mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5b9b9fa516
commit
0074e34cc8
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20041115 [SNS Advisory No.79] A Possibility of Cookie Overwrite in Microsoft Internet Explorer",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=110053968530613&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/79_e.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/79_e.html"
|
||||
},
|
||||
{
|
||||
"name" : "11680",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/11680"
|
||||
"name": "ie-path-cookie-overwrite(18073)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18073"
|
||||
},
|
||||
{
|
||||
"name": "13208",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://secunia.com/advisories/13208"
|
||||
},
|
||||
{
|
||||
"name" : "ie-path-cookie-overwrite(18073)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18073"
|
||||
"name": "20041115 [SNS Advisory No.79] A Possibility of Cookie Overwrite in Microsoft Internet Explorer",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=110053968530613&w=2"
|
||||
},
|
||||
{
|
||||
"name": "11680",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11680"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080123 Web Wiz Rich Text Editor Directory traversal + HTM/HTML filecreation on the server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/486868/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4971",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/4971"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.bugreport.ir/?/31",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.bugreport.ir/?/31"
|
||||
},
|
||||
{
|
||||
"name": "http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp"
|
||||
},
|
||||
{
|
||||
"name" : "27419",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27419"
|
||||
"name": "20080123 Web Wiz Rich Text Editor Directory traversal + HTM/HTML filecreation on the server",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/486868/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "1019267",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1019267"
|
||||
"name": "editor-rte-directory-traversal(39868)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39868"
|
||||
},
|
||||
{
|
||||
"name": "28639",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28639"
|
||||
},
|
||||
{
|
||||
"name": "4971",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/4971"
|
||||
},
|
||||
{
|
||||
"name": "27419",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27419"
|
||||
},
|
||||
{
|
||||
"name": "3584",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3584"
|
||||
},
|
||||
{
|
||||
"name" : "editor-rte-directory-traversal(39868)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39868"
|
||||
"name": "http://www.bugreport.ir/?/31",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.bugreport.ir/?/31"
|
||||
},
|
||||
{
|
||||
"name": "1019267",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1019267"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "FREEBSD",
|
||||
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:03.sendfile.asc"
|
||||
},
|
||||
{
|
||||
"name" : "27789",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27789"
|
||||
},
|
||||
{
|
||||
"name": "1019416",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1019416"
|
||||
},
|
||||
{
|
||||
"name": "27789",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27789"
|
||||
},
|
||||
{
|
||||
"name": "28928",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -52,110 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2008-0010.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2008-0010.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3178",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3178"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3179",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3179"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2008-09-24",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200804-20",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200804-28",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200804-28.xml"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200806-11",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0186",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0186.html"
|
||||
},
|
||||
{
|
||||
"name" : "233321",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-233321-1"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2008:018",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA08-066A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-066A.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:9585",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9585"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0770",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0770/references"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-1856",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/1856/references"
|
||||
},
|
||||
{
|
||||
"name" : "1019555",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1019555"
|
||||
},
|
||||
{
|
||||
"name" : "29273",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29273"
|
||||
},
|
||||
{
|
||||
"name" : "29239",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29239"
|
||||
},
|
||||
{
|
||||
"name" : "29582",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29582"
|
||||
},
|
||||
{
|
||||
"name" : "29858",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29858"
|
||||
},
|
||||
{
|
||||
"name": "30676",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30676"
|
||||
},
|
||||
{
|
||||
"name" : "30780",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30780"
|
||||
"name": "1019555",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1019555"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2008:018",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "32018",
|
||||
@ -167,10 +82,95 @@
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41025"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200804-28",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200804-28.xml"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:9585",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9585"
|
||||
},
|
||||
{
|
||||
"name": "29239",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29239"
|
||||
},
|
||||
{
|
||||
"name": "29858",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29858"
|
||||
},
|
||||
{
|
||||
"name": "TA08-066A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-066A.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3178",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3178"
|
||||
},
|
||||
{
|
||||
"name": "29582",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29582"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0770",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0770/references"
|
||||
},
|
||||
{
|
||||
"name": "30780",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30780"
|
||||
},
|
||||
{
|
||||
"name": "233321",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-233321-1"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-1856",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1856/references"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0010.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200804-20",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200806-11",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml"
|
||||
},
|
||||
{
|
||||
"name": "sun-jre-unspecified-priv-escalation(41138)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41138"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0186",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0186.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3179",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3179"
|
||||
},
|
||||
{
|
||||
"name": "29273",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29273"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,21 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/494539/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "4020",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4020"
|
||||
},
|
||||
{
|
||||
"name": "30269",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30269"
|
||||
},
|
||||
{
|
||||
"name": "claroline-unknown-unspecified(43854)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43854"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=613634",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,21 +81,6 @@
|
||||
"name": "http://wiki.claroline.net/index.php/Changelog_1.8.x#Modification_between_claroline_1.8.9_and_1.8.10",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wiki.claroline.net/index.php/Changelog_1.8.x#Modification_between_claroline_1.8.9_and_1.8.10"
|
||||
},
|
||||
{
|
||||
"name" : "30269",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30269"
|
||||
},
|
||||
{
|
||||
"name" : "4020",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4020"
|
||||
},
|
||||
{
|
||||
"name" : "claroline-unknown-unspecified(43854)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43854"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2008-3281",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,49 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[xml] 20080820 Security fix for libxml2",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://mail.gnome.org/archives/xml/2008-August/msg00034.html"
|
||||
},
|
||||
{
|
||||
"name" : "[Security-announce] 20081030 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.vmware.com/pipermail/security-announce/2008/000039.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2008-0017.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=458086",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=458086"
|
||||
},
|
||||
{
|
||||
"name" : "http://svn.gnome.org/viewvc/libxml2?view=revision&revision=3772",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://svn.gnome.org/viewvc/libxml2?view=revision&revision=3772"
|
||||
},
|
||||
{
|
||||
"name" : "http://xmlsoft.org/news.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://xmlsoft.org/news.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://wiki.rpath.com/Advisories:rPSA-2008-0325",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://wiki.rpath.com/Advisories:rPSA-2008-0325"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3613",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3613"
|
||||
"name": "USN-644-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/644-1/"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3639",
|
||||
@ -103,99 +63,9 @@
|
||||
"url": "http://support.apple.com/kb/HT3639"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2009-06-08-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2009-06-17-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1631",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2008/dsa-1631"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-7395",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-7594",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00261.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200812-06",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200812-06.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2008:180",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:180"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2008:192",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:192"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0836",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://rhn.redhat.com/errata/RHSA-2008-0836.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2008:018",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-640-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-640-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-644-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/644-1/"
|
||||
},
|
||||
{
|
||||
"name" : "30783",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30783"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:6496",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6496"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:9812",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9812"
|
||||
},
|
||||
{
|
||||
"name" : "35379",
|
||||
"name": "31855",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/35379"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2843",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2843"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2971",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2971"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2419",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2419"
|
||||
"url": "http://secunia.com/advisories/31855"
|
||||
},
|
||||
{
|
||||
"name": "1020728",
|
||||
@ -203,39 +73,19 @@
|
||||
"url": "http://www.securitytracker.com/id?1020728"
|
||||
},
|
||||
{
|
||||
"name" : "31728",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31728"
|
||||
"name": "ADV-2009-1621",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1621"
|
||||
},
|
||||
{
|
||||
"name" : "31558",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31558"
|
||||
"name": "FEDORA-2008-7395",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.html"
|
||||
},
|
||||
{
|
||||
"name" : "31748",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31748"
|
||||
},
|
||||
{
|
||||
"name" : "31590",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31590"
|
||||
},
|
||||
{
|
||||
"name" : "31855",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31855"
|
||||
},
|
||||
{
|
||||
"name" : "32488",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32488"
|
||||
},
|
||||
{
|
||||
"name" : "31566",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31566"
|
||||
"name": "RHSA-2008:0836",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://rhn.redhat.com/errata/RHSA-2008-0836.html"
|
||||
},
|
||||
{
|
||||
"name": "32807",
|
||||
@ -243,24 +93,174 @@
|
||||
"url": "http://secunia.com/advisories/32807"
|
||||
},
|
||||
{
|
||||
"name" : "32974",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32974"
|
||||
"name": "APPLE-SA-2009-06-08-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "31982",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31982"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2971",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2971"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2843",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2843"
|
||||
},
|
||||
{
|
||||
"name": "http://xmlsoft.org/news.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://xmlsoft.org/news.html"
|
||||
},
|
||||
{
|
||||
"name": "31590",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31590"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1522",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1522"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-1621",
|
||||
"name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "USN-640-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-640-1"
|
||||
},
|
||||
{
|
||||
"name": "31728",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31728"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200812-06",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200812-06.xml"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2009-06-17-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "32488",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32488"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2008:018",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "31566",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31566"
|
||||
},
|
||||
{
|
||||
"name": "30783",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30783"
|
||||
},
|
||||
{
|
||||
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0325",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0325"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:6496",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6496"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2419",
|
||||
"refsource": "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/1621"
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2419"
|
||||
},
|
||||
{
|
||||
"name": "35379",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35379"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2008:192",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:192"
|
||||
},
|
||||
{
|
||||
"name": "32974",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32974"
|
||||
},
|
||||
{
|
||||
"name": "http://svn.gnome.org/viewvc/libxml2?view=revision&revision=3772",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.gnome.org/viewvc/libxml2?view=revision&revision=3772"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-7594",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00261.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1631",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1631"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=458086",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458086"
|
||||
},
|
||||
{
|
||||
"name": "[xml] 20080820 Security fix for libxml2",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://mail.gnome.org/archives/xml/2008-August/msg00034.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:9812",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9812"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2008:180",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:180"
|
||||
},
|
||||
{
|
||||
"name": "31558",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31558"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3613",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3613"
|
||||
},
|
||||
{
|
||||
"name": "[Security-announce] 20081030 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000039.html"
|
||||
},
|
||||
{
|
||||
"name": "31748",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31748"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20080819 wordpress 2.6.1",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/08/19/1"
|
||||
"name": "http://trac.wordpress.org/ticket/7359",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://trac.wordpress.org/ticket/7359"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20080820 Re: wordpress 2.6.1",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/08/20/3"
|
||||
},
|
||||
{
|
||||
"name" : "http://trac.wordpress.org/ticket/7359",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://trac.wordpress.org/ticket/7359"
|
||||
"name": "wordpress-geteditpostlink-info-disclosure(44569)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44569"
|
||||
},
|
||||
{
|
||||
"name": "30750",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/30750"
|
||||
},
|
||||
{
|
||||
"name" : "wordpress-geteditpostlink-info-disclosure(44569)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44569"
|
||||
"name": "[oss-security] 20080819 wordpress 2.6.1",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/08/19/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "dreambox-webinterface-dos(44788)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44788"
|
||||
},
|
||||
{
|
||||
"name": "20080829 [scip_Advisory 3807] Dreambox DM500 webserver long URL request denial of service",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/495837/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080829 [scip_Advisory 3807] Dreambox DM500 webserver long URL request denial of service",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064115.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=3807",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=3807"
|
||||
},
|
||||
{
|
||||
"name" : "30919",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30919"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2472",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2472"
|
||||
},
|
||||
{
|
||||
"name": "1020784",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020784"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2472",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2472"
|
||||
},
|
||||
{
|
||||
"name": "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=3807",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=3807"
|
||||
},
|
||||
{
|
||||
"name": "31650",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31650"
|
||||
},
|
||||
{
|
||||
"name": "30919",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30919"
|
||||
},
|
||||
{
|
||||
"name": "4221",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4221"
|
||||
},
|
||||
{
|
||||
"name" : "dreambox-webinterface-dos(44788)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44788"
|
||||
"name": "20080829 [scip_Advisory 3807] Dreambox DM500 webserver long URL request denial of service",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064115.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2008-4259",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081209 ZDI-08-087: Microsoft Internet Explorer Webdav Request Parsing Heap Corruption Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/499065/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-087/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-087/"
|
||||
"name": "ADV-2008-3385",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3385"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-087",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-087"
|
||||
},
|
||||
{
|
||||
"name" : "MS08-073",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-073"
|
||||
"name": "oval:org.mitre.oval:def:5706",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5706"
|
||||
},
|
||||
{
|
||||
"name": "1021371",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021371"
|
||||
},
|
||||
{
|
||||
"name": "TA08-344A",
|
||||
@ -78,19 +78,19 @@
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-344A.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:5706",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5706"
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-087/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-087/"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-3385",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/3385"
|
||||
"name": "20081209 ZDI-08-087: Microsoft Internet Explorer Webdav Request Parsing Heap Corruption Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/499065/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "1021371",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1021371"
|
||||
"name": "MS08-073",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-073"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://issues.apache.org/jira/browse/XERCESC-1051",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://issues.apache.org/jira/browse/XERCESC-1051"
|
||||
},
|
||||
{
|
||||
"name" : "http://xerces.apache.org/xerces-c/releases.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://xerces.apache.org/xerces-c/releases.html"
|
||||
"name": "xerces-maxoccurs-dos(45596)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45596"
|
||||
},
|
||||
{
|
||||
"name": "31533",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31533"
|
||||
},
|
||||
{
|
||||
"name": "http://xerces.apache.org/xerces-c/releases.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://xerces.apache.org/xerces-c/releases.html"
|
||||
},
|
||||
{
|
||||
"name": "32108",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32108"
|
||||
},
|
||||
{
|
||||
"name" : "xerces-maxoccurs-dos(45596)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45596"
|
||||
"name": "http://issues.apache.org/jira/browse/XERCESC-1051",
|
||||
"refsource": "MISC",
|
||||
"url": "http://issues.apache.org/jira/browse/XERCESC-1051"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://holisticinfosec.org/content/view/90/45/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://holisticinfosec.org/content/view/90/45/"
|
||||
},
|
||||
{
|
||||
"name": "32464",
|
||||
"refsource": "SECUNIA",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "compactcms-unspecified-csrf(46198)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46198"
|
||||
},
|
||||
{
|
||||
"name": "http://holisticinfosec.org/content/view/90/45/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://holisticinfosec.org/content/view/90/45/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "5873",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/5873"
|
||||
},
|
||||
{
|
||||
"name": "29848",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29848"
|
||||
},
|
||||
{
|
||||
"name": "5873",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5873"
|
||||
},
|
||||
{
|
||||
"name": "lnp-admin-security-bypass(43225)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-3415",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2013-3588",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2013-3595",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-6699",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-6735",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,55 +52,55 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "56161",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/56161"
|
||||
},
|
||||
{
|
||||
"name": "20131227 SEC Consult SA-20131227-0 :: IBM Web Content Manager (WCM) XPath Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/530552/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/124611/IBM-Web-Content-Manager-XPath-Injection.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/124611/IBM-Web-Content-Manager-XPath-Injection.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21660289",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21660289"
|
||||
},
|
||||
{
|
||||
"name" : "https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_fix_available_for_unauthorized_information_retrieval_security_vulnerability_in_ibm_websphere_portal_cve_2013_6735",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_fix_available_for_unauthorized_information_retrieval_security_vulnerability_in_ibm_websphere_portal_cve_2013_6735"
|
||||
},
|
||||
{
|
||||
"name" : "PI07777",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PI07777"
|
||||
},
|
||||
{
|
||||
"name": "64496",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/64496"
|
||||
},
|
||||
{
|
||||
"name": "ibm-wsportal-cve20136735-jcr(89591)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89591"
|
||||
},
|
||||
{
|
||||
"name": "101255",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/101255"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21660289",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660289"
|
||||
},
|
||||
{
|
||||
"name": "PI07777",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI07777"
|
||||
},
|
||||
{
|
||||
"name": "https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_fix_available_for_unauthorized_information_retrieval_security_vulnerability_in_ibm_websphere_portal_cve_2013_6735",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_fix_available_for_unauthorized_information_retrieval_security_vulnerability_in_ibm_websphere_portal_cve_2013_6735"
|
||||
},
|
||||
{
|
||||
"name": "1029539",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029539"
|
||||
},
|
||||
{
|
||||
"name" : "56161",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/56161"
|
||||
},
|
||||
{
|
||||
"name" : "ibm-wsportal-cve20136735-jcr(89591)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/89591"
|
||||
"name": "http://packetstormsecurity.com/files/124611/IBM-Web-Content-Manager-XPath-Injection.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/124611/IBM-Web-Content-Manager-XPath-Injection.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://service.sap.com/sap/support/notes/1784894",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://service.sap.com/sap/support/notes/1784894"
|
||||
},
|
||||
{
|
||||
"name": "https://erpscan.io/advisories/dsecrg-13-006-sap-netweaver-performance-provider-xss/",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://scn.sap.com/docs/DOC-8218",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://scn.sap.com/docs/DOC-8218"
|
||||
},
|
||||
{
|
||||
"name" : "https://service.sap.com/sap/support/notes/1784894",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://service.sap.com/sap/support/notes/1784894"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,16 +53,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "101374",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101374"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "1039605",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.nttdocomo.co.jp/info/notice/page/170710_01_m.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.nttdocomo.co.jp/info/notice/page/170710_01_m.html"
|
||||
},
|
||||
{
|
||||
"name": "JVN#03044183",
|
||||
"refsource": "JVN",
|
||||
"url": "https://jvn.jp/en/jp/JVN03044183/index.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.nttdocomo.co.jp/info/notice/page/170710_01_m.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.nttdocomo.co.jp/info/notice/page/170710_01_m.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@microfocus.com",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"ID": "CVE-2017-14349",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://softwaresupport.hpe.com/km/KM02948051",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://softwaresupport.hpe.com/km/KM02948051"
|
||||
},
|
||||
{
|
||||
"name": "ESB-2017.2414",
|
||||
"refsource": "AUSCERT",
|
||||
"url": "https://www.auscert.org.au/bulletins/52758"
|
||||
},
|
||||
{
|
||||
"name": "https://softwaresupport.hpe.com/km/KM02948051",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://softwaresupport.hpe.com/km/KM02948051"
|
||||
},
|
||||
{
|
||||
"name": "100989",
|
||||
"refsource": "BID",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-17208",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20171223 [SECURITY] [DLA 1220-1] gimp security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.openwall.com/lists/oss-security/2017/12/19/5",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2017/12/19/5"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=790853",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=790853"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4077",
|
||||
"refsource": "DEBIAN",
|
||||
@ -76,6 +61,21 @@
|
||||
"name": "USN-3539-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3539-1/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.openwall.com/lists/oss-security/2017/12/19/5",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/12/19/5"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20171223 [SECURITY] [DLA 1220-1] gimp security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=790853",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=790853"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "42391",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/42391/"
|
||||
},
|
||||
{
|
||||
"name": "http://seclists.org/fulldisclosure/2017/Jul/66",
|
||||
"refsource": "MISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/66"
|
||||
},
|
||||
{
|
||||
"name": "42391",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/42391/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cybersecurity@se.com",
|
||||
"ASSIGNER": "cybersecurity@schneider-electric.com",
|
||||
"DATE_PUBLIC": "2018-02-12T00:00:00",
|
||||
"ID": "CVE-2017-9968",
|
||||
"STATE": "PUBLIC"
|
||||
@ -53,11 +53,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-046-03",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-046-03"
|
||||
},
|
||||
{
|
||||
"name": "https://www.schneider-electric.com/en/download/document/SEVD-2018-039-02/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,6 +62,11 @@
|
||||
"name": "103048",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103048"
|
||||
},
|
||||
{
|
||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-046-03",
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-046-03"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -67,16 +67,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20181017 Cisco Wireless LAN Controller Software Directory Traversal Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-traversal"
|
||||
},
|
||||
{
|
||||
"name": "105671",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105671"
|
||||
},
|
||||
{
|
||||
"name": "20181017 Cisco Wireless LAN Controller Software Directory Traversal Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-traversal"
|
||||
},
|
||||
{
|
||||
"name": "1041926",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "1/18/2018 7:01:42",
|
||||
"ID": "CVE-2018-1000026",
|
||||
"REQUESTER": "dja@axtens.net",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Linux kernel",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "at least v4.8 onwards, probably well before"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Linux"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Insufficient input validation"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -54,45 +54,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[netdev] 20180116 http://lists.openwall.net/netdev/2018/01/16/40",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.openwall.net/netdev/2018/01/16/40"
|
||||
},
|
||||
{
|
||||
"name" : "[netdev] 20180118 http://lists.openwall.net/netdev/2018/01/18/96",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.openwall.net/netdev/2018/01/18/96"
|
||||
},
|
||||
{
|
||||
"name" : "https://patchwork.ozlabs.org/patch/859410/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://patchwork.ozlabs.org/patch/859410/"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:2948",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:2948"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:3083",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3083"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:3096",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:3096"
|
||||
},
|
||||
{
|
||||
"name": "USN-3617-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3617-1/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3617-2",
|
||||
"name": "USN-3619-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3617-2/"
|
||||
"url": "https://usn.ubuntu.com/3619-2/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3617-3",
|
||||
@ -100,14 +75,9 @@
|
||||
"url": "https://usn.ubuntu.com/3617-3/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3619-1",
|
||||
"name": "USN-3632-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3619-1/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3620-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3620-1/"
|
||||
"url": "https://usn.ubuntu.com/3632-1/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3620-2",
|
||||
@ -115,14 +85,44 @@
|
||||
"url": "https://usn.ubuntu.com/3620-2/"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3619-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3619-2/"
|
||||
"name": "RHSA-2018:2948",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3632-1",
|
||||
"name": "https://patchwork.ozlabs.org/patch/859410/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://patchwork.ozlabs.org/patch/859410/"
|
||||
},
|
||||
{
|
||||
"name": "[netdev] 20180116 http://lists.openwall.net/netdev/2018/01/16/40",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.openwall.net/netdev/2018/01/16/40"
|
||||
},
|
||||
{
|
||||
"name": "USN-3617-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3632-1/"
|
||||
"url": "https://usn.ubuntu.com/3617-2/"
|
||||
},
|
||||
{
|
||||
"name": "[netdev] 20180118 http://lists.openwall.net/netdev/2018/01/18/96",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.openwall.net/netdev/2018/01/18/96"
|
||||
},
|
||||
{
|
||||
"name": "USN-3620-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3620-1/"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:3096",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3096"
|
||||
},
|
||||
{
|
||||
"name": "USN-3619-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3619-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-06-05T12:46:01.940841",
|
||||
"DATE_REQUESTED": "2018-06-05T00:00:00",
|
||||
"ID": "CVE-2018-1000184",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins GitHub Plugin",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.29.0 and older"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins project"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-441, CWE-918"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-06-23T11:22:33.086803",
|
||||
"DATE_REQUESTED": "2018-04-09T15:53:11",
|
||||
"ID": "CVE-2018-1000558",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "ocsreports 2.4 and ocsreports 2.3.1",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.4 and 2.3.1"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "OCS Inventory NG"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "SQL Injection"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-16103",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "46375",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/46375/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/domainmod/domainmod/issues/87",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/domainmod/domainmod/issues/87"
|
||||
},
|
||||
{
|
||||
"name": "46375",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/46375/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,9 +86,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10739027",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10739027"
|
||||
"name": "ibm-curam-cve20181654-open-redirect(144747)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/144747"
|
||||
},
|
||||
{
|
||||
"name": "106187",
|
||||
@ -96,9 +96,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/106187"
|
||||
},
|
||||
{
|
||||
"name" : "ibm-curam-cve20181654-open-redirect(144747)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/144747"
|
||||
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10739027",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10739027"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
|
||||
},
|
||||
{
|
||||
"name" : "102994",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/102994"
|
||||
},
|
||||
{
|
||||
"name": "1040364",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040364"
|
||||
},
|
||||
{
|
||||
"name": "102994",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102994"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user