ef784",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.busybox.net/busybox/commit/?id=4609f477c7e043a4f6147dfe6e86b775da2ef784"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.t-mobile.com/docs/DOC-21994",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.t-mobile.com/docs/DOC-21994"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2013:1732",
|
"name": "RHSA-2013:1732",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1732.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1732.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[busybox] 20130722 1.21.0 is released",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://lists.busybox.net/pipermail/busybox/2013-January/078864.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.busybox.net/busybox/commit/?id=4609f477c7e043a4f6147dfe6e86b775da2ef784",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.busybox.net/busybox/commit/?id=4609f477c7e043a4f6147dfe6e86b775da2ef784"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-5378",
|
"ID": "CVE-2013-5378",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM95802"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM95802"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "PM95881",
|
"name": "was-portal-cve20135378-xss(86929)",
|
||||||
"refsource" : "AIXAPAR",
|
"refsource": "XF",
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PM95881"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86929"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "PM97593",
|
"name": "PM97593",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM97593"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM97593"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "was-portal-cve20135378-xss(86929)",
|
"name": "PM95881",
|
||||||
"refsource" : "XF",
|
"refsource": "AIXAPAR",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/86929"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM95881"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-5447",
|
"ID": "CVE-2013-5447",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "LO78184",
|
||||||
|
"refsource": "AIXAPAR",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LO78184"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "30789",
|
"name": "30789",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/30789"
|
"url": "http://www.exploit-db.com/exploits/30789"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/124658",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/124658"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-13-274/",
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-13-274/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-13-274/"
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-13-274/"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "forms-viewer-cve20135447-bo(87911)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87911"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21657500",
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21657500",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21657500"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21657500"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "LO78184",
|
"name": "http://packetstormsecurity.com/files/124658",
|
||||||
"refsource" : "AIXAPAR",
|
"refsource": "MISC",
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1LO78184"
|
"url": "http://packetstormsecurity.com/files/124658"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "forms-viewer-cve20135447-bo(87911)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/87911"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2013-5524",
|
"ID": "CVE-2013-5524",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,26 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31159",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31159"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20131007 Cisco Identity Services Engine Troubleshooting Interface Cross-Site Scripting Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5524"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "62870",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/62870"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "98166",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/98166"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1029155",
|
"name": "1029155",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
@ -82,10 +62,30 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/55067"
|
"url": "http://secunia.com/advisories/55067"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31159",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31159"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "cisco-ise-cve20135524-xss(87722)",
|
"name": "cisco-ise-cve20135524-xss(87722)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87722"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87722"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20131007 Cisco Identity Services Engine Troubleshooting Interface Cross-Site Scripting Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5524"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "98166",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/98166"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "62870",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/62870"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,50 +57,50 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-10/0048.html"
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-10/0048.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20131014 Wordpress Cart66 Plugin 1.5.1.14 Multiple Vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://seclists.org/bugtraq/2013/Oct/52"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "28959",
|
"name": "28959",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/28959"
|
"url": "http://www.exploit-db.com/exploits/28959"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://blog.noobroot.com/#!/2013/10/0-day-wordpress-cart66-plugin-15114.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://blog.noobroot.com/#!/2013/10/0-day-wordpress-cart66-plugin-15114.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/123587/WordPress-Cart66-1.5.1.14-Cross-Site-Request-Forgery-Cross-Site-Scripting.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/123587/WordPress-Cart66-1.5.1.14-Cross-Site-Request-Forgery-Cross-Site-Scripting.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://wordpress.org/plugins/cart66-lite/changelog/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://wordpress.org/plugins/cart66-lite/changelog/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "62975",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/62975"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "98352",
|
"name": "98352",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/98352"
|
"url": "http://osvdb.org/98352"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "55265",
|
"name": "20131014 Wordpress Cart66 Plugin 1.5.1.14 Multiple Vulnerabilities",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://secunia.com/advisories/55265"
|
"url": "http://seclists.org/bugtraq/2013/Oct/52"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "wp-cart66-cve20135977-admin-csrf(87874)",
|
"name": "wp-cart66-cve20135977-admin-csrf(87874)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87874"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87874"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "55265",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/55265"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://wordpress.org/plugins/cart66-lite/changelog/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://wordpress.org/plugins/cart66-lite/changelog/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://blog.noobroot.com/#!/2013/10/0-day-wordpress-cart66-plugin-15114.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://blog.noobroot.com/#!/2013/10/0-day-wordpress-cart66-plugin-15114.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "62975",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/62975"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/123587/WordPress-Cart66-1.5.1.14-Cross-Site-Request-Forgery-Cross-Site-Scripting.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/123587/WordPress-Cart66-1.5.1.14-Cross-Site-Request-Forgery-Cross-Site-Scripting.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@debian.org",
|
||||||
"ID": "CVE-2014-2270",
|
"ID": "CVE-2014-2270",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20140303 CVE Request: file: crashes when checking softmagic for some corrupt PE executables",
|
"name": "USN-2163-1",
|
||||||
"refsource" : "MLIST",
|
"refsource": "UBUNTU",
|
||||||
"url" : "http://seclists.org/oss-sec/2014/q1/473"
|
"url": "http://www.ubuntu.com/usn/USN-2163-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables",
|
"name": "[oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables",
|
||||||
@ -63,69 +63,69 @@
|
|||||||
"url": "http://seclists.org/oss-sec/2014/q1/504"
|
"url": "http://seclists.org/oss-sec/2014/q1/504"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables",
|
"name": "USN-2162-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2162-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140303 CVE Request: file: crashes when checking softmagic for some corrupt PE executables",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url" : "http://seclists.org/oss-sec/2014/q1/505"
|
"url": "http://seclists.org/oss-sec/2014/q1/473"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://bugs.gw.com/view.php?id=313",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://bugs.gw.com/view.php?id=313"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.php.net/ChangeLog-5.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.php.net/ChangeLog-5.php"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT6443",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT6443"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2873",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-2873"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201503-08",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201503-08"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2014:1765",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2014:0364",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-03/msg00034.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2014:0367",
|
"name": "openSUSE-SU-2014:0367",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00037.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00037.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://bugs.gw.com/view.php?id=313",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://bugs.gw.com/view.php?id=313"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20140305 Re: CVE Request: file: crashes when checking softmagic for some corrupt PE executables",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://seclists.org/oss-sec/2014/q1/505"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.php.net/ChangeLog-5.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.php.net/ChangeLog-5.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2014:0364",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00034.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT6443",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT6443"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/file/file/commit/447558595a3650db2886cd2f416ad0beba965801"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2014:1765",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201503-08",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201503-08"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2014:0435",
|
"name": "openSUSE-SU-2014:0435",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00084.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00084.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-2162-1",
|
"name": "DSA-2873",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2162-1"
|
"url": "http://www.debian.org/security/2014/dsa-2873"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-2163-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2163-1"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2014-2494",
|
"ID": "CVE-2014-2494",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,35 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-2985",
|
"name": "1030578",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://www.debian.org/security/2014/dsa-2985"
|
"url": "http://www.securitytracker.com/id/1030578"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2014:1072",
|
"name": "SUSE-SU-2014:1072",
|
||||||
@ -93,14 +78,29 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1030578",
|
"name": "DSA-2985",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "DEBIAN",
|
||||||
"url" : "http://www.securitytracker.com/id/1030578"
|
"url": "http://www.debian.org/security/2014/dsa-2985"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
|
||||||
|
"refsource": "FULLDISC",
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "60425",
|
"name": "60425",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/60425"
|
"url": "http://secunia.com/advisories/60425"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "hp-security-alert@hp.com",
|
||||||
"ID": "CVE-2014-2644",
|
"ID": "CVE-2014-2644",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,12 +53,17 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "HPSBMU03118",
|
"name": "SSRT101715",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04468121"
|
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04468121"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SSRT101715",
|
"name": "1030970",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1030970"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBMU03118",
|
||||||
"refsource": "HP",
|
"refsource": "HP",
|
||||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04468121"
|
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04468121"
|
||||||
},
|
},
|
||||||
@ -66,11 +71,6 @@
|
|||||||
"name": "70223",
|
"name": "70223",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/70223"
|
"url": "http://www.securityfocus.com/bid/70223"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1030970",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1030970"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20140416 SQL Injection in mAdserve",
|
"name": "madserve-cve20142654-sql-injection(92545)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/531848/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92545"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.htbridge.com/advisory/HTB23209",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.htbridge.com/advisory/HTB23209"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "66661",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/66661"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "58003",
|
"name": "58003",
|
||||||
@ -73,9 +63,19 @@
|
|||||||
"url": "http://secunia.com/advisories/58003"
|
"url": "http://secunia.com/advisories/58003"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "madserve-cve20142654-sql-injection(92545)",
|
"name": "20140416 SQL Injection in mAdserve",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/92545"
|
"url": "http://www.securityfocus.com/archive/1/531848/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "66661",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/66661"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.htbridge.com/advisory/HTB23209",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.htbridge.com/advisory/HTB23209"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2014-6144",
|
"ID": "CVE-2014-6144",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10667",
|
"name": "1031547",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10667"
|
"url": "http://www.securitytracker.com/id/1031547"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "72077",
|
"name": "72077",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/72077"
|
"url": "http://www.securityfocus.com/bid/72077"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1031547",
|
"name": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10667",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1031547"
|
"url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10667"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2014-6798",
|
"ID": "CVE-2014-6798",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
"name": "VU#762897",
|
||||||
"refsource" : "MISC",
|
"refsource": "CERT-VN",
|
||||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
"url": "http://www.kb.cert.org/vuls/id/762897"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#582497",
|
"name": "VU#582497",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#762897",
|
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/762897"
|
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0255",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0255"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "98107",
|
"name": "98107",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/98107"
|
"url": "http://www.securityfocus.com/bid/98107"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0255",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0255"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"DATE_PUBLIC": "2017-07-05T00:00:00",
|
"DATE_PUBLIC": "2017-07-05T00:00:00",
|
||||||
"ID": "CVE-2017-0689",
|
"ID": "CVE-2017-0689",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2017-05-06T20:43:28.291774",
|
"DATE_ASSIGNED": "2017-05-06T20:43:28.291774",
|
||||||
"ID": "CVE-2017-1000043",
|
"ID": "CVE-2017-1000043",
|
||||||
"REQUESTER": "ulsh@mapbox.com",
|
"REQUESTER": "ulsh@mapbox.com",
|
||||||
@ -13,18 +13,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "mapbox.js",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "v2.2.3 and earlier; v1.6.4 and earlier"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "Mapbox"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -46,7 +46,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "Cross Site Scripting (XSS)"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -54,15 +54,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://hackerone.com/reports/99245",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://hackerone.com/reports/99245"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://nodesecurity.io/advisories/74",
|
"name": "https://nodesecurity.io/advisories/74",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://nodesecurity.io/advisories/74"
|
"url": "https://nodesecurity.io/advisories/74"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://hackerone.com/reports/99245",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://hackerone.com/reports/99245"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-1000165",
|
"ID": "CVE-2017-1000165",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2017-12-29",
|
"DATE_ASSIGNED": "2017-12-29",
|
||||||
"ID": "CVE-2017-1000498",
|
"ID": "CVE-2017-1000498",
|
||||||
"REQUESTER": "sajeeb.lohani@bulletproof.sh",
|
"REQUESTER": "sajeeb.lohani@bulletproof.sh",
|
||||||
@ -13,18 +13,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "AndroidSVG",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "1.2.2"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "AndroidSVG"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -46,7 +46,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "XML External Entity (XXE)"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -78,15 +78,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/124629",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/124629"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006052",
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006052",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22006052"
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg22006052"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/124629",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/124629"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4109",
|
"ID": "CVE-2017-4109",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4351",
|
"ID": "CVE-2017-4351",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4662",
|
"ID": "CVE-2017-4662",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-4877",
|
"ID": "CVE-2017-4877",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user