mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
0d9be55c8f
commit
f6506835b4
@ -53,49 +53,49 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20041027 PHP4 cURL functions bypass open_basedir",
|
"name": "php-openbasedir-restriction-bypass(17900)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=109898213806099&w=2"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17900"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FLSA:2344",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://bugzilla.fedora.us/show_bug.cgi?id=2344"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2005:405",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-405.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2005:406",
|
"name": "RHSA-2005:406",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-406.html"
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-406.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "20050120 [USN-66-1] PHP vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=110625060220934&w=2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "11557",
|
"name": "11557",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/11557"
|
"url": "http://www.securityfocus.com/bid/11557"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20050120 [USN-66-1] PHP vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=110625060220934&w=2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:9279",
|
"name": "oval:org.mitre.oval:def:9279",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9279"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9279"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "FLSA:2344",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://bugzilla.fedora.us/show_bug.cgi?id=2344"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1011984",
|
"name": "1011984",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1011984"
|
"url": "http://securitytracker.com/id?1011984"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "php-openbasedir-restriction-bypass(17900)",
|
"name": "20041027 PHP4 cURL functions bypass open_basedir",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17900"
|
"url": "http://marc.info/?l=bugtraq&m=109898213806099&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2005:405",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-405.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,40 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20040315 Phorum 5.0.3 Beta && Earlier XSS Issues",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=107939479713136&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://phorum.org/changelog.txt",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://phorum.org/changelog.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "9882",
|
"name": "9882",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/9882"
|
"url": "http://www.securityfocus.com/bid/9882"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "4333",
|
"name": "20040315 Phorum 5.0.3 Beta && Earlier XSS Issues",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://www.osvdb.org/4333"
|
"url": "http://marc.info/?l=bugtraq&m=107939479713136&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "4334",
|
"name": "4334",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/4334"
|
"url": "http://www.osvdb.org/4334"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://phorum.org/changelog.txt",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://phorum.org/changelog.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "4335",
|
"name": "4335",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/4335"
|
"url": "http://www.osvdb.org/4335"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1009433",
|
"name": "phorum-register-xss(15494)",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "XF",
|
||||||
"url" : "http://securitytracker.com/id?1009433"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15494"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "11157",
|
"name": "11157",
|
||||||
@ -93,9 +88,14 @@
|
|||||||
"url": "http://secunia.com/advisories/11157"
|
"url": "http://secunia.com/advisories/11157"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "phorum-register-xss(15494)",
|
"name": "1009433",
|
||||||
"refsource" : "XF",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15494"
|
"url": "http://securitytracker.com/id?1009433"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "4333",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/4333"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,39 +53,39 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20040323 How to crash a harddisk - the Ipswitch WS_FTP Server way",
|
"name": "11206",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=108006717731989&w=2"
|
"url": "http://secunia.com/advisories/11206"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "9953",
|
"name": "9953",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/9953"
|
"url": "http://www.securityfocus.com/bid/9953"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20040323 How to crash a harddisk - the Ipswitch WS_FTP Server way",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=108006717731989&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "wsftp-rest-stor-dos(41831)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41831"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "4542",
|
"name": "4542",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/4542"
|
"url": "http://www.osvdb.org/4542"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "11206",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/11206"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1009529",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1009529"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "wsftp-rest-dos(15560)",
|
"name": "wsftp-rest-dos(15560)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15560"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15560"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "wsftp-rest-stor-dos(41831)",
|
"name": "1009529",
|
||||||
"refsource" : "XF",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41831"
|
"url": "http://securitytracker.com/id?1009529"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080212 Unicode buffer-overflow in RPM Remote Print Manager 4.5.1.11",
|
"name": "28905",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/488010/100/0/threaded"
|
"url": "http://secunia.com/advisories/28905"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://aluigi.altervista.org/adv/rpmlpdbof-adv.txt",
|
"name": "http://aluigi.altervista.org/adv/rpmlpdbof-adv.txt",
|
||||||
@ -67,16 +67,16 @@
|
|||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/27742"
|
"url": "http://www.securityfocus.com/bid/27742"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20080212 Unicode buffer-overflow in RPM Remote Print Manager 4.5.1.11",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/488010/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-0501",
|
"name": "ADV-2008-0501",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/0501"
|
"url": "http://www.vupen.com/english/advisories/2008/0501"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "28905",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/28905"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "rpm-receivedatafile-bo(40432)",
|
"name": "rpm-receivedatafile-bo(40432)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "6028",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/6028"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-2033",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/2033/references"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "30999",
|
"name": "30999",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -72,10 +62,20 @@
|
|||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/3994"
|
"url": "http://securityreason.com/securityalert/3994"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "6028",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/6028"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ray-sincpath-file-include(43644)",
|
"name": "ray-sincpath-file-include(43644)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43644"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43644"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-2033",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/2033/references"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "6015",
|
"name": "3991",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "SREASON",
|
||||||
"url" : "https://www.exploit-db.com/exploits/6015"
|
"url": "http://securityreason.com/securityalert/3991"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "30117",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/30117"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-2016",
|
"name": "ADV-2008-2016",
|
||||||
@ -72,15 +67,20 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/30948"
|
"url": "http://secunia.com/advisories/30948"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "3991",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/3991"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "webxelleditor-upload-file-upload(43596)",
|
"name": "webxelleditor-upload-file-upload(43596)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43596"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43596"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "30117",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/30117"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "6015",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/6015"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,35 +53,35 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080805 Plogger <= 3.0 SQL Injection",
|
"name": "4121",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/495116/100/0/threaded"
|
"url": "http://securityreason.com/securityalert/4121"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "6204",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/6204"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.gulftech.org/?node=research&article_id=00121-08042008",
|
"name": "http://www.gulftech.org/?node=research&article_id=00121-08042008",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.gulftech.org/?node=research&article_id=00121-08042008"
|
"url": "http://www.gulftech.org/?node=research&article_id=00121-08042008"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20080805 Plogger <= 3.0 SQL Injection",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/495116/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://dev.plogger.org/changeset/569",
|
"name": "http://dev.plogger.org/changeset/569",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://dev.plogger.org/changeset/569"
|
"url": "http://dev.plogger.org/changeset/569"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "6204",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/6204"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "30547",
|
"name": "30547",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/30547"
|
"url": "http://www.securityfocus.com/bid/30547"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "4121",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/4121"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "plogger-plogdownload-sql-injection(44233)",
|
"name": "plogger-plogdownload-sql-injection(44233)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,65 +52,65 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20080922 Squirrelmail: Session hijacking vulnerability, CVE-2008-3663",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/496601/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://int21.de/cve/CVE-2008-3663-squirrelmail.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://int21.de/cve/CVE-2008-3663-squirrelmail.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.nabble.com/ANNOUNCE:-SquirrelMail-1.4.16-Released-td19711998.html",
|
"name": "http://www.nabble.com/ANNOUNCE:-SquirrelMail-1.4.16-Released-td19711998.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.nabble.com/ANNOUNCE:-SquirrelMail-1.4.16-Released-td19711998.html"
|
"url": "http://www.nabble.com/ANNOUNCE:-SquirrelMail-1.4.16-Released-td19711998.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://support.apple.com/kb/HT3438",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.apple.com/kb/HT3438"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2009-02-12",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2008:028",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2009:004",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "31321",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/31321"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:10548",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10548"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "33937",
|
"name": "33937",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/33937"
|
"url": "http://secunia.com/advisories/33937"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://int21.de/cve/CVE-2008-3663-squirrelmail.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://int21.de/cve/CVE-2008-3663-squirrelmail.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "31321",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/31321"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.apple.com/kb/HT3438",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.apple.com/kb/HT3438"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "4304",
|
"name": "4304",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/4304"
|
"url": "http://securityreason.com/securityalert/4304"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2009-02-12",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080922 Squirrelmail: Session hijacking vulnerability, CVE-2008-3663",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/496601/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "squirrelmail-cookie-session-hijacking(45700)",
|
"name": "squirrelmail-cookie-session-hijacking(45700)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45700"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45700"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2009:004",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2008:028",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:10548",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10548"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=619467",
|
"name": "freeway-unspecified-file-include(44426)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=619467"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44426"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "30676",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/30676"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "31475",
|
"name": "31475",
|
||||||
@ -68,9 +63,14 @@
|
|||||||
"url": "http://secunia.com/advisories/31475"
|
"url": "http://secunia.com/advisories/31475"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "freeway-unspecified-file-include(44426)",
|
"name": "30676",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44426"
|
"url": "http://www.securityfocus.com/bid/30676"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://sourceforge.net/project/shownotes.php?release_id=619467",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://sourceforge.net/project/shownotes.php?release_id=619467"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[linux-kernel] 20080903 [patch 05/16] nfsd: fix buffer overrun decoding NFSv4 acl",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://lkml.org/lkml/2008/9/3/286"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20080904 CVE request: kernel: nfsd: fix buffer overrun decoding NFSv4 acl",
|
"name": "[oss-security] 20080904 CVE request: kernel: nfsd: fix buffer overrun decoding NFSv4 acl",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -67,46 +62,6 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2008/09/04/18"
|
"url": "http://www.openwall.com/lists/oss-security/2008/09/04/18"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=91b80969ba466ba4b915a4a1d03add8c297add3f",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=91b80969ba466ba4b915a4a1d03add8c297add3f"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.4",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=461101",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=461101"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1636",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2008/dsa-1636"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2008:0857",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0857.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-659-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/usn-659-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "31133",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/31133"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "31881",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/31881"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "32190",
|
"name": "32190",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -117,6 +72,51 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/32393"
|
"url": "http://secunia.com/advisories/32393"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1636",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2008/dsa-1636"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "31881",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/31881"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-659-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/usn-659-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[linux-kernel] 20080903 [patch 05/16] nfsd: fix buffer overrun decoding NFSv4 acl",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://lkml.org/lkml/2008/9/3/286"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=91b80969ba466ba4b915a4a1d03add8c297add3f",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=91b80969ba466ba4b915a4a1d03add8c297add3f"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2008:0857",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2008-0857.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.4",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "31133",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/31133"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=461101",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461101"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "linux-kernel-nfsv4-bo(45055)",
|
"name": "linux-kernel-nfsv4-bo(45055)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "http://packages.debian.org/changelogs/pool/main/p/python-dns/python-dns_2.3.3-1/changelog",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://packages.debian.org/changelogs/pool/main/p/python-dns/python-dns_2.3.3-1/changelog"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20080911 Re: CVE Request (ruby -- DNS spoofing vulnerability in resolv.rb)",
|
"name": "[oss-security] 20080911 Re: CVE Request (ruby -- DNS spoofing vulnerability in resolv.rb)",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -66,11 +71,6 @@
|
|||||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217",
|
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217"
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packages.debian.org/changelogs/pool/main/p/python-dns/python-dns_2.3.3-1/changelog",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://packages.debian.org/changelogs/pool/main/p/python-dns/python-dns_2.3.3-1/changelog"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,31 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "HPSBMA02378",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT080035",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "31777",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/31777"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-2836",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/2836"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1021064",
|
"name": "1021064",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1021064"
|
"url": "http://www.securitytracker.com/id?1021064"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBMA02378",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "32287",
|
"name": "32287",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -86,6 +71,21 @@
|
|||||||
"name": "hp-sim-unspecified-security-bypass(45916)",
|
"name": "hp-sim-unspecified-security-bypass(45916)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45916"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45916"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT080035",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01571962"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-2836",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/2836"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "31777",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/31777"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,46 +52,46 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20081008 ZDI-08-064: Novell eDirectory dhost.exe Accept Language Header Heap Overflow Vulnerability",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/497164/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-064",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-064"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7000086&sliceId=1&docTypeID=DT_TID_1_1&dialogID=78066829&stateId=0%200%2078062953",
|
"name": "http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7000086&sliceId=1&docTypeID=DT_TID_1_1&dialogID=78066829&stateId=0%200%2078062953",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7000086&sliceId=1&docTypeID=DT_TID_1_1&dialogID=78066829&stateId=0%200%2078062953"
|
"url": "http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7000086&sliceId=1&docTypeID=DT_TID_1_1&dialogID=78066829&stateId=0%200%2078062953"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-2738",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/2738"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1020989",
|
"name": "1020989",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1020989"
|
"url": "http://www.securitytracker.com/id?1020989"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-2738",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/2738"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-064",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-064"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20081008 ZDI-08-064: Novell eDirectory dhost.exe Accept Language Header Heap Overflow Vulnerability",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/497164/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "32111",
|
"name": "32111",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/32111"
|
"url": "http://secunia.com/advisories/32111"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "4405",
|
"name": "4405",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20080214 Philips VOIP841 Multiple Vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/488127/100/200/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "5113",
|
"name": "5113",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/5113"
|
"url": "https://www.exploit-db.com/exploits/5113"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "28978",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/28978"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "27790",
|
"name": "27790",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2008/0583"
|
"url": "http://www.vupen.com/english/advisories/2008/0583"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "28978",
|
"name": "20080214 Philips VOIP841 Multiple Vulnerabilities",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://secunia.com/advisories/28978"
|
"url": "http://www.securityfocus.com/archive/1/488127/100/200/threaded"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "4536",
|
"name": "4536",
|
||||||
|
@ -52,6 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "31968",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/31968"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "31312",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/31312"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20080921 [MajorSecurity Advisory #53]BLUEPAGE CMS - Cross Site Scripting and Session Fixation Issues",
|
"name": "20080921 [MajorSecurity Advisory #53]BLUEPAGE CMS - Cross Site Scripting and Session Fixation Issues",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -62,16 +72,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls53"
|
"url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls53"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "31312",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/31312"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "31968",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/31968"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "bluepagecms-index-xss(45321)",
|
"name": "bluepagecms-index-xss(45321)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "7475",
|
"name": "33174",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://www.exploit-db.com/exploits/7475"
|
"url": "http://secunia.com/advisories/33174"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "50721",
|
"name": "50721",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://osvdb.org/50721"
|
"url": "http://osvdb.org/50721"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "33174",
|
"name": "7475",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://secunia.com/advisories/33174"
|
"url": "https://www.exploit-db.com/exploits/7475"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "babbleboard-index-csrf(47396)",
|
"name": "babbleboard-index-csrf(47396)",
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20081023 SiteEngine 5.x Multiple Remote Vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/497747/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "6823",
|
"name": "6823",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/6823"
|
"url": "https://www.exploit-db.com/exploits/6823"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20081023 SiteEngine 5.x Multiple Remote Vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/497747/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "31888",
|
"name": "31888",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-2191",
|
"ID": "CVE-2013-2191",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -58,14 +58,9 @@
|
|||||||
"url": "http://www.openwall.com/lists/oss-security/2013/06/19/6"
|
"url": "http://www.openwall.com/lists/oss-security/2013/06/19/6"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[python-bugzilla] 20130619 ANNOUNCE: python-bugzilla 0.9.0 released",
|
"name": "openSUSE-SU-2013:1155",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SUSE",
|
||||||
"url" : "https://lists.fedorahosted.org/pipermail/python-bugzilla/2013-June/000104.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00026.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=951594",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=951594"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef",
|
"name": "https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef",
|
||||||
@ -78,9 +73,14 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00025.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00025.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "openSUSE-SU-2013:1155",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=951594",
|
||||||
"refsource" : "SUSE",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-07/msg00026.html"
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=951594"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[python-bugzilla] 20130619 ANNOUNCE: python-bugzilla 0.9.0 released",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.fedorahosted.org/pipermail/python-bugzilla/2013-June/000104.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2013-2880",
|
"ID": "CVE-2013-2880",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,54 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=236845",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=236845"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=160450",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=256985",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=160450"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=256985"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=167924",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=242023",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=167924"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=242023"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=173688",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=196570",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=173688"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=196570"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=176027",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=243875",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=176027"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=243875"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=176676",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=226091",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=176676"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=226091"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=177215",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=177215"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=177688",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=177688"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=178264",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=178264"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=178266",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=178266"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://code.google.com/p/chromium/issues/detail?id=179653",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=179653",
|
||||||
@ -113,29 +93,29 @@
|
|||||||
"url": "https://code.google.com/p/chromium/issues/detail?id=187243"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=187243"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=189084",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=240055",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=189084"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=240055"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=189090",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=178266",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=189090"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=178266"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=196570",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=243881",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=196570"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=243881"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=222852",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=173688",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=222852"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=173688"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=223482",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=176027",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=223482"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=176027"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://code.google.com/p/chromium/issues/detail?id=223772",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=223772",
|
||||||
@ -143,19 +123,24 @@
|
|||||||
"url": "https://code.google.com/p/chromium/issues/detail?id=223772"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=223772"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=225798",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=239411",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=225798"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=239411"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=226091",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=240961",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=226091"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=240961"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=227157",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=235732",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=227157"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=235732"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=177688",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=177688"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://code.google.com/p/chromium/issues/detail?id=230726",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=230726",
|
||||||
@ -163,9 +148,89 @@
|
|||||||
"url": "https://code.google.com/p/chromium/issues/detail?id=230726"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=230726"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=235732",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=246240",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=235732"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=246240"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=227157",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=227157"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=240449",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=240449"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:17281",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17281"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=242931",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=242931"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=242786",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=242786"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=160450",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=160450"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=167924",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=167924"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=178264",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=178264"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=189090",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=189090"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=177215",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=177215"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=243045",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=243045"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-2724",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2013/dsa-2724"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=223482",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=223482"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=237263",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=237263"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=189084",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=189084"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=222852",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=222852"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://code.google.com/p/chromium/issues/detail?id=236269",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=236269",
|
||||||
@ -178,84 +243,19 @@
|
|||||||
"url": "https://code.google.com/p/chromium/issues/detail?id=236556"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=236556"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=236845",
|
"name": "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=236845"
|
"url": "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=237263",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=176676",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=237263"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=176676"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=239411",
|
"name": "https://code.google.com/p/chromium/issues/detail?id=225798",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=239411"
|
"url": "https://code.google.com/p/chromium/issues/detail?id=225798"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=240055",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=240055"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=240449",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=240449"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=240961",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=240961"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=242023",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=242023"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=242786",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=242786"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=242931",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=242931"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=243045",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=243045"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=243875",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=243875"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=243881",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=243881"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=246240",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=246240"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=256985",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=256985"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-2724",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2013/dsa-2724"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:17281",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17281"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2013-6021",
|
"ID": "CVE-2013-6021",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,20 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "29273",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "http://www.exploit-db.com/exploits/29273"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/",
|
"name": "https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/"
|
"url": "https://funoverip.net/2013/10/watchguard-cve-2013-6021-stack-based-buffer-overflow-exploit/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8/",
|
"name": "29273",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8/"
|
"url": "http://www.exploit-db.com/exploits/29273"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "98752",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/98752"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://watchguardsecuritycenter.com/2013/10/17/xtm-11-8-secfixes/",
|
"name": "http://watchguardsecuritycenter.com/2013/10/17/xtm-11-8-secfixes/",
|
||||||
@ -73,9 +73,9 @@
|
|||||||
"url": "http://watchguardsecuritycenter.com/2013/10/17/xtm-11-8-secfixes/"
|
"url": "http://watchguardsecuritycenter.com/2013/10/17/xtm-11-8-secfixes/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#233990",
|
"name": "http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8/",
|
||||||
"refsource" : "CERT-VN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/233990"
|
"url": "http://watchguardsecuritycenter.com/2013/10/17/watchguard-dimension-and-fireware-xtm-11-8/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "63227",
|
"name": "63227",
|
||||||
@ -83,9 +83,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/63227"
|
"url": "http://www.securityfocus.com/bid/63227"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "98752",
|
"name": "VU#233990",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "CERT-VN",
|
||||||
"url" : "http://osvdb.org/98752"
|
"url": "http://www.kb.cert.org/vuls/id/233990"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2013-6032",
|
"ID": "CVE-2013-6032",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://support.lexmark.com/index?page=content&id=TE586",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://support.lexmark.com/index?page=content&id=TE586"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "VU#108062",
|
"name": "VU#108062",
|
||||||
"refsource": "CERT-VN",
|
"refsource": "CERT-VN",
|
||||||
"url": "http://www.kb.cert.org/vuls/id/108062"
|
"url": "http://www.kb.cert.org/vuls/id/108062"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://support.lexmark.com/index?page=content&id=TE586",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://support.lexmark.com/index?page=content&id=TE586"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2013-6092",
|
"ID": "CVE-2013-6092",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://groups.google.com/d/msg/mod-pagespeed-announce/oo015UHRxMc/JcAuf1hE8L8J",
|
"name": "55429",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://groups.google.com/d/msg/mod-pagespeed-announce/oo015UHRxMc/JcAuf1hE8L8J"
|
"url": "http://secunia.com/advisories/55429"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "99081",
|
"name": "99081",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/99081"
|
"url": "http://osvdb.org/99081"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://groups.google.com/d/msg/mod-pagespeed-announce/oo015UHRxMc/JcAuf1hE8L8J",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://groups.google.com/d/msg/mod-pagespeed-announce/oo015UHRxMc/JcAuf1hE8L8J"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1029262",
|
"name": "1029262",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1029262"
|
"url": "http://www.securitytracker.com/id/1029262"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "55429",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/55429"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2013-6578",
|
"ID": "CVE-2013-6578",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,35 +52,35 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20131126 CVE Request: FFmpeg 2.1 multiple problems",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://openwall.com/lists/oss-security/2013/11/26/7"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20131208 Re: CVE Request: FFmpeg 2.1 multiple problems",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://openwall.com/lists/oss-security/2013/12/08/3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://ffmpeg.org/security.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://ffmpeg.org/security.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/FFmpeg/FFmpeg/commit/fe448cd28d674c3eff3072552eae366d0b659ce9",
|
"name": "https://github.com/FFmpeg/FFmpeg/commit/fe448cd28d674c3eff3072552eae366d0b659ce9",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/FFmpeg/FFmpeg/commit/fe448cd28d674c3eff3072552eae366d0b659ce9"
|
"url": "https://github.com/FFmpeg/FFmpeg/commit/fe448cd28d674c3eff3072552eae366d0b659ce9"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201603-06",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201603-06"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://trac.ffmpeg.org/ticket/2921",
|
"name": "https://trac.ffmpeg.org/ticket/2921",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://trac.ffmpeg.org/ticket/2921"
|
"url": "https://trac.ffmpeg.org/ticket/2921"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201603-06",
|
"name": "http://ffmpeg.org/security.html",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://security.gentoo.org/glsa/201603-06"
|
"url": "http://ffmpeg.org/security.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20131208 Re: CVE Request: FFmpeg 2.1 multiple problems",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://openwall.com/lists/oss-security/2013/12/08/3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20131126 CVE Request: FFmpeg 2.1 multiple problems",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://openwall.com/lists/oss-security/2013/11/26/7"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "100630",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/100630"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
|
"name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
@ -66,11 +71,6 @@
|
|||||||
"name": "DSA-3996",
|
"name": "DSA-3996",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2017/dsa-3996"
|
"url": "http://www.debian.org/security/2017/dsa-3996"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "100630",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/100630"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[debian-lts-announce] 20171118 [SECURITY] [DLA 1177-1] poppler security update",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.freedesktop.org/show_bug.cgi?id=102653",
|
"name": "https://bugzilla.freedesktop.org/show_bug.cgi?id=102653",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "DSA-4079",
|
"name": "DSA-4079",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "https://www.debian.org/security/2018/dsa-4079"
|
"url": "https://www.debian.org/security/2018/dsa-4079"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[debian-lts-announce] 20171118 [SECURITY] [DLA 1177-1] poppler security update",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00023.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2017-15456",
|
"ID": "CVE-2017-15456",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[security] 20170806 ares_parse_a_reply out-of-bounds read (CVE=2017-9454)",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "https://list.resiprocate.org/archive/resiprocate-users/msg02700.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/resiprocate/resiprocate/commit/d67a9ca6fd06ca65d23e313bdbad1ef4dd3aa0df",
|
"name": "https://github.com/resiprocate/resiprocate/commit/d67a9ca6fd06ca65d23e313bdbad1ef4dd3aa0df",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://github.com/resiprocate/resiprocate/commit/d67a9ca6fd06ca65d23e313bdbad1ef4dd3aa0df"
|
"url": "https://github.com/resiprocate/resiprocate/commit/d67a9ca6fd06ca65d23e313bdbad1ef4dd3aa0df"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[security] 20170806 ares_parse_a_reply out-of-bounds read (CVE=2017-9454)",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "https://list.resiprocate.org/archive/resiprocate-users/msg02700.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "42258",
|
"name": "99272",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "BID",
|
||||||
"url" : "https://www.exploit-db.com/exploits/42258/"
|
"url": "http://www.securityfocus.com/bid/99272"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-ii_step_one-layer2-c/",
|
"name": "https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-ii_step_one-layer2-c/",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-ii_step_one-layer2-c/"
|
"url": "https://blogs.gentoo.org/ago/2017/06/17/lame-global-buffer-overflow-in-ii_step_one-layer2-c/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "99272",
|
"name": "42258",
|
||||||
"refsource" : "BID",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://www.securityfocus.com/bid/99272"
|
"url": "https://www.exploit-db.com/exploits/42258/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "1/11/2018 14:07:39",
|
"DATE_ASSIGNED": "1/11/2018 14:07:39",
|
||||||
"ID": "CVE-2018-1000041",
|
"ID": "CVE-2018-1000041",
|
||||||
"REQUESTER": "alexbirsan@intigriti.me",
|
"REQUESTER": "alexbirsan@intigriti.me",
|
||||||
@ -13,18 +13,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "librsvg",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "GNOME"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -46,7 +46,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "Improper input validation"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -55,9 +55,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[debian-lts-announce] 20180212 [SECURITY] [DLA 1278-1] librsvg security update",
|
"name": "https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd",
|
||||||
"refsource" : "MLIST",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/02/msg00013.html"
|
"url": "https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea",
|
"name": "https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea",
|
||||||
@ -65,9 +65,9 @@
|
|||||||
"url": "https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea"
|
"url": "https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd",
|
"name": "[debian-lts-announce] 20180212 [SECURITY] [DLA 1278-1] librsvg security update",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "MLIST",
|
||||||
"url" : "https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd"
|
"url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00013.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "1/31/2018 20:29:42",
|
"DATE_ASSIGNED": "1/31/2018 20:29:42",
|
||||||
"ID": "CVE-2018-1000042",
|
"ID": "CVE-2018-1000042",
|
||||||
"REQUESTER": "medsgerj@gmail.com",
|
"REQUESTER": "medsgerj@gmail.com",
|
||||||
@ -13,18 +13,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "Squert",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "1.3.0 through 1.6.7"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "Security Onion Solutions"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -46,7 +46,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "CWE-78: Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "3/6/2018 21:59:48",
|
"DATE_ASSIGNED": "3/6/2018 21:59:48",
|
||||||
"ID": "CVE-2018-1000119",
|
"ID": "CVE-2018-1000119",
|
||||||
"REQUESTER": "kurt@seifried.org",
|
"REQUESTER": "kurt@seifried.org",
|
||||||
@ -13,21 +13,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "rack-protection",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "2.0.0.rc3 and earlier"
|
"version_value": "n/a"
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value" : "1.5.4 and earlier"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "Sinatra"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -49,7 +46,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "CWE-208"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -63,9 +60,9 @@
|
|||||||
"url": "https://github.com/sinatra/rack-protection/pull/98"
|
"url": "https://github.com/sinatra/rack-protection/pull/98"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109",
|
"name": "RHSA-2018:1060",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109"
|
"url": "https://access.redhat.com/errata/RHSA-2018:1060"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-4247",
|
"name": "DSA-4247",
|
||||||
@ -73,9 +70,9 @@
|
|||||||
"url": "https://www.debian.org/security/2018/dsa-4247"
|
"url": "https://www.debian.org/security/2018/dsa-4247"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2018:1060",
|
"name": "https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1060"
|
"url": "https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "106162",
|
"name": "106162",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/106162"
|
"url": "http://www.securityfocus.com/bid/106162"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.ricoh.com/info/2018/1127_1.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.ricoh.com/info/2018/1127_1.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "JVN#55263945",
|
"name": "JVN#55263945",
|
||||||
"refsource": "JVN",
|
"refsource": "JVN",
|
||||||
"url": "https://jvn.jp/en/jp/JVN55263945/index.html"
|
"url": "https://jvn.jp/en/jp/JVN55263945/index.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.ricoh.com/info/2018/1127_1.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.ricoh.com/info/2018/1127_1.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,30 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"ID": "CVE-2018-19510",
|
"ID": "CVE-2018-19510",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
},
|
},
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
@ -11,7 +34,33 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "subscriber.php in Webgalamb through 7.0 is vulnerable to SQL injection via the Client-IP HTTP request header."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://seclists.org/fulldisclosure/2019/Jan/15",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://seclists.org/fulldisclosure/2019/Jan/15"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://github.com/iSafeBlue/freeswitch_rce/blob/master/README-en.md",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/iSafeBlue/freeswitch_rce/blob/master/README-en.md"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/freeswitch_rce.py",
|
"name": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/freeswitch_rce.py",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/freeswitch_rce.py"
|
"url": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/freeswitch_rce.py"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/README-en.md",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/iSafeBlue/freeswitch_rce/blob/master/README-en.md"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://support.apple.com/HT208462",
|
"name": "https://support.apple.com/HT208462",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://support.apple.com/HT208462"
|
"url": "https://support.apple.com/HT208462"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://support.apple.com/HT208463",
|
"name": "1040265",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://support.apple.com/HT208463"
|
"url": "http://www.securitytracker.com/id/1040265"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT208464",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT208464"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "102774",
|
"name": "102774",
|
||||||
@ -78,9 +68,19 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/102774"
|
"url": "http://www.securityfocus.com/bid/102774"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1040265",
|
"name": "https://support.apple.com/HT208464",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1040265"
|
"url": "https://support.apple.com/HT208464"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://blog.zimperium.com/cve-2018-4087-poc-escaping-sandbox-misleading-bluetoothd/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT208463",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT208463"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "102996",
|
"name": "102996",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/102996"
|
"url": "http://www.securityfocus.com/bid/102996"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1040364",
|
"name": "1040364",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "104169",
|
"name": "104169",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/104169"
|
"url": "http://www.securityfocus.com/bid/104169"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1040920",
|
"name": "1040920",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
|
Loading…
x
Reference in New Issue
Block a user