"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:05:52 +00:00
parent c229d62842
commit 06741a5133
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
66 changed files with 4619 additions and 4619 deletions

View File

@ -52,16 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "20010107 Cgisecurity.com Advisory #3.1",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=97905792214999&w=2"
},
{
"name": "http://www.extropia.com/hacks/bbs_security.html",
"refsource": "CONFIRM",
"url": "http://www.extropia.com/hacks/bbs_security.html"
},
{
"name": "3546",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/3546"
},
{
"name": "20010107 Cgisecurity.com Advisory #3.1",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=97905792214999&w=2"
},
{
"name": "2177",
"refsource": "BID",
@ -71,11 +76,6 @@
"name": "http-cgi-bbs-forum(5906)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5906"
},
{
"name" : "3546",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/3546"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20010125 ecepass - proof of concept code for FreeBSD ipfw bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.security-express.com/archives/bugtraq/2001-01/0424.html"
},
{
"name" : "FreeBSD-SA-01:08",
"refsource" : "FREEBSD",
"url" : "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:08.ipfw.asc"
"name": "2293",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2293"
},
{
"name": "L-029",
@ -68,19 +63,24 @@
"url": "http://www.ciac.org/ciac/bulletins/l-029.shtml"
},
{
"name" : "2293",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2293"
},
{
"name" : "1743",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/1743"
"name": "20010125 ecepass - proof of concept code for FreeBSD ipfw bypass",
"refsource": "BUGTRAQ",
"url": "http://www.security-express.com/archives/bugtraq/2001-01/0424.html"
},
{
"name": "ipfw-bypass-firewall(5998)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5998"
},
{
"name": "FreeBSD-SA-01:08",
"refsource": "FREEBSD",
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:08.ipfw.asc"
},
{
"name": "1743",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1743"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "IMNX-2001-70-034-01",
"refsource": "IMMUNIX",
"url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-034-01"
},
{
"name": "openssh-symlink-file-deletion(6676)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6676"
},
{
"name": "20010612",
"refsource": "OPENBSD",
"url": "http://www.openbsd.org/errata29.html"
},
{
"name": "20010604 SSH allows deletion of other users files...",
"refsource": "BUGTRAQ",
@ -82,35 +97,20 @@
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/655259"
},
{
"name" : "20010612",
"refsource" : "OPENBSD",
"url" : "http://www.openbsd.org/errata29.html"
},
{
"name" : "IMNX-2001-70-034-01",
"refsource" : "IMMUNIX",
"url" : "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-034-01"
},
{
"name" : "CLA-2001:431",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000431"
},
{
"name": "2825",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2825"
},
{
"name" : "openssh-symlink-file-deletion(6676)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6676"
},
{
"name": "1853",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1853"
},
{
"name": "CLA-2001:431",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000431"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "CSSA-2001-026.0",
"refsource" : "CALDERA",
"url" : "http://www.calderasystems.com/support/security/advisories/CSSA-2001-026.0.txt"
},
{
"name": "docview-httpd-command-execution(6854)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6854"
},
{
"name": "CSSA-2001-026.0",
"refsource": "CALDERA",
"url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-026.0.txt"
},
{
"name": "3052",
"refsource": "BID",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "ADV-2006-1515",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1515"
},
{
"name": "19801",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19801"
},
{
"name": "ADV-2006-1515",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1515"
},
{
"name": "phpwebgallery-picture-bypass-security(26079)",
"refsource": "XF",

View File

@ -63,19 +63,9 @@
"url": "http://www.aria-security.net/hm/neomail.txt"
},
{
"name" : "17728",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17728"
},
{
"name" : "ADV-2006-1590",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1590"
},
{
"name" : "19906",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19906"
"name": "neomail-sessionid-xss(26127)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26127"
},
{
"name": "827",
@ -83,9 +73,19 @@
"url": "http://securityreason.com/securityalert/827"
},
{
"name" : "neomail-sessionid-xss(26127)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26127"
"name": "17728",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17728"
},
{
"name": "19906",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19906"
},
{
"name": "ADV-2006-1590",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1590"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-2449",
"STATE": "PUBLIC"
},
@ -53,39 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20060614 [KDE Security Advisory] KDM symlink attack vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/437133/100/0/threaded"
"name": "21662",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21662"
},
{
"name" : "20060615 rPSA-2006-0106-1 kdebase",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/437322/100/0/threaded"
"name": "20890",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20890"
},
{
"name" : "http://www.kde.org/info/security/advisory-20060614-1.txt",
"refsource" : "CONFIRM",
"url" : "http://www.kde.org/info/security/advisory-20060614-1.txt"
"name": "20674",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20674"
},
{
"name" : "DSA-1156",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1156"
"name": "26511",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26511"
},
{
"name" : "GLSA-200606-23",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml"
},
{
"name" : "MDKSA-2006:105",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:105"
},
{
"name" : "MDKSA-2006:106",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:106"
"name": "20702",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20702"
},
{
"name": "RHSA-2006:0548",
@ -93,14 +83,14 @@
"url": "http://www.redhat.com/support/errata/RHSA-2006-0548.html"
},
{
"name" : "SSA:2006-178-01",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.444467"
"name": "1016297",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016297"
},
{
"name" : "SUSE-SA:2006:039",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2006_39_kdm.html"
"name": "MDKSA-2006:106",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:106"
},
{
"name": "USN-301-1",
@ -108,9 +98,19 @@
"url": "https://usn.ubuntu.com/301-1/"
},
{
"name" : "18431",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18431"
"name": "20602",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20602"
},
{
"name": "kde-kdm-symlink(27181)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27181"
},
{
"name": "20869",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20869"
},
{
"name": "oval:org.mitre.oval:def:9844",
@ -122,35 +122,40 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2355"
},
{
"name" : "26511",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26511"
},
{
"name" : "1016297",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016297"
},
{
"name" : "20602",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20602"
},
{
"name": "20660",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20660"
},
{
"name" : "20674",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20674"
"name": "DSA-1156",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1156"
},
{
"name" : "20702",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20702"
"name": "20060614 [KDE Security Advisory] KDM symlink attack vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/437133/100/0/threaded"
},
{
"name": "SUSE-SA:2006:039",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_39_kdm.html"
},
{
"name": "http://www.kde.org/info/security/advisory-20060614-1.txt",
"refsource": "CONFIRM",
"url": "http://www.kde.org/info/security/advisory-20060614-1.txt"
},
{
"name": "GLSA-200606-23",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200606-23.xml"
},
{
"name": "SSA:2006-178-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.444467"
},
{
"name": "20785",
@ -158,24 +163,19 @@
"url": "http://secunia.com/advisories/20785"
},
{
"name" : "20869",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20869"
"name": "MDKSA-2006:105",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:105"
},
{
"name" : "20890",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20890"
"name": "20060615 rPSA-2006-0106-1 kdebase",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/437322/100/0/threaded"
},
{
"name" : "21662",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/21662"
},
{
"name" : "kde-kdm-symlink(27181)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27181"
"name": "18431",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18431"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2006-2482",
"STATE": "PUBLIC"
},
@ -52,41 +52,41 @@
},
"references": {
"reference_data": [
{
"name" : "http://secunia.com/secunia_research/2006-50/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2006-50/advisory/"
},
{
"name" : "http://secunia.com/secunia_research/2006-72/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2006-72/advisory/"
},
{
"name": "19884",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19884"
},
{
"name" : "ADV-2006-3495",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3495"
},
{
"name": "ADV-2007-0235",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0235"
},
{
"name" : "20270",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20270"
"name": "ADV-2006-3495",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3495"
},
{
"name": "http://secunia.com/secunia_research/2006-50/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-50/advisory/"
},
{
"name": "21458",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21458"
},
{
"name": "20270",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20270"
},
{
"name": "http://secunia.com/secunia_research/2006-72/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2006-72/advisory/"
},
{
"name": "tziptv-arj-header-bo(28785)",
"refsource": "XF",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "1809",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1809"
},
{
"name": "18076",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18076"
},
{
"name": "1809",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1809"
},
{
"name": "calogic-reconfig-srxclr-file-include(26590)",
"refsource": "XF",

View File

@ -52,46 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060523 Nucleus CMS <= 3.22 arbitrary remote inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/434837/100/0/threaded"
},
{
"name" : "http://retrogod.altervista.org/nucleus_322_incl_xpl.html",
"refsource" : "MISC",
"url" : "http://retrogod.altervista.org/nucleus_322_incl_xpl.html"
},
{
"name" : "http://www.nucleuscms.org/item/3038",
"refsource" : "CONFIRM",
"url" : "http://www.nucleuscms.org/item/3038"
},
{
"name" : "http://forum.nucleuscms.org/viewtopic.php?t=12304",
"refsource" : "CONFIRM",
"url" : "http://forum.nucleuscms.org/viewtopic.php?t=12304"
},
{
"name" : "18097",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18097"
},
{
"name" : "ADV-2006-1936",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1936"
},
{
"name" : "25749",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/25749"
},
{
"name" : "1016146",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016146"
},
{
"name": "20219",
"refsource": "SECUNIA",
@ -102,10 +62,50 @@
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/951"
},
{
"name": "http://www.nucleuscms.org/item/3038",
"refsource": "CONFIRM",
"url": "http://www.nucleuscms.org/item/3038"
},
{
"name": "20060523 Nucleus CMS <= 3.22 arbitrary remote inclusion",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/434837/100/0/threaded"
},
{
"name": "http://retrogod.altervista.org/nucleus_322_incl_xpl.html",
"refsource": "MISC",
"url": "http://retrogod.altervista.org/nucleus_322_incl_xpl.html"
},
{
"name": "nucleus-dirlibs-file-include(26606)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26606"
},
{
"name": "1016146",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016146"
},
{
"name": "ADV-2006-1936",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1936"
},
{
"name": "18097",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18097"
},
{
"name": "http://forum.nucleuscms.org/viewtopic.php?t=12304",
"refsource": "CONFIRM",
"url": "http://forum.nucleuscms.org/viewtopic.php?t=12304"
},
{
"name": "25749",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25749"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20081203 [HACKATTACK Advisory 20081203]Pro Clan Manager 0.4.2 - Session Fixation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/498864/100/0/threaded"
},
{
"name": "32606",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32606"
},
{
"name" : "4752",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4752"
"name": "20081203 [HACKATTACK Advisory 20081203]Pro Clan Manager 0.4.2 - Session Fixation",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/498864/100/0/threaded"
},
{
"name": "proclanmanager-phpsessid-session-hijacking(47036)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47036"
},
{
"name": "4752",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4752"
}
]
}

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ntinternals.org/ntiadv0807/ntiadv0807.html",
"refsource" : "MISC",
"url" : "http://www.ntinternals.org/ntiadv0807/ntiadv0807.html"
},
{
"name": "http://www.eset.com/joomla/index.php?option=com_content&task=view&id=4113&Itemid=5",
"refsource": "CONFIRM",
"url": "http://www.eset.com/joomla/index.php?option=com_content&task=view&id=4113&Itemid=5"
},
{
"name" : "32917",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32917"
"name": "33210",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33210"
},
{
"name": "http://www.ntinternals.org/ntiadv0807/ntiadv0807.html",
"refsource": "MISC",
"url": "http://www.ntinternals.org/ntiadv0807/ntiadv0807.html"
},
{
"name": "ADV-2008-3456",
@ -73,9 +73,9 @@
"url": "http://www.vupen.com/english/advisories/2008/3456"
},
{
"name" : "33210",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33210"
"name": "32917",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32917"
},
{
"name": "smart-security-epfw-privilege-escalation(47477)",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2119",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-2300",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
},
{
"name" : "GLSA-201204-01",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201204-01.xml"
"name": "oval:org.mitre.oval:def:13148",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13148"
},
{
"name": "TA11-201A",
@ -68,19 +63,24 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
},
{
"name" : "oval:org.mitre.oval:def:13148",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13148"
},
{
"name" : "1025805",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025805"
"name": "GLSA-201204-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201204-01.xml"
},
{
"name": "48755",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48755"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
},
{
"name": "1025805",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025805"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "73885",
"refsource": "OSVDB",
"url": "http://osvdb.org/73885"
},
{
"name": "http://otrs.org/advisory/OSA-2011-02-en/",
"refsource": "CONFIRM",
"url": "http://otrs.org/advisory/OSA-2011-02-en/"
},
{
"name": "otrs-iphonehandle-priv-escalation(68558)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68558"
},
{
"name": "48678",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48678"
},
{
"name" : "73885",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/73885"
},
{
"name": "45227",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45227"
},
{
"name" : "otrs-iphonehandle-priv-escalation(68558)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68558"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2481",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1137753",
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1137753"
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1138788",
@ -63,9 +63,9 @@
"url": "http://svn.apache.org/viewvc?view=revision&revision=1138788"
},
{
"name" : "http://tomcat.apache.org/security-7.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-7.html"
"name": "1025924",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025924"
},
{
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=51395",
@ -73,9 +73,14 @@
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=51395"
},
{
"name" : "HPSBST02955",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
"name": "57126",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57126"
},
{
"name": "http://svn.apache.org/viewvc?view=revision&revision=1137753",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1137753"
},
{
"name": "49147",
@ -83,14 +88,9 @@
"url": "http://www.securityfocus.com/bid/49147"
},
{
"name" : "1025924",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1025924"
},
{
"name" : "57126",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/57126"
"name": "HPSBST02955",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
}
]
}

View File

@ -53,14 +53,19 @@
"references": {
"reference_data": [
{
"name" : "http://www.opera.com/docs/changelogs/mac/1150/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/mac/1150/"
"name": "opera-data-uris-xss(68322)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68322"
},
{
"name" : "http://www.opera.com/docs/changelogs/unix/1150/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/unix/1150/"
"name": "48500",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48500"
},
{
"name": "45060",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45060"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1150/",
@ -72,25 +77,20 @@
"refsource": "CONFIRM",
"url": "http://www.opera.com/support/kb/view/995/"
},
{
"name" : "48500",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/48500"
},
{
"name": "73485",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/73485"
},
{
"name" : "45060",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/45060"
"name": "http://www.opera.com/docs/changelogs/unix/1150/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/unix/1150/"
},
{
"name" : "opera-data-uris-xss(68322)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68322"
"name": "http://www.opera.com/docs/changelogs/mac/1150/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/mac/1150/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2684",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "http://www.openwall.com/lists/oss-security/2014/02/08/5"
},
{
"name" : "http://www.openwall.com/lists/oss-security/2011/07/06/10",
"name": "https://bugs.launchpad.net/ubuntu/+source/foo2zjs/+bug/805370",
"refsource": "MISC",
"url" : "http://www.openwall.com/lists/oss-security/2011/07/06/10"
"url": "https://bugs.launchpad.net/ubuntu/+source/foo2zjs/+bug/805370"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633870",
@ -68,9 +68,9 @@
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633870"
},
{
"name" : "https://bugs.launchpad.net/ubuntu/+source/foo2zjs/+bug/805370",
"name": "http://www.openwall.com/lists/oss-security/2011/07/06/10",
"refsource": "MISC",
"url" : "https://bugs.launchpad.net/ubuntu/+source/foo2zjs/+bug/805370"
"url": "http://www.openwall.com/lists/oss-security/2011/07/06/10"
},
{
"name": "https://security-tracker.debian.org/tracker/CVE-2011-2684/",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"refsource" : "MLIST",
"url" : "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
},
{
"name": "http://trac.osgeo.org/mapserver/ticket/3939",
"refsource": "CONFIRM",
"url": "http://trac.osgeo.org/mapserver/ticket/3939"
},
{
"name": "[mapserver-users] 20110713 MapServer 6.0.1, 5.6.7 and 4.10.7 releases with security fixes",
"refsource": "MLIST",
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2011-July/069430.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-3227",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT5002",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5002"
},
{
"name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "50085",
"refsource": "BID",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-3252",
"STATE": "PUBLIC"
},
@ -52,15 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "http://support.apple.com/kb/HT5130",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5130"
},
{
"name": "http://support.apple.com/kb/HT4981",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4981"
},
{
"name" : "http://support.apple.com/kb/HT5130",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5130"
"name": "oval:org.mitre.oval:def:16784",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16784"
},
{
"name": "APPLE-SA-2011-10-11-1",
@ -76,11 +81,6 @@
"name": "76381",
"refsource": "OSVDB",
"url": "http://osvdb.org/76381"
},
{
"name" : "oval:org.mitre.oval:def:16784",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16784"
}
]
}

View File

@ -53,30 +53,30 @@
"references": {
"reference_data": [
{
"name" : "http://www.computerworld.com/s/article/9219669/Mac_OS_X_can_t_properly_revoke_dodgy_digital_certificates",
"refsource" : "MISC",
"url" : "http://www.computerworld.com/s/article/9219669/Mac_OS_X_can_t_properly_revoke_dodgy_digital_certificates"
"name": "49429",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49429"
},
{
"name": "http://support.apple.com/kb/HT5130",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5130"
},
{
"name" : "APPLE-SA-2012-02-01-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name" : "49429",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/49429"
},
{
"name": "1026002",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026002"
},
{
"name": "http://www.computerworld.com/s/article/9219669/Mac_OS_X_can_t_properly_revoke_dodgy_digital_certificates",
"refsource": "MISC",
"url": "http://www.computerworld.com/s/article/9219669/Mac_OS_X_can_t_properly_revoke_dodgy_digital_certificates"
},
{
"name": "APPLE-SA-2012-02-01-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name": "macos-keychain-sec-bypass(69556)",
"refsource": "XF",

View File

@ -52,26 +52,26 @@
},
"references": {
"reference_data": [
{
"name" : "[xorg] 20111018 X.Org security advisory: xserver locking code issues",
"refsource" : "MLIST",
"url" : "http://lists.freedesktop.org/archives/xorg/2011-October/053680.html"
},
{
"name": "http://cgit.freedesktop.org/xorg/xserver/commit/?id=6ba44b91e37622ef8c146d8f2ac92d708a18ed34",
"refsource": "CONFIRM",
"url": "http://cgit.freedesktop.org/xorg/xserver/commit/?id=6ba44b91e37622ef8c146d8f2ac92d708a18ed34"
},
{
"name" : "RHSA-2012:0939",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0939.html"
"name": "[xorg] 20111018 X.Org security advisory: xserver locking code issues",
"refsource": "MLIST",
"url": "http://lists.freedesktop.org/archives/xorg/2011-October/053680.html"
},
{
"name": "46460",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46460"
},
{
"name": "RHSA-2012:0939",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0939.html"
},
{
"name": "49579",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0162",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=892806"
},
{
"name" : "RHSA-2013:0544",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0544.html"
},
{
"name": "RHSA-2013:0548",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0548.html"
},
{
"name": "RHSA-2013:0544",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0337",
"STATE": "PUBLIC"
},
@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130221 Re: CVE request: nginx world-readable logdir",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/02/22/1"
},
{
"name" : "[oss-security] 20130221 nginx world-readable logdir",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/02/21/15"
"name": "55181",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55181"
},
{
"name": "[oss-security] 20130224 nginx CVE-2013-0337 world-readable logs",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/24/1"
},
{
"name": "[oss-security] 20130221 Re: CVE request: nginx world-readable logdir",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/22/1"
},
{
"name": "GLSA-201310-04",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201310-04.xml"
},
{
"name" : "55181",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/55181"
"name": "[oss-security] 20130221 nginx world-readable logdir",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/21/15"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-0595",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1800",
"STATE": "PUBLIC"
},
@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6",
"refsource" : "MISC",
"url" : "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=917236",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=917236"
},
{
"name" : "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately",
"refsource" : "MISC",
"url" : "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately"
"name": "52897",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52897"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=804721",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=804721"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=917236",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=917236"
},
{
"name": "SUSE-SU-2013:0615",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html"
},
{
"name" : "52897",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/52897"
"name": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately",
"refsource": "MISC",
"url": "https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately"
},
{
"name": "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6",
"refsource": "MISC",
"url": "https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6"
}
]
}

View File

@ -58,24 +58,24 @@
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0079.html"
},
{
"name" : "28409",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/28409"
"name": "http://sourceforge.net/projects/vtigercrm/files/vtiger%20CRM%205.4.0/Core%20Product/",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/projects/vtigercrm/files/vtiger%20CRM%205.4.0/Core%20Product/"
},
{
"name": "https://www.htbridge.com/advisory/HTB23168",
"refsource": "MISC",
"url": "https://www.htbridge.com/advisory/HTB23168"
},
{
"name" : "http://sourceforge.net/projects/vtigercrm/files/vtiger%20CRM%205.4.0/Core%20Product/",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/projects/vtigercrm/files/vtiger%20CRM%205.4.0/Core%20Product/"
},
{
"name": "76138",
"refsource": "OSVDB",
"url": "http://osvdb.org/76138"
},
{
"name": "28409",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/28409"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "http://plugins.trac.wordpress.org/changeset/723187/download-monitor"
},
{
"name" : "61407",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/61407"
"name": "wp-downloadmonitor-cve20133262-admin-xss(85921)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921"
},
{
"name": "53116",
@ -68,9 +68,9 @@
"url": "http://secunia.com/advisories/53116"
},
{
"name" : "wp-downloadmonitor-cve20133262-admin-xss(85921)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/85921"
"name": "61407",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61407"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-5605",
"STATE": "PUBLIC"
},
@ -52,110 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=934016",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=934016"
},
{
"name" : "https://developer.mozilla.org/docs/NSS/NSS_3.14.5_release_notes",
"refsource" : "CONFIRM",
"url" : "https://developer.mozilla.org/docs/NSS/NSS_3.14.5_release_notes"
},
{
"name" : "https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes",
"refsource" : "CONFIRM",
"url" : "https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes"
},
{
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-103.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-103.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761",
"refsource" : "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"name" : "DSA-2800",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2800"
},
{
"name" : "GLSA-201406-19",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201406-19.xml"
},
{
"name" : "GLSA-201504-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "RHSA-2013:1840",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1840.html"
},
{
"name": "https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes",
"refsource": "CONFIRM",
"url": "https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=934016",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=934016"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name": "RHSA-2013:1841",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1841.html"
},
{
"name" : "RHSA-2013:1791",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1791.html"
},
{
"name" : "RHSA-2013:1829",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1829.html"
},
{
"name" : "RHSA-2014:0041",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0041.html"
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
},
{
"name": "openSUSE-SU-2013:1730",
@ -163,14 +98,19 @@
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00078.html"
},
{
"name" : "SUSE-SU-2013:1807",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00000.html"
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name" : "openSUSE-SU-2013:1732",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00080.html"
"name": "GLSA-201504-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-01"
},
{
"name": "GLSA-201406-19",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-19.xml"
},
{
"name": "USN-2030-1",
@ -187,10 +127,70 @@
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2032-1"
},
{
"name": "RHSA-2013:1791",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1791.html"
},
{
"name": "https://developer.mozilla.org/docs/NSS/NSS_3.14.5_release_notes",
"refsource": "CONFIRM",
"url": "https://developer.mozilla.org/docs/NSS/NSS_3.14.5_release_notes"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
},
{
"name": "SUSE-SU-2013:1807",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00000.html"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761"
},
{
"name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Dec/23"
},
{
"name": "DSA-2800",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2800"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
},
{
"name": "63738",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63738"
},
{
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-103.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-103.html"
},
{
"name": "openSUSE-SU-2013:1732",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00080.html"
},
{
"name": "RHSA-2014:0041",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0041.html"
},
{
"name": "RHSA-2013:1829",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1829.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://player.gomlab.com/eng/download/",
"refsource" : "CONFIRM",
"url" : "http://player.gomlab.com/eng/download/"
},
{
"name": "http://player.gomlab.com/eng/notice/view.gom?intseq=239",
"refsource": "CONFIRM",
"url": "http://player.gomlab.com/eng/notice/view.gom?intseq=239"
},
{
"name": "http://player.gomlab.com/eng/download/",
"refsource": "CONFIRM",
"url": "http://player.gomlab.com/eng/download/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5887",
"STATE": "PUBLIC"
},
@ -53,49 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777"
},
{
"name" : "HPSBUX02972",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
},
{
"name" : "HPSBUX02973",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name" : "SSRT101454",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
},
{
"name" : "SSRT101455",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name" : "RHSA-2014:0030",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
},
{
"name" : "RHSA-2014:0134",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0134.html"
},
{
"name" : "RHSA-2014:0135",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0135.html"
"name": "oracle-cpujan2014-cve20135887(90345)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90345"
},
{
"name": "RHSA-2014:0414",
@ -103,44 +63,14 @@
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "SUSE-SU-2014:0246",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html"
"name": "SSRT101455",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name" : "SUSE-SU-2014:0266",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html"
},
{
"name" : "SUSE-SU-2014:0451",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html"
},
{
"name" : "64758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64758"
},
{
"name" : "64875",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64875"
},
{
"name" : "102013",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/102013"
},
{
"name" : "1029608",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029608"
},
{
"name" : "56485",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56485"
"name": "RHSA-2014:0135",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0135.html"
},
{
"name": "56535",
@ -148,9 +78,79 @@
"url": "http://secunia.com/advisories/56535"
},
{
"name" : "oracle-cpujan2014-cve20135887(90345)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90345"
"name": "RHSA-2014:0030",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0030.html"
},
{
"name": "56485",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56485"
},
{
"name": "SSRT101454",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777"
},
{
"name": "102013",
"refsource": "OSVDB",
"url": "http://osvdb.org/102013"
},
{
"name": "HPSBUX02972",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402697611681&w=2"
},
{
"name": "SUSE-SU-2014:0451",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html"
},
{
"name": "HPSBUX02973",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139402749111889&w=2"
},
{
"name": "1029608",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029608"
},
{
"name": "SUSE-SU-2014:0266",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html"
},
{
"name": "64875",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64875"
},
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "SUSE-SU-2014:0246",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "RHSA-2014:0134",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0134.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-2117",
"STATE": "PUBLIC"
},
@ -57,6 +57,11 @@
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=33642"
},
{
"name": "1030019",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030019"
},
{
"name": "20140403 Cisco Emergency Responder Open Redirect Vulnerability",
"refsource": "CISCO",
@ -66,11 +71,6 @@
"name": "66634",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66634"
},
{
"name" : "1030019",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030019"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2014-2629",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "HPSBNS03082",
"refsource" : "HP",
"url" : "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=c04391893"
},
{
"name" : "SSRT101655",
"refsource" : "HP",
"url" : "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=c04391893"
"name": "1030697",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030697"
},
{
"name": "69147",
@ -68,14 +63,19 @@
"url": "http://www.securityfocus.com/bid/69147"
},
{
"name" : "1030697",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1030697"
"name": "SSRT101655",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=c04391893"
},
{
"name": "59981",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59981"
},
{
"name": "HPSBNS03082",
"refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=c04391893"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2014-2794",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037"
},
{
"name" : "68378",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/68378"
"name": "59775",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59775"
},
{
"name": "1030532",
@ -68,9 +68,9 @@
"url": "http://www.securitytracker.com/id/1030532"
},
{
"name" : "59775",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59775"
"name": "68378",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68378"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.htbridge.com/advisory/HTB23211",
"refsource" : "MISC",
"url" : "https://www.htbridge.com/advisory/HTB23211"
},
{
"name": "67291",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "58539",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58539"
},
{
"name": "https://www.htbridge.com/advisory/HTB23211",
"refsource": "MISC",
"url": "https://www.htbridge.com/advisory/HTB23211"
}
]
}

View File

@ -60,6 +60,16 @@
},
"references": {
"reference_data": [
{
"name": "GLSA-201702-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-10"
},
{
"name": "DSA-3780",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3780"
},
{
"name": "41240",
"refsource": "EXPLOIT-DB",
@ -70,6 +80,11 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41356/"
},
{
"name": "95987",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95987"
},
{
"name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
"refsource": "MLIST",
@ -79,21 +94,6 @@
"name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/02/04/1"
},
{
"name" : "DSA-3780",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2017/dsa-3780"
},
{
"name" : "GLSA-201702-10",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201702-10"
},
{
"name" : "95987",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/95987"
}
]
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0519",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-03-01"
},
{
"name" : "96950",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96950"
},
{
"name": "1037968",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037968"
},
{
"name": "96950",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96950"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.319911",
"ID": "CVE-2017-1000105",
"REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Jenkins Blue Ocean Plugin",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "1.1.5 and earlier"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Jenkins Blue Ocean Plugin"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Incorrect Access Control"
"value": "n/a"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[announce] 20171023 Apache Portable Runtime APR 1.6.3, APR-util 1.6.1 and APR-iconv 1.2.2 Released",
"refsource" : "MLIST",
"url" : "http://mail-archives.apache.org/mod_mbox/apr-dev/201710.mbox/%3CCACsi252POs4toeJJciwg09_eu2cO3XFg%3DUqsPjXsfjDoeC3-UQ%40mail.gmail.com%3E"
},
{
"name": "[debian-lts-announce] 20171106 [SECURITY] [DLA 1163-1] apr-util security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00006.html"
},
{
"name" : "101558",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101558"
},
{
"name": "1042004",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1042004"
},
{
"name": "[announce] 20171023 Apache Portable Runtime APR 1.6.3, APR-util 1.6.1 and APR-iconv 1.2.2 Released",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/apr-dev/201710.mbox/%3CCACsi252POs4toeJJciwg09_eu2cO3XFg%3DUqsPjXsfjDoeC3-UQ%40mail.gmail.com%3E"
},
{
"name": "101558",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101558"
}
]
}

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx",
"refsource" : "MISC",
"url" : "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx"
},
{
"name": "https://nodesecurity.io/advisories/478",
"refsource": "MISC",
"url": "https://nodesecurity.io/advisories/478"
},
{
"name": "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx",
"refsource": "MISC",
"url": "https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4197",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4598",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4722",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4793",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4968",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -54,29 +54,29 @@
"references": {
"reference_data": [
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1417405",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1417405"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2018-02/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2018-02/"
"name": "1040270",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040270"
},
{
"name": "USN-3544-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3544-1/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1417405",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1417405"
},
{
"name": "102786",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102786"
},
{
"name" : "1040270",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040270"
"name": "https://www.mozilla.org/security/advisories/mfsa2018-02/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2018-02/"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/d4wner/Vulnerabilities-Report/blob/master/Add-Link-to-Facebook.md",
"refsource" : "MISC",
"url" : "https://github.com/d4wner/Vulnerabilities-Report/blob/master/Add-Link-to-Facebook.md"
},
{
"name": "https://wordpress.org/support/topic/stored-xss-bug-at-the-latest-version-of-add-link-to-facebook/",
"refsource": "MISC",
"url": "https://wordpress.org/support/topic/stored-xss-bug-at-the-latest-version-of-add-link-to-facebook/"
},
{
"name": "https://github.com/d4wner/Vulnerabilities-Report/blob/master/Add-Link-to-Facebook.md",
"refsource": "MISC",
"url": "https://github.com/d4wner/Vulnerabilities-Report/blob/master/Add-Link-to-Facebook.md"
}
]
}