mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
be57268794
commit
02ec11aeaf
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "webmin-dot-directory-traversal(7711)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/7711.php"
|
||||
},
|
||||
{
|
||||
"name": "20011217 webmin 0.91 ../.. problem",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/245980"
|
||||
},
|
||||
{
|
||||
"name" : "20011218 Re: webmin 0.91 ../.. problem",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=webmin-l&m=100865390306103&w=2"
|
||||
},
|
||||
{
|
||||
"name": "3698",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/3698"
|
||||
},
|
||||
{
|
||||
"name" : "webmin-dot-directory-traversal(7711)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/7711.php"
|
||||
"name": "20011218 Re: webmin 0.91 ../.. problem",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=webmin-l&m=100865390306103&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://archives.neohapsis.com/archives/apps/freshmeat/2006-05/0002.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://archives.neohapsis.com/archives/apps/freshmeat/2006-05/0002.html"
|
||||
},
|
||||
{
|
||||
"name" : "17957",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/17957"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1777",
|
||||
"refsource": "VUPEN",
|
||||
@ -72,10 +62,20 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/25194"
|
||||
},
|
||||
{
|
||||
"name": "http://archives.neohapsis.com/archives/apps/freshmeat/2006-05/0002.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://archives.neohapsis.com/archives/apps/freshmeat/2006-05/0002.html"
|
||||
},
|
||||
{
|
||||
"name": "chirpy-script-sql-injection(26418)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26418"
|
||||
},
|
||||
{
|
||||
"name": "17957",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17957"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060507 X-POLL admin By-Pass",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/433220/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "\"X-POLL admin By-Pass\" - standard PHP upload?",
|
||||
"refsource" : "VIM",
|
||||
"url" : "http://attrition.org/pipermail/vim/2006-May/000752.html"
|
||||
"name": "xpoll-add-file-upload(26363)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26363"
|
||||
},
|
||||
{
|
||||
"name": "17901",
|
||||
@ -68,14 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/17901"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1732",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1732"
|
||||
},
|
||||
{
|
||||
"name" : "20057",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20057"
|
||||
"name": "\"X-POLL admin By-Pass\" - standard PHP upload?",
|
||||
"refsource": "VIM",
|
||||
"url": "http://attrition.org/pipermail/vim/2006-May/000752.html"
|
||||
},
|
||||
{
|
||||
"name": "872",
|
||||
@ -83,9 +73,19 @@
|
||||
"url": "http://securityreason.com/securityalert/872"
|
||||
},
|
||||
{
|
||||
"name" : "xpoll-add-file-upload(26363)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26363"
|
||||
"name": "20057",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20057"
|
||||
},
|
||||
{
|
||||
"name": "20060507 X-POLL admin By-Pass",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/433220/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-1732",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1732"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2006-2598",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,11 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1007",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1007"
|
||||
},
|
||||
{
|
||||
"name": "20060528 Advisory: UBBThreads 5.x,6.x Multiple File InclusionVulnerabilities.",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/435288/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ubbthreads-index-xss(26870)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26870"
|
||||
},
|
||||
{
|
||||
"name": "20060529 UBBThreads 5.x,6.x md5 hash disclosure",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -71,16 +81,6 @@
|
||||
"name": "18152",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18152"
|
||||
},
|
||||
{
|
||||
"name" : "1007",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1007"
|
||||
},
|
||||
{
|
||||
"name" : "ubbthreads-index-xss(26870)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26870"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "1883",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/1883"
|
||||
},
|
||||
{
|
||||
"name" : "18291",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18291"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-2167",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/2167"
|
||||
"name": "wikiwig-wklang-file-include(26942)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26942"
|
||||
},
|
||||
{
|
||||
"name": "20487",
|
||||
@ -73,9 +63,19 @@
|
||||
"url": "http://secunia.com/advisories/20487"
|
||||
},
|
||||
{
|
||||
"name" : "wikiwig-wklang-file-include(26942)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26942"
|
||||
"name": "18291",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18291"
|
||||
},
|
||||
{
|
||||
"name": "1883",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/1883"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2167",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2167"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060605 FunkBoard CF0.71 (profile.php) Remote User Pass Change Exploit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/435987/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.funkboard.co.uk/forum/thread.php?id=302",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,6 +62,21 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/1875"
|
||||
},
|
||||
{
|
||||
"name": "funkboard-profile-password-modification(26912)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26912"
|
||||
},
|
||||
{
|
||||
"name": "1066",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1066"
|
||||
},
|
||||
{
|
||||
"name": "20060605 FunkBoard CF0.71 (profile.php) Remote User Pass Change Exploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/435987/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2158",
|
||||
"refsource": "VUPEN",
|
||||
@ -76,16 +86,6 @@
|
||||
"name": "20433",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20433"
|
||||
},
|
||||
{
|
||||
"name" : "1066",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1066"
|
||||
},
|
||||
{
|
||||
"name" : "funkboard-profile-password-modification(26912)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26912"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "efone-config-information-disclosure(27574)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27574"
|
||||
},
|
||||
{
|
||||
"name": "1192",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1192"
|
||||
},
|
||||
{
|
||||
"name": "20902",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20902"
|
||||
},
|
||||
{
|
||||
"name": "20060703 5 php scripts remote database password disclosure",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -66,21 +81,6 @@
|
||||
"name": "ADV-2006-2664",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2664"
|
||||
},
|
||||
{
|
||||
"name" : "20902",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20902"
|
||||
},
|
||||
{
|
||||
"name" : "1192",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1192"
|
||||
},
|
||||
{
|
||||
"name" : "efone-config-information-disclosure(27574)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27574"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,46 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060706 WebEx ActiveX Control DLL Injection",
|
||||
"refsource" : "ISS",
|
||||
"url" : "http://xforce.iss.net/xforce/alerts/id/226"
|
||||
},
|
||||
{
|
||||
"name" : "20060707 ZDI-06-021: WebEx Downloader Plug-in Code Execution Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/439496/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-06-021.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-06-021.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.webex.com/lp/security/ActiveAdv.html?TrackID=123456",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.webex.com/lp/security/ActiveAdv.html?TrackID=123456"
|
||||
},
|
||||
{
|
||||
"name" : "18860",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18860"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2688",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2688"
|
||||
},
|
||||
{
|
||||
"name" : "27039",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/27039"
|
||||
},
|
||||
{
|
||||
"name" : "27040",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/27040"
|
||||
},
|
||||
{
|
||||
"name": "1016446",
|
||||
"refsource": "SECTRACK",
|
||||
@ -102,10 +67,45 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20956"
|
||||
},
|
||||
{
|
||||
"name": "20060706 WebEx ActiveX Control DLL Injection",
|
||||
"refsource": "ISS",
|
||||
"url": "http://xforce.iss.net/xforce/alerts/id/226"
|
||||
},
|
||||
{
|
||||
"name": "web-conferencing-code-injection(24370)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24370"
|
||||
},
|
||||
{
|
||||
"name": "20060707 ZDI-06-021: WebEx Downloader Plug-in Code Execution Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/439496/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "27040",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/27040"
|
||||
},
|
||||
{
|
||||
"name": "18860",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18860"
|
||||
},
|
||||
{
|
||||
"name": "http://www.webex.com/lp/security/ActiveAdv.html?TrackID=123456",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.webex.com/lp/security/ActiveAdv.html?TrackID=123456"
|
||||
},
|
||||
{
|
||||
"name": "27039",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/27039"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-06-021.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "102462",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102462-1"
|
||||
},
|
||||
{
|
||||
"name" : "18972",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18972"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-2799",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/2799"
|
||||
"name": "21047",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21047"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:1921",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1921"
|
||||
},
|
||||
{
|
||||
"name" : "1016494",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016494"
|
||||
},
|
||||
{
|
||||
"name" : "21047",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21047"
|
||||
},
|
||||
{
|
||||
"name": "solaris-ypserv-dos(27722)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27722"
|
||||
},
|
||||
{
|
||||
"name": "18972",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18972"
|
||||
},
|
||||
{
|
||||
"name": "102462",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102462-1"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2799",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2799"
|
||||
},
|
||||
{
|
||||
"name": "1016494",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016494"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060723 Buffer-overflow in the XM loader of Cheese Tracker 0.9.9",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/440962/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://aluigi.altervista.org/adv/cheesebof-adv.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://aluigi.altervista.org/adv/cheesebof-adv.txt"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1166",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1166"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200610-13",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200610-13.xml"
|
||||
},
|
||||
{
|
||||
"name": "19115",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19115"
|
||||
},
|
||||
{
|
||||
"name" : "21759",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21759"
|
||||
},
|
||||
{
|
||||
"name" : "22643",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22643"
|
||||
},
|
||||
{
|
||||
"name": "1291",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1291"
|
||||
},
|
||||
{
|
||||
"name": "http://aluigi.altervista.org/adv/cheesebof-adv.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://aluigi.altervista.org/adv/cheesebof-adv.txt"
|
||||
},
|
||||
{
|
||||
"name": "21759",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21759"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200610-13",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200610-13.xml"
|
||||
},
|
||||
{
|
||||
"name": "20060723 Buffer-overflow in the XM loader of Cheese Tracker 0.9.9",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/440962/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1166",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1166"
|
||||
},
|
||||
{
|
||||
"name": "cheesetronic-loaderxm-bo(27957)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27957"
|
||||
},
|
||||
{
|
||||
"name": "22643",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22643"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,41 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061114 A-Cart pro[ injection sql (post&get)]",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/451594/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061118 A-Cart PRO SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/452006/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20061118 Re: A-Cart PRO SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/452023/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://s-a-p.ca/index.php?page=OurAdvisories&id=27",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://s-a-p.ca/index.php?page=OurAdvisories&id=27"
|
||||
},
|
||||
{
|
||||
"name" : "21166",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21166"
|
||||
},
|
||||
{
|
||||
"name" : "32750",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/32750"
|
||||
},
|
||||
{
|
||||
"name": "32751",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32751"
|
||||
},
|
||||
{
|
||||
"name": "20061114 A-Cart pro[ injection sql (post&get)]",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/451594/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "acart-category-product-sql-injection(30279)",
|
||||
"refsource": "XF",
|
||||
@ -96,6 +76,26 @@
|
||||
"name": "acart-search-sql-injection(30280)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30280"
|
||||
},
|
||||
{
|
||||
"name": "21166",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21166"
|
||||
},
|
||||
{
|
||||
"name": "20061118 A-Cart PRO SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/452006/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://s-a-p.ca/index.php?page=OurAdvisories&id=27",
|
||||
"refsource": "MISC",
|
||||
"url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=27"
|
||||
},
|
||||
{
|
||||
"name": "32750",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/32750"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061204 Re: UPublisher Exploit - Superfreaker",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/453462/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "22840",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22840"
|
||||
},
|
||||
{
|
||||
"name": "20061204 Re: UPublisher Exploit - Superfreaker",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/453462/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://bugs.kde.org/show_bug.cgi?id=138499",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://bugs.kde.org/show_bug.cgi?id=138499"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=166901",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=166901"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200703-11",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200703-11.xml"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2007:002",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0015.html"
|
||||
},
|
||||
{
|
||||
"name" : "22568",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/22568"
|
||||
"name": "23984",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23984"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-0613",
|
||||
@ -83,19 +63,39 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0613"
|
||||
},
|
||||
{
|
||||
"name" : "23984",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23984"
|
||||
"name": "SUSE-SR:2007:002",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.suse.com/archive/suse-security-announce/2007-Jan/0015.html"
|
||||
},
|
||||
{
|
||||
"name" : "24159",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24159"
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=166901",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=166901"
|
||||
},
|
||||
{
|
||||
"name": "24510",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24510"
|
||||
},
|
||||
{
|
||||
"name": "22568",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/22568"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.kde.org/show_bug.cgi?id=138499",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.kde.org/show_bug.cgi?id=138499"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200703-11",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200703-11.xml"
|
||||
},
|
||||
{
|
||||
"name": "24159",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24159"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2011-0156",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4554",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4554"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4564",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,6 +62,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4566"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:17191",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17191"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-03-02-1",
|
||||
"refsource": "APPLE",
|
||||
@ -77,15 +77,15 @@
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4554",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4554"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-03-09-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:17191",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17191"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2011-0207",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-0561",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,60 +53,25 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-02.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-02.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash2"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:0206",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0206.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:0259",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0259.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:0368",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0368.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2011:009",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#812969",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/812969"
|
||||
},
|
||||
{
|
||||
"name" : "46189",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/46189"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:14169",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14169"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:15930",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15930"
|
||||
"name": "ADV-2011-0348",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0348"
|
||||
},
|
||||
{
|
||||
"name": "1025055",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1025055"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0646",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0646"
|
||||
},
|
||||
{
|
||||
"name": "VU#812969",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/812969"
|
||||
},
|
||||
{
|
||||
"name": "43267",
|
||||
"refsource": "SECUNIA",
|
||||
@ -118,9 +83,9 @@
|
||||
"url": "http://secunia.com/advisories/43292"
|
||||
},
|
||||
{
|
||||
"name" : "43340",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43340"
|
||||
"name": "46189",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/46189"
|
||||
},
|
||||
{
|
||||
"name": "43351",
|
||||
@ -128,29 +93,64 @@
|
||||
"url": "http://secunia.com/advisories/43351"
|
||||
},
|
||||
{
|
||||
"name" : "43747",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43747"
|
||||
"name": "oval:org.mitre.oval:def:14169",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14169"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0348",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0348"
|
||||
"name": "43340",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43340"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0383",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0383"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb11-02.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb11-02.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:15930",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15930"
|
||||
},
|
||||
{
|
||||
"name": "43747",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43747"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0402",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0402"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0646",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0646"
|
||||
"name": "RHSA-2011:0259",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0259.html"
|
||||
},
|
||||
{
|
||||
"name": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash2",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0206",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0206.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2011:009",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:0368",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-0368.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,55 +52,55 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/mac/1101/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/mac/1101/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/unix/1101/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/unix/1101/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/windows/1101/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/windows/1101/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.opera.com/support/kb/view/986/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/support/kb/view/986/"
|
||||
},
|
||||
{
|
||||
"name" : "46036",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/46036"
|
||||
},
|
||||
{
|
||||
"name" : "70731",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/70731"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:12507",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12507"
|
||||
},
|
||||
{
|
||||
"name" : "43023",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43023"
|
||||
"name": "http://www.opera.com/support/kb/view/986/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/support/kb/view/986/"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0231",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0231"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/unix/1101/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/unix/1101/"
|
||||
},
|
||||
{
|
||||
"name": "46036",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/46036"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/mac/1101/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/mac/1101/"
|
||||
},
|
||||
{
|
||||
"name": "opera-passwords-sec-bypass(65018)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65018"
|
||||
},
|
||||
{
|
||||
"name": "70731",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/70731"
|
||||
},
|
||||
{
|
||||
"name": "43023",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43023"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=70376",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=70376"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html"
|
||||
"name": "google-chrome-pickle-dos(65731)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65731"
|
||||
},
|
||||
{
|
||||
"name": "46614",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13935"
|
||||
},
|
||||
{
|
||||
"name" : "google-chrome-pickle-dos(65731)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65731"
|
||||
"name": "http://code.google.com/p/chromium/issues/detail?id=70376",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=70376"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=76666"
|
||||
},
|
||||
{
|
||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=77507",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=77507"
|
||||
},
|
||||
{
|
||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=78031",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=78031"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -81,6 +71,16 @@
|
||||
"name": "chrome-navigation-spoofing(67153)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67153"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/chromium/issues/detail?id=77507",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=77507"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/chromium/issues/detail?id=78031",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=78031"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2011-2228",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://code.google.com/p/chromium/issues/detail?id=122337",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://code.google.com/p/chromium/issues/detail?id=122337"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201205-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201205-03.xml"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2012:0656",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name" : "53540",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/53540"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:15610",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15610"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2012:0656",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name": "1027067",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1027067"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name": "53540",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53540"
|
||||
},
|
||||
{
|
||||
"name": "chrome-v8regex-code-exec(75597)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75597"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/chromium/issues/detail?id=122337",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/chromium/issues/detail?id=122337"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[Xen-devel] 20110616 IOMMU faults",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://old-list-archives.xen.org/archives/html/xen-devel/2011-06/msg01106.html"
|
||||
},
|
||||
{
|
||||
"name" : "[Xen-devel] 20110812 Xen Advisory 5 (CVE-2011-3131) IOMMU fault livelock",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://old-list-archives.xen.org/archives/html/xen-devel/2011-08/msg00450.html"
|
||||
},
|
||||
{
|
||||
"name": "http://xenbits.xen.org/hg/staging/xen-4.1-testing.hg/rev/84e3706df07a",
|
||||
"refsource": "CONFIRM",
|
||||
@ -72,20 +62,30 @@
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2582"
|
||||
},
|
||||
{
|
||||
"name" : "49146",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/49146"
|
||||
},
|
||||
{
|
||||
"name": "45622",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/45622"
|
||||
},
|
||||
{
|
||||
"name": "[Xen-devel] 20110812 Xen Advisory 5 (CVE-2011-3131) IOMMU fault livelock",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://old-list-archives.xen.org/archives/html/xen-devel/2011-08/msg00450.html"
|
||||
},
|
||||
{
|
||||
"name": "51468",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51468"
|
||||
},
|
||||
{
|
||||
"name": "[Xen-devel] 20110616 IOMMU faults",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://old-list-archives.xen.org/archives/html/xen-devel/2011-06/msg01106.html"
|
||||
},
|
||||
{
|
||||
"name": "49146",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/49146"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2011-4263",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "JVN#61695284",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/en/jp/JVN61695284/index.html"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2011-000100",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000100"
|
||||
},
|
||||
{
|
||||
"name": "JVN#61695284",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN61695284/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://code.google.com/p/owasp-java-html-sanitizer/wiki/CVE20114457",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://code.google.com/p/owasp-java-html-sanitizer/wiki/CVE20114457"
|
||||
},
|
||||
{
|
||||
"name": "http://owasp-java-html-sanitizer.googlecode.com/svn/trunk/CHANGE_LOG.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://owasp-java-html-sanitizer.googlecode.com/svn/trunk/CHANGE_LOG.html"
|
||||
},
|
||||
{
|
||||
"name": "http://code.google.com/p/owasp-java-html-sanitizer/wiki/CVE20114457",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://code.google.com/p/owasp-java-html-sanitizer/wiki/CVE20114457"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2011-4514",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf"
|
||||
},
|
||||
{
|
||||
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf"
|
||||
},
|
||||
{
|
||||
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-1318",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS13-042",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-042"
|
||||
},
|
||||
{
|
||||
"name": "TA13-134A",
|
||||
"refsource": "CERT",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "oval:org.mitre.oval:def:16682",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16682"
|
||||
},
|
||||
{
|
||||
"name": "MS13-042",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-042"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2013-5136",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-5443",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21667626",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21667626"
|
||||
},
|
||||
{
|
||||
"name": "ibm-cognos-cve20135443-csrf(87819)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87819"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21667626",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21667626"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"ID": "CVE-2014-2346",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
|
||||
},
|
||||
{
|
||||
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-154-01",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,60 +53,30 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[security-announce] 20140315 Announce: OpenSSH 6.6 released",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2"
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
|
||||
},
|
||||
{
|
||||
"name": "59855",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/59855"
|
||||
},
|
||||
{
|
||||
"name": "57574",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/57574"
|
||||
},
|
||||
{
|
||||
"name": "http://advisories.mageia.org/MGASA-2014-0143.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://advisories.mageia.org/MGASA-2014-0143.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205267",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205267"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-09-30-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2894",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2894"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2014-6380",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2014-6569",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX03188",
|
||||
"refsource": "HP",
|
||||
@ -118,9 +88,9 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=141576985122836&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2014:068",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2014:068"
|
||||
"name": "57488",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/57488"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2015:095",
|
||||
@ -128,34 +98,9 @@
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:095"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:1552",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1552.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2155-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2155-1"
|
||||
},
|
||||
{
|
||||
"name" : "66355",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/66355"
|
||||
},
|
||||
{
|
||||
"name" : "1029925",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1029925"
|
||||
},
|
||||
{
|
||||
"name" : "57488",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/57488"
|
||||
},
|
||||
{
|
||||
"name" : "57574",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/57574"
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
|
||||
},
|
||||
{
|
||||
"name": "59313",
|
||||
@ -163,14 +108,69 @@
|
||||
"url": "http://secunia.com/advisories/59313"
|
||||
},
|
||||
{
|
||||
"name" : "59855",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/59855"
|
||||
"name": "https://support.apple.com/HT205267",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205267"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2014-6380",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2894",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2894"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:1552",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-1552.html"
|
||||
},
|
||||
{
|
||||
"name": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc"
|
||||
},
|
||||
{
|
||||
"name": "1029925",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1029925"
|
||||
},
|
||||
{
|
||||
"name": "[security-announce] 20140315 Announce: OpenSSH 6.6 released",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=openbsd-security-announce&m=139492048027313&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2155-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2155-1"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2014-6569",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html"
|
||||
},
|
||||
{
|
||||
"name": "openssh-cve20142532-sec-bypass(91986)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91986"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2014:068",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:068"
|
||||
},
|
||||
{
|
||||
"name": "66355",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/66355"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "disable-comments-wordpress-csrf(92219)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92219"
|
||||
},
|
||||
{
|
||||
"name": "https://security.dxw.com/advisories/csrf-in-disable-comments-1-0-3/",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "https://wordpress.org/plugins/disable-comments/#developers",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wordpress.org/plugins/disable-comments/#developers"
|
||||
},
|
||||
{
|
||||
"name" : "disable-comments-wordpress-csrf(92219)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/92219"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2014-2633",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBMU03079",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101654",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
|
||||
},
|
||||
{
|
||||
"name": "69376",
|
||||
"refsource": "BID",
|
||||
@ -72,6 +62,11 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1030756"
|
||||
},
|
||||
{
|
||||
"name": "hp-service-cve20142633-csrf(95449)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95449"
|
||||
},
|
||||
{
|
||||
"name": "60028",
|
||||
"refsource": "SECUNIA",
|
||||
@ -83,9 +78,14 @@
|
||||
"url": "http://secunia.com/advisories/60714"
|
||||
},
|
||||
{
|
||||
"name" : "hp-service-cve20142633-csrf(95449)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95449"
|
||||
"name": "SSRT101654",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMU03079",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,44 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20140419 CVE request / advisory: gdomap (GNUstep core package <= 1.24.6)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2014/q2/143"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20140421 Re: CVE request / advisory: gdomap (GNUstep core package <= 1.24.6)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2014/q2/152"
|
||||
},
|
||||
{
|
||||
"name" : "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/ChangeLog?r1=37756&r2=37755&pathrev=37756",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/ChangeLog?r1=37756&r2=37755&pathrev=37756"
|
||||
},
|
||||
{
|
||||
"name" : "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/Tools/gdomap.c?r1=37756&r2=37755&pathrev=37756",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/Tools/gdomap.c?r1=37756&r2=37755&pathrev=37756"
|
||||
"name": "gnustep-cve20142980-dos(92688)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92688"
|
||||
},
|
||||
{
|
||||
"name": "https://savannah.gnu.org/bugs/?41751",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://savannah.gnu.org/bugs/?41751"
|
||||
},
|
||||
{
|
||||
"name": "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/Tools/gdomap.c?r1=37756&r2=37755&pathrev=37756",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/Tools/gdomap.c?r1=37756&r2=37755&pathrev=37756"
|
||||
},
|
||||
{
|
||||
"name": "66992",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/66992"
|
||||
},
|
||||
{
|
||||
"name": "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/ChangeLog?r1=37756&r2=37755&pathrev=37756",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/ChangeLog?r1=37756&r2=37755&pathrev=37756"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140421 Re: CVE request / advisory: gdomap (GNUstep core package <= 1.24.6)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q2/152"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140419 CVE request / advisory: gdomap (GNUstep core package <= 1.24.6)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2014/q2/143"
|
||||
},
|
||||
{
|
||||
"name": "58104",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/58104"
|
||||
},
|
||||
{
|
||||
"name" : "gnustep-cve20142980-dos(92688)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/92688"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-6856",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
"name": "VU#777769",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/777769"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name" : "VU#777769",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/777769"
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7499",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#256545",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "41652",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/41652/"
|
||||
},
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0089",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0089"
|
||||
},
|
||||
{
|
||||
"name": "96606",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96606"
|
||||
},
|
||||
{
|
||||
"name": "41652",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/41652/"
|
||||
},
|
||||
{
|
||||
"name": "1037992",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037992"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0089",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0089"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"DATE_PUBLIC": "2017-07-05T00:00:00",
|
||||
"ID": "CVE-2017-0682",
|
||||
"STATE": "PUBLIC"
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.361497",
|
||||
"ID": "CVE-2017-1000150",
|
||||
"REQUESTER": "info@mahara.org",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Mahara",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "<15.04.7, <15.10.3"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Mahara"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Sessions"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-12-29",
|
||||
"ID": "CVE-2017-1000443",
|
||||
"REQUESTER": "boothf@boothlabs.me",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Openhacker",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "0.1.47"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Eleix (Francis Booth)"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-79"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -54,15 +54,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/Eleix/openhacker/commit/9da5c237ba5e2311f01edc83389bc5aaf0a9885c",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/Eleix/openhacker/commit/9da5c237ba5e2311f01edc83389bc5aaf0a9885c"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Eleix/openhacker/issues/5",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/Eleix/openhacker/issues/5"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Eleix/openhacker/commit/9da5c237ba5e2311f01edc83389bc5aaf0a9885c",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/Eleix/openhacker/commit/9da5c237ba5e2311f01edc83389bc5aaf0a9885c"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -68,15 +68,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/123670",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/123670"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22007160",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22007160"
|
||||
},
|
||||
{
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/123670",
|
||||
"refsource": "MISC",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/123670"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -100,15 +100,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www-01.ibm.com/support/docview.wss?uid=ibm10724511",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www-01.ibm.com/support/docview.wss?uid=ibm10724511"
|
||||
},
|
||||
{
|
||||
"name": "ibm-bigfix-cve20171231-info-disc(123910)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/123910"
|
||||
},
|
||||
{
|
||||
"name": "https://www-01.ibm.com/support/docview.wss?uid=ibm10724511",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10724511"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4585",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4811",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.vmware.com/security/advisories/VMSA-2017-0003.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vmware.com/security/advisories/VMSA-2017-0003.html"
|
||||
},
|
||||
{
|
||||
"name": "96771",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96771"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2017-0003.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2017-0003.html"
|
||||
},
|
||||
{
|
||||
"name": "1037979",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -58,6 +58,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1309282"
|
||||
},
|
||||
{
|
||||
"name": "1037693",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037693"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2017-01/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,11 +72,6 @@
|
||||
"name": "95763",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95763"
|
||||
},
|
||||
{
|
||||
"name" : "1037693",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1037693"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user