mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
a455059926
commit
ff34eeec9b
@ -52,30 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "22140",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/22140"
|
||||
},
|
||||
{
|
||||
"name": "20060101 [eVuln] VEGO Web Forum SQL Injection Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/420661/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://evuln.com/vulns/1/summary.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://evuln.com/vulns/1/summary.html"
|
||||
},
|
||||
{
|
||||
"name" : "16107",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16107"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0003",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0003"
|
||||
},
|
||||
{
|
||||
"name" : "22140",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/22140"
|
||||
"name": "315",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/315"
|
||||
},
|
||||
{
|
||||
"name": "18273",
|
||||
@ -83,9 +78,14 @@
|
||||
"url": "http://secunia.com/advisories/18273"
|
||||
},
|
||||
{
|
||||
"name" : "315",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/315"
|
||||
"name": "16107",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16107"
|
||||
},
|
||||
{
|
||||
"name": "http://evuln.com/vulns/1/summary.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://evuln.com/vulns/1/summary.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "22929",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/22929"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0445",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0445"
|
||||
},
|
||||
{
|
||||
"name": "18693",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18693"
|
||||
},
|
||||
{
|
||||
"name": "20060203 phpBB 2.0.19 Cross Site Request Forgeries and XSS Admin",
|
||||
"refsource": "FULLDISC",
|
||||
@ -63,29 +78,14 @@
|
||||
"url": "http://securityreason.com/achievement_securityalert/31"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0445",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0445"
|
||||
},
|
||||
{
|
||||
"name" : "22929",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/22929"
|
||||
},
|
||||
{
|
||||
"name" : "18693",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18693"
|
||||
"name": "phpbb-referer-header-http-xss(24497)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24497"
|
||||
},
|
||||
{
|
||||
"name": "406",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/406"
|
||||
},
|
||||
{
|
||||
"name" : "phpbb-referer-header-http-xss(24497)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24497"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "23027",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/23027"
|
||||
},
|
||||
{
|
||||
"name": "phphd-add-xss(24513)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24513"
|
||||
},
|
||||
{
|
||||
"name": "18793",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18793"
|
||||
},
|
||||
{
|
||||
"name": "16586",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16586"
|
||||
},
|
||||
{
|
||||
"name": "20060212 [eVuln] phphd Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,26 +81,6 @@
|
||||
"name": "http://www.evuln.com/vulns/60/summary.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.evuln.com/vulns/60/summary.html"
|
||||
},
|
||||
{
|
||||
"name" : "16586",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16586"
|
||||
},
|
||||
{
|
||||
"name" : "23027",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/23027"
|
||||
},
|
||||
{
|
||||
"name" : "18793",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18793"
|
||||
},
|
||||
{
|
||||
"name" : "phphd-add-xss(24513)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24513"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060220 vendor dispute for CVE-2006-0669",
|
||||
"refsource" : "VIM",
|
||||
"url" : "http://www.attrition.org/pipermail/vim/2006-February/000561.html"
|
||||
},
|
||||
{
|
||||
"name": "16563",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16563"
|
||||
},
|
||||
{
|
||||
"name" : "23509",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/23509"
|
||||
"name": "gasforumlight-archive-sql-injection(24616)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24616"
|
||||
},
|
||||
{
|
||||
"name": "1015600",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://securitytracker.com/id?1015600"
|
||||
},
|
||||
{
|
||||
"name" : "gasforumlight-archive-sql-injection(24616)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24616"
|
||||
"name": "20060220 vendor dispute for CVE-2006-0669",
|
||||
"refsource": "VIM",
|
||||
"url": "http://www.attrition.org/pipermail/vim/2006-February/000561.html"
|
||||
},
|
||||
{
|
||||
"name": "23509",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/23509"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,34 +58,34 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/424729/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://retrogod.altervista.org/linpha_10_local.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://retrogod.altervista.org/linpha_10_local.html"
|
||||
"name": "18808",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18808"
|
||||
},
|
||||
{
|
||||
"name": "linpha-index-file-include(24663)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24663"
|
||||
},
|
||||
{
|
||||
"name": "16592",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16592"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0535",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0535"
|
||||
},
|
||||
{
|
||||
"name" : "18808",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18808"
|
||||
},
|
||||
{
|
||||
"name": "426",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/426"
|
||||
},
|
||||
{
|
||||
"name" : "linpha-index-file-include(24663)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24663"
|
||||
"name": "http://retrogod.altervista.org/linpha_10_local.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://retrogod.altervista.org/linpha_10_local.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0535",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0535"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/23599"
|
||||
},
|
||||
{
|
||||
"name" : "19074",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19074"
|
||||
},
|
||||
{
|
||||
"name": "lettermerger-files-disclose-information(25020)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25020"
|
||||
},
|
||||
{
|
||||
"name": "19074",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19074"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2006-1726",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2006/mfsa2006-28.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2006/mfsa2006-28.html"
|
||||
"name": "ADV-2006-3748",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3748"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBTU02118",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
|
||||
"name": "mozilla-valuetofunctionobject-sec-bypass(25825)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25825"
|
||||
},
|
||||
{
|
||||
"name": "SSRT061145",
|
||||
@ -68,9 +68,44 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02153",
|
||||
"name": "1015933",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015933"
|
||||
},
|
||||
{
|
||||
"name": "1015932",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015932"
|
||||
},
|
||||
{
|
||||
"name": "1015931",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015931"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3749",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3749"
|
||||
},
|
||||
{
|
||||
"name": "HPSBTU02118",
|
||||
"refsource": "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
|
||||
"url": "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:1968",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1968"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0083",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0083"
|
||||
},
|
||||
{
|
||||
"name": "VU#968814",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/968814"
|
||||
},
|
||||
{
|
||||
"name": "SSRT061181",
|
||||
@ -78,12 +113,27 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02156",
|
||||
"name": "ADV-2006-1356",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1356"
|
||||
},
|
||||
{
|
||||
"name": "SSRT061236",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061236",
|
||||
"name": "HPSBUX02153",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name": "19649",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19649"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02156",
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
|
||||
},
|
||||
@ -92,80 +142,30 @@
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA06-107A.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#968814",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/968814"
|
||||
},
|
||||
{
|
||||
"name": "17516",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17516"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1356",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1356"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3748",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3748"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3749",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3749"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0083",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0083"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:1968",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1968"
|
||||
},
|
||||
{
|
||||
"name" : "1015931",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015931"
|
||||
},
|
||||
{
|
||||
"name" : "1015932",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015932"
|
||||
},
|
||||
{
|
||||
"name" : "1015933",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015933"
|
||||
},
|
||||
{
|
||||
"name" : "19631",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19631"
|
||||
},
|
||||
{
|
||||
"name" : "19649",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19649"
|
||||
},
|
||||
{
|
||||
"name" : "22065",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22065"
|
||||
},
|
||||
{
|
||||
"name": "22066",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22066"
|
||||
},
|
||||
{
|
||||
"name" : "mozilla-valuetofunctionobject-sec-bypass(25825)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25825"
|
||||
"name": "22065",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22065"
|
||||
},
|
||||
{
|
||||
"name": "19631",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19631"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2006/mfsa2006-28.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-28.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "1682",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/1682"
|
||||
},
|
||||
{
|
||||
"name": "17572",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17572"
|
||||
},
|
||||
{
|
||||
"name": "1682",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/1682"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1374",
|
||||
"refsource": "VUPEN",
|
||||
|
@ -52,6 +52,101 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "21586",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21586"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.rpath.com/browse/RPL-577",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-577"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-2732",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2732"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1154",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1154"
|
||||
},
|
||||
{
|
||||
"name": "21354",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21354"
|
||||
},
|
||||
{
|
||||
"name": "22487",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22487"
|
||||
},
|
||||
{
|
||||
"name": "1016689",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016689"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2006:023",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2007-07-31",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3271",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3271"
|
||||
},
|
||||
{
|
||||
"name": "21444",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21444"
|
||||
},
|
||||
{
|
||||
"name": "squirrelmail-compose-variable-overwrite(28365)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28365"
|
||||
},
|
||||
{
|
||||
"name": "22080",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22080"
|
||||
},
|
||||
{
|
||||
"name": "20060811 SquirrelMail issue is dynamic variable evaluation",
|
||||
"refsource": "VIM",
|
||||
"url": "http://attrition.org/pipermail/vim/2006-August/000970.html"
|
||||
},
|
||||
{
|
||||
"name": "19486",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19486"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2006:0668",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2006-0668.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.squirrelmail.org/patches/sqm1.4.7-expired-post-fix-full.patch",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.squirrelmail.org/patches/sqm1.4.7-expired-post-fix-full.patch"
|
||||
},
|
||||
{
|
||||
"name": "http://www.squirrelmail.org/security/issue/2006-08-11",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.squirrelmail.org/security/issue/2006-08-11"
|
||||
},
|
||||
{
|
||||
"name": "22104",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22104"
|
||||
},
|
||||
{
|
||||
"name": "20060811 SquirrelMail 1.4.8 released - fixes variable overwriting attack",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -68,69 +163,9 @@
|
||||
"url": "http://marc.info/?l=full-disclosure&m=115532449024178&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://docs.info.apple.com/article.html?artnum=306172",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://docs.info.apple.com/article.html?artnum=306172"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2007-07-31",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "20060811 SquirrelMail issue is dynamic variable evaluation",
|
||||
"refsource" : "VIM",
|
||||
"url" : "http://attrition.org/pipermail/vim/2006-August/000970.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://issues.rpath.com/browse/RPL-577",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://issues.rpath.com/browse/RPL-577"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.squirrelmail.org/security/issue/2006-08-11",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.squirrelmail.org/security/issue/2006-08-11"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.squirrelmail.org/patches/sqm1.4.7-expired-post-fix-full.patch",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.squirrelmail.org/patches/sqm1.4.7-expired-post-fix-full.patch"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1154",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1154"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2006:147",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:147"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2006:0668",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0668.html"
|
||||
},
|
||||
{
|
||||
"name" : "20061001-01-P",
|
||||
"refsource" : "SGI",
|
||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2006:023",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2006_23_sr.html"
|
||||
},
|
||||
{
|
||||
"name" : "19486",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19486"
|
||||
},
|
||||
{
|
||||
"name" : "25159",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25159"
|
||||
"name": "27917",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/27917"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11533",
|
||||
@ -138,64 +173,29 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11533"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3271",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3271"
|
||||
"name": "http://docs.info.apple.com/article.html?artnum=306172",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://docs.info.apple.com/article.html?artnum=306172"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-2732",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/2732"
|
||||
"name": "25159",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25159"
|
||||
},
|
||||
{
|
||||
"name" : "27917",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/27917"
|
||||
"name": "20061001-01-P",
|
||||
"refsource": "SGI",
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc"
|
||||
},
|
||||
{
|
||||
"name" : "1016689",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016689"
|
||||
},
|
||||
{
|
||||
"name" : "21354",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21354"
|
||||
},
|
||||
{
|
||||
"name" : "21444",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21444"
|
||||
},
|
||||
{
|
||||
"name" : "21586",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21586"
|
||||
},
|
||||
{
|
||||
"name" : "22104",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22104"
|
||||
},
|
||||
{
|
||||
"name" : "22487",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22487"
|
||||
},
|
||||
{
|
||||
"name" : "22080",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22080"
|
||||
"name": "MDKSA-2006:147",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:147"
|
||||
},
|
||||
{
|
||||
"name": "26235",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/26235"
|
||||
},
|
||||
{
|
||||
"name" : "squirrelmail-compose-variable-overwrite(28365)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28365"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.splitbrain.org/?do=details&id=926"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200609-20",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200609-20.xml"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3851",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3851"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200609-20",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200609-20.xml"
|
||||
},
|
||||
{
|
||||
"name": "22192",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -53,14 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061025 [KAPDA::#61] - PacPoll <= 4.0 Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/449668/100/0/threaded"
|
||||
"name": "1788",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1788"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kapda.ir/advisory-445.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.kapda.ir/advisory-445.html"
|
||||
"name": "pacpoll-addpoll-auth-bypass(29801)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29801"
|
||||
},
|
||||
{
|
||||
"name": "20742",
|
||||
@ -72,20 +72,20 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4208"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kapda.ir/advisory-445.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.kapda.ir/advisory-445.html"
|
||||
},
|
||||
{
|
||||
"name": "20061025 [KAPDA::#61] - PacPoll <= 4.0 Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/449668/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "22576",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22576"
|
||||
},
|
||||
{
|
||||
"name" : "1788",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1788"
|
||||
},
|
||||
{
|
||||
"name" : "pacpoll-addpoll-auth-bypass(29801)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29801"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-0289",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,6 +57,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.splitbrain.org/index.php?do=details&task_id=1853"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2010-0770",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034729.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201301-07",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201301-07.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://www.splitbrain.org/blog/2010-01/17-dokuwiki-security",
|
||||
"refsource": "CONFIRM",
|
||||
@ -73,25 +83,15 @@
|
||||
"url": "http://www.debian.org/security/2010/dsa-1976"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2010-0770",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034729.html"
|
||||
"name": "61708",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/61708"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2010-0800",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034831.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201301-07",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201301-07.xml"
|
||||
},
|
||||
{
|
||||
"name" : "61708",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/61708"
|
||||
},
|
||||
{
|
||||
"name": "38205",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2010-0522",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4077",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4077"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2010-03-29-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4077",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4077"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100115 SEC Consult SA-20100115-0 :: Local file inclusion/execution and multiple CSRF vulnerabilities in LetoDMS (formerly MyDMS)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/508947/100/0/threaded"
|
||||
"name": "38237",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38237"
|
||||
},
|
||||
{
|
||||
"name": "https://www.sec-consult.com/files/20100115-0_mydms_file_inclusion.txt",
|
||||
@ -63,24 +63,9 @@
|
||||
"url": "https://www.sec-consult.com/files/20100115-0_mydms_file_inclusion.txt"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2146",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2011/dsa-2146"
|
||||
},
|
||||
{
|
||||
"name" : "37828",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/37828"
|
||||
},
|
||||
{
|
||||
"name" : "61834",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/61834"
|
||||
},
|
||||
{
|
||||
"name" : "38237",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/38237"
|
||||
"name": "letodms-oplogin-file-include(55709)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55709"
|
||||
},
|
||||
{
|
||||
"name": "42900",
|
||||
@ -88,9 +73,24 @@
|
||||
"url": "http://secunia.com/advisories/42900"
|
||||
},
|
||||
{
|
||||
"name" : "letodms-oplogin-file-include(55709)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55709"
|
||||
"name": "37828",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/37828"
|
||||
},
|
||||
{
|
||||
"name": "20100115 SEC Consult SA-20100115-0 :: Local file inclusion/execution and multiple CSRF vulnerabilities in LetoDMS (formerly MyDMS)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/508947/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "61834",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/61834"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2146",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2011/dsa-2146"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2010-2370",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-2497",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,61 +52,61 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[freetype] 20100712 FreeType 2.4.0 has been released",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100713 Multiple bugs in freetype",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=127905701201340&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100714 Re: Multiple bugs in freetype",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=127909326909362&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=613154",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=613154"
|
||||
},
|
||||
{
|
||||
"name": "https://savannah.nongnu.org/bugs/?30082",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://savannah.nongnu.org/bugs/?30082"
|
||||
},
|
||||
{
|
||||
"name" : "https://savannah.nongnu.org/bugs/?30083",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://savannah.nongnu.org/bugs/?30083"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4435",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4435"
|
||||
},
|
||||
{
|
||||
"name": "[freetype] 20100712 FreeType 2.4.0 has been released",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2010-11-10-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100714 Re: Multiple bugs in freetype",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2070",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2010/dsa-2070"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100713 Multiple bugs in freetype",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2010:137",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=613154",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613154"
|
||||
},
|
||||
{
|
||||
"name": "https://savannah.nongnu.org/bugs/?30083",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://savannah.nongnu.org/bugs/?30083"
|
||||
},
|
||||
{
|
||||
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc"
|
||||
},
|
||||
{
|
||||
"name": "48951",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-3306",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,31 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "14925",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/14925/"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100916 CVE request: weborf: directory traversal",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/09/17/3"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100917 Re: CVE request: weborf: directory traversal",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2010/09/17/8"
|
||||
},
|
||||
{
|
||||
"name" : "http://code.google.com/p/weborf/source/detail?r=464",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://code.google.com/p/weborf/source/detail?r=464"
|
||||
},
|
||||
{
|
||||
"name" : "http://galileo.dmi.unict.it/wiki/weborf/doku.php?id=news:released_0.12.3",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://galileo.dmi.unict.it/wiki/weborf/doku.php?id=news:released_0.12.3"
|
||||
},
|
||||
{
|
||||
"name": "67840",
|
||||
"refsource": "OSVDB",
|
||||
@ -86,6 +66,26 @@
|
||||
"name": "41286",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41286"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/weborf/source/detail?r=464",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/weborf/source/detail?r=464"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100917 Re: CVE request: weborf: directory traversal",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/09/17/8"
|
||||
},
|
||||
{
|
||||
"name": "14925",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/14925/"
|
||||
},
|
||||
{
|
||||
"name": "http://galileo.dmi.unict.it/wiki/weborf/doku.php?id=news:released_0.12.3",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://galileo.dmi.unict.it/wiki/weborf/doku.php?id=news:released_0.12.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2010-3409",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2010-3597",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
|
||||
"name": "ADV-2011-0143",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0143"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640"
|
||||
},
|
||||
{
|
||||
"name" : "45901",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/45901"
|
||||
},
|
||||
{
|
||||
"name": "1024981",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1024981"
|
||||
},
|
||||
{
|
||||
"name": "oracle-outside-viewer-dos(64778)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64778"
|
||||
},
|
||||
{
|
||||
"name": "45901",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/45901"
|
||||
},
|
||||
{
|
||||
"name": "42992",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42992"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0143",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0143"
|
||||
},
|
||||
{
|
||||
"name" : "oracle-outside-viewer-dos(64778)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64778"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2010-3619",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-21.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-21.html"
|
||||
"name": "SUSE-SA:2010:048",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0191",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0191"
|
||||
},
|
||||
{
|
||||
"name": "43025",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43025"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201101-08",
|
||||
@ -68,34 +78,24 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0743.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2010:048",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2010:019",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb10-21.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb10-21.html"
|
||||
},
|
||||
{
|
||||
"name": "TA10-279A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA10-279A.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2010:019",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:7385",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7385"
|
||||
},
|
||||
{
|
||||
"name" : "43025",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43025"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0191",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0191"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2010-3932",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "IO13306",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1IO13306"
|
||||
},
|
||||
{
|
||||
"name": "44604",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/44604"
|
||||
},
|
||||
{
|
||||
"name": "ibm-tds-ber-ldap-dos(62977)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62977"
|
||||
},
|
||||
{
|
||||
"name": "IO13306",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg1IO13306"
|
||||
},
|
||||
{
|
||||
"name": "42116",
|
||||
"refsource": "SECUNIA",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "ADV-2010-2863",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/2863"
|
||||
},
|
||||
{
|
||||
"name" : "ibm-tds-ber-ldap-dos(62977)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62977"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-4541",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,26 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20110103 CVE request for buffer overflows in gimp",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2011/01/03/2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110104 Re: CVE request for buffer overflows in gimp",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2011/01/04/7"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=666793",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=666793"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2426",
|
||||
"refsource": "DEBIAN",
|
||||
@ -83,64 +63,84 @@
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201209-23.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2011:103",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:103"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:0837",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0837.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:0838",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0838.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:0839",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0839.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2011:005",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "70281",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/70281"
|
||||
},
|
||||
{
|
||||
"name" : "42771",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/42771"
|
||||
},
|
||||
{
|
||||
"name" : "44750",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/44750"
|
||||
},
|
||||
{
|
||||
"name" : "50737",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/50737"
|
||||
},
|
||||
{
|
||||
"name" : "48236",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48236"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=666793",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0016",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0016"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0839",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0839.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0837",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0837.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2011:005",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0838",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0838.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110104 Re: CVE request for buffer overflows in gimp",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2011/01/04/7"
|
||||
},
|
||||
{
|
||||
"name": "44750",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/44750"
|
||||
},
|
||||
{
|
||||
"name": "42771",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42771"
|
||||
},
|
||||
{
|
||||
"name": "70281",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/70281"
|
||||
},
|
||||
{
|
||||
"name": "50737",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/50737"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110103 CVE request for buffer overflows in gimp",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2011/01/03/2"
|
||||
},
|
||||
{
|
||||
"name": "48236",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48236"
|
||||
},
|
||||
{
|
||||
"name": "gimp-sphere-designer-bo(64581)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64581"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:103",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:103"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://blog.mybb.com/2010/04/13/mybb-1-4-12-released-security-maintenance-update/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blog.mybb.com/2010/04/13/mybb-1-4-12-released-security-maintenance-update/"
|
||||
},
|
||||
{
|
||||
"name": "http://dev.mybboard.net/issues/728",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://dev.mybboard.net/issues/728"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20101008 CVE request: mybb before 1.4.11 and before 1.4.12",
|
||||
"refsource": "MLIST",
|
||||
@ -67,16 +77,6 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2010/12/06/2"
|
||||
},
|
||||
{
|
||||
"name" : "http://blog.mybb.com/2010/04/13/mybb-1-4-12-released-security-maintenance-update/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://blog.mybb.com/2010/04/13/mybb-1-4-12-released-security-maintenance-update/"
|
||||
},
|
||||
{
|
||||
"name" : "http://dev.mybboard.net/issues/728",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://dev.mybboard.net/issues/728"
|
||||
},
|
||||
{
|
||||
"name": "mybb-mycodes-security-bypass(64518)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "15585",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/15585"
|
||||
},
|
||||
{
|
||||
"name": "44992",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/44992"
|
||||
},
|
||||
{
|
||||
"name": "15585",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/15585"
|
||||
},
|
||||
{
|
||||
"name": "42324",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100921 [ISecAuditors Security Advisories] Reflected XSS in Atmail WebMail < v6.2.0",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/513890/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "43377",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/43377"
|
||||
"name": "41555",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/41555"
|
||||
},
|
||||
{
|
||||
"name": "68183",
|
||||
@ -68,15 +63,20 @@
|
||||
"url": "http://osvdb.org/68183"
|
||||
},
|
||||
{
|
||||
"name" : "41555",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/41555"
|
||||
"name": "43377",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/43377"
|
||||
},
|
||||
{
|
||||
"name": "8455",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/8455"
|
||||
},
|
||||
{
|
||||
"name": "20100921 [ISecAuditors Security Advisories] Reflected XSS in Atmail WebMail < v6.2.0",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/513890/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "atmail-index-xss(61958)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2014-3582",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://drupal.org/node/2267485",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://drupal.org/node/2267485"
|
||||
},
|
||||
{
|
||||
"name": "https://drupal.org/node/2267475",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,6 +62,11 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/67545"
|
||||
},
|
||||
{
|
||||
"name": "https://drupal.org/node/2267485",
|
||||
"refsource": "MISC",
|
||||
"url": "https://drupal.org/node/2267485"
|
||||
},
|
||||
{
|
||||
"name": "58399",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2014-4141",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,25 +57,25 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/40685/"
|
||||
},
|
||||
{
|
||||
"name" : "MS14-056",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056"
|
||||
},
|
||||
{
|
||||
"name": "70342",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/70342"
|
||||
},
|
||||
{
|
||||
"name": "60968",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60968"
|
||||
},
|
||||
{
|
||||
"name": "1031018",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031018"
|
||||
},
|
||||
{
|
||||
"name" : "60968",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/60968"
|
||||
"name": "MS14-056",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "108851",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/show/osvdb/108851"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140704 X.Org intel driver dev snapshots, backlight helper issue",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q3/39"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20140711 Re: X.Org intel driver dev snapshots, backlight helper issue",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2014/q3/138"
|
||||
},
|
||||
{
|
||||
"name": "[xorg-commit] 20140704 xf86-video-intel: tools/backlight_helper.c",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.x.org/archives/xorg-commit/2014-July/036840.html"
|
||||
},
|
||||
{
|
||||
"name" : "108851",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/show/osvdb/108851"
|
||||
},
|
||||
{
|
||||
"name": "xorg-x86-driver-dir-traversal(94746)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94746"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140711 Re: X.Org intel driver dev snapshots, backlight helper issue",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q3/138"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-8205",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-8283",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2014-8832",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "macosx-cve20148832-info-disc(100528)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100528"
|
||||
},
|
||||
{
|
||||
"name": "1031650",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031650"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/HT204244",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "APPLE-SA-2015-01-27-4",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "1031650",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1031650"
|
||||
},
|
||||
{
|
||||
"name" : "macosx-cve20148832-info-disc(100528)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/100528"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,16 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpvulndb.com/vulnerabilities/7692"
|
||||
},
|
||||
{
|
||||
"name": "wp-googleanalyticsbyyoast-xss(99053)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99053"
|
||||
},
|
||||
{
|
||||
"name": "71330",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/71330"
|
||||
},
|
||||
{
|
||||
"name": "https://twitter.com/yoast/status/537569224307511296",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,16 +76,6 @@
|
||||
"name": "https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/"
|
||||
},
|
||||
{
|
||||
"name" : "71330",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/71330"
|
||||
},
|
||||
{
|
||||
"name" : "wp-googleanalyticsbyyoast-xss(99053)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/99053"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/129643/WordPress-twimp-wp-Cross-Site-Request-Forgery-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/129643/WordPress-twimp-wp-Cross-Site-Request-Forgery-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "twimp-twimpwp-csrf(99380)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99380"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/129643/WordPress-twimp-wp-Cross-Site-Request-Forgery-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/129643/WordPress-twimp-wp-Cross-Site-Request-Forgery-Cross-Site-Scripting.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-2420",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://source.android.com/security/bulletin/2016-04-02.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://source.android.com/security/bulletin/2016-04-02.html"
|
||||
},
|
||||
{
|
||||
"name": "https://android.googlesource.com/platform/system/core/+/669ecc2f5e80ff924fa20ce7445354a7c5bcfd98",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://android.googlesource.com/platform/system/core/+/669ecc2f5e80ff924fa20ce7445354a7c5bcfd98"
|
||||
},
|
||||
{
|
||||
"name": "http://source.android.com/security/bulletin/2016-04-02.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://source.android.com/security/bulletin/2016-04-02.html"
|
||||
},
|
||||
{
|
||||
"name": "https://android.googlesource.com/platform/system/core/+/81df1cc77722000f8d0025c1ab00ced123aa573c",
|
||||
"refsource": "CONFIRM",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-2714",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-2746",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -58,15 +58,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/118356"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22005824",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22005824"
|
||||
},
|
||||
{
|
||||
"name": "99926",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99926"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22005824",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22005824"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1370955",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1370955"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/libtom/libtomcrypt/commit/5eb9743410ce4657e9d54fef26a2ee31a1b5dd0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/libtom/libtomcrypt/commit/5eb9743410ce4657e9d54fef26a2ee31a1b5dd0"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1370955",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370955"
|
||||
},
|
||||
{
|
||||
"name": "https://www.op-tee.org/advisories/",
|
||||
"refsource": "CONFIRM",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2016-6396",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20160907 Cisco Firepower Management Center and FireSIGHT System Software Malware Bypass Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss1"
|
||||
},
|
||||
{
|
||||
"name": "92826",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1036756",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036756"
|
||||
},
|
||||
{
|
||||
"name": "20160907 Cisco Firepower Management Center and FireSIGHT System Software Malware Bypass Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160907-fsss1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@symantec.com",
|
||||
"ID": "CVE-2016-6594",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bto.bluecoat.com/security-advisory/sa130",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bto.bluecoat.com/security-advisory/sa130"
|
||||
},
|
||||
{
|
||||
"name": "91404",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91404"
|
||||
},
|
||||
{
|
||||
"name": "https://bto.bluecoat.com/security-advisory/sa130",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bto.bluecoat.com/security-advisory/sa130"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.vapidlabs.com/advisory.php?v=172",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.vapidlabs.com/advisory.php?v=172"
|
||||
},
|
||||
{
|
||||
"name": "94262",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94262"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vapidlabs.com/advisory.php?v=172",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.vapidlabs.com/advisory.php?v=172"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-7593",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-7745",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
Loading…
x
Reference in New Issue
Block a user