"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:37:00 +00:00
parent a289b0e0e3
commit 0b56a72df7
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
50 changed files with 3067 additions and 3018 deletions

View File

@ -57,21 +57,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/352355"
},
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=141517",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=141517"
},
{
"name" : "9531",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/9531"
},
{
"name" : "3769",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/3769"
},
{
"name": "10753",
"refsource": "SECUNIA",
@ -81,6 +66,21 @@
"name": "phpgedview-gedfilconf-file-include(14987)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14987"
},
{
"name": "9531",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9531"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=141517",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=141517"
},
{
"name": "3769",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/3769"
}
]
}

View File

@ -52,60 +52,60 @@
},
"references": {
"reference_data": [
{
"name" : "20040628 ISC DHCP overflows",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=108843959502356&w=2"
},
{
"name" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf",
"refsource" : "CONFIRM",
"url" : "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf"
},
{
"name" : "MDKSA-2004:061",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:061"
},
{
"name" : "TA04-174A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA04-174A.html"
},
{
"name": "VU#317350",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/317350"
},
{
"name" : "20040622 DHCP Vuln // no code 0day //",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=108795911203342&w=2"
},
{
"name" : "SuSE-SA:2004:019",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2004_19_dhcp_server.html"
},
{
"name" : "20040708 [OpenPKG-SA-2004.031] OpenPKG Security Advisory (dhcpd)",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=108938625206063&w=2"
},
{
"name": "10590",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10590"
},
{
"name": "MDKSA-2004:061",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:061"
},
{
"name": "23265",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23265"
},
{
"name": "20040622 DHCP Vuln // no code 0day //",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108795911203342&w=2"
},
{
"name": "20040708 [OpenPKG-SA-2004.031] OpenPKG Security Advisory (dhcpd)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108938625206063&w=2"
},
{
"name": "SuSE-SA:2004:019",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2004_19_dhcp_server.html"
},
{
"name": "dhcp-ascii-log-bo(16475)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16475"
},
{
"name": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf",
"refsource": "CONFIRM",
"url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf"
},
{
"name": "TA04-174A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA04-174A.html"
},
{
"name": "20040628 ISC DHCP overflows",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108843959502356&w=2"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2004-0464",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "MS04-039",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-039"
},
{
"name" : "11605",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/11605"
},
{
"name": "oval:org.mitre.oval:def:4264",
"refsource": "OVAL",
@ -76,6 +66,16 @@
"name": "isa-cache-reverse-spoof(17906)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17906"
},
{
"name": "11605",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11605"
},
{
"name": "MS04-039",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-039"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "phpgroupware-index-preferences-xss(18496)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18496"
},
{
"name": "20041215 Multiple phpGroupWare Vulnerabilities [ phpGroupWare 0.9.16.003 && Earlier ]",
"refsource": "BUGTRAQ",
@ -62,20 +67,15 @@
"refsource": "MISC",
"url": "http://www.gulftech.org/?node=research&article_id=00054-12142004"
},
{
"name" : "GLSA-200501-08",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200501-08.xml"
},
{
"name": "11952",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11952"
},
{
"name" : "phpgroupware-index-preferences-xss(18496)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18496"
"name": "GLSA-200501-08",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200501-08.xml"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20040408 [waraxe-2004-SA#015 - Multiple vulnerabilities in NukeCalendar v1.1.a]",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=108144168932458&w=2"
},
{
"name": "10082",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "nuke-calendar-path-disclosure(15795)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15795"
},
{
"name": "20040408 [waraxe-2004-SA#015 - Multiple vulnerabilities in NukeCalendar v1.1.a]",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108144168932458&w=2"
}
]
}

View File

@ -57,16 +57,6 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/361300/2004-04-21/2004-04-27/0"
},
{
"name" : "http://www.waraxe.us/index.php?modname=sa&id=25",
"refsource" : "MISC",
"url" : "http://www.waraxe.us/index.php?modname=sa&id=25"
},
{
"name" : "http://protector.warcenter.se/article-53--0-0.html",
"refsource" : "CONFIRM",
"url" : "http://protector.warcenter.se/article-53--0-0.html"
},
{
"name": "10206",
"refsource": "BID",
@ -76,6 +66,16 @@
"name": "protector-blockerquery-xss(15965)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15965"
},
{
"name": "http://www.waraxe.us/index.php?modname=sa&id=25",
"refsource": "MISC",
"url": "http://www.waraxe.us/index.php?modname=sa&id=25"
},
{
"name": "http://protector.warcenter.se/article-53--0-0.html",
"refsource": "CONFIRM",
"url": "http://protector.warcenter.se/article-53--0-0.html"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://otn.oracle.com/deploy/security/pdf/2004alert63.pdf",
"refsource" : "CONFIRM",
"url" : "http://otn.oracle.com/deploy/security/pdf/2004alert63.pdf"
},
{
"name" : "9704",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/9704"
},
{
"name": "4022",
"refsource": "OSVDB",
@ -72,6 +62,16 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/10938"
},
{
"name": "9704",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9704"
},
{
"name": "http://otn.oracle.com/deploy/security/pdf/2004alert63.pdf",
"refsource": "CONFIRM",
"url": "http://otn.oracle.com/deploy/security/pdf/2004alert63.pdf"
},
{
"name": "oracle-mobile-gain-access(15269)",
"refsource": "XF",

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "http://sourceforge.net/forum/forum.php?forum_id=381807",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/forum/forum.php?forum_id=381807"
},
{
"name": "10525",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10525"
},
{
"name" : "6844",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/6844"
},
{
"name": "11824",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11824"
},
{
"name": "http://sourceforge.net/forum/forum.php?forum_id=381807",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/forum/forum.php?forum_id=381807"
},
{
"name": "ignition-server-password-bypass(16397)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16397"
},
{
"name": "6844",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/6844"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.pldaniels.com/ripmime/CHANGELOG",
"refsource" : "CONFIRM",
"url" : "http://www.pldaniels.com/ripmime/CHANGELOG"
},
{
"name": "8731",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/8731"
},
{
"name": "http://www.pldaniels.com/ripmime/CHANGELOG",
"refsource": "CONFIRM",
"url": "http://www.pldaniels.com/ripmime/CHANGELOG"
}
]
}

View File

@ -52,36 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.mwrinfosecurity.com/publications/mwri_ibm-lotus-domino-accept-language-stack-overflow_2008-05-20.pdf",
"refsource" : "MISC",
"url" : "http://www.mwrinfosecurity.com/publications/mwri_ibm-lotus-domino-accept-language-stack-overflow_2008-05-20.pdf"
},
{
"name" : "http://www-1.ibm.com/support/docview.wss?uid=swg21303057",
"refsource" : "CONFIRM",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg21303057"
},
{
"name": "20080522 Who's Right",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2008-May/001988.html"
},
{
"name" : "20080522 Who's Right",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2008-May/001989.html"
},
{
"name" : "29310",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29310"
},
{
"name" : "1020098",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020098"
},
{
"name": "ADV-2008-1597",
"refsource": "VUPEN",
@ -92,6 +67,11 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30310"
},
{
"name": "20080522 Who's Right",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2008-May/001989.html"
},
{
"name": "30332",
"refsource": "SECUNIA",
@ -101,6 +81,26 @@
"name": "ibm-lotusdomino-acceptlanguage-bo(42552)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42552"
},
{
"name": "http://www.mwrinfosecurity.com/publications/mwri_ibm-lotus-domino-accept-language-stack-overflow_2008-05-20.pdf",
"refsource": "MISC",
"url": "http://www.mwrinfosecurity.com/publications/mwri_ibm-lotus-domino-accept-language-stack-overflow_2008-05-20.pdf"
},
{
"name": "http://www-1.ibm.com/support/docview.wss?uid=swg21303057",
"refsource": "CONFIRM",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21303057"
},
{
"name": "29310",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29310"
},
{
"name": "1020098",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020098"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "5628",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5628"
"name": "rantx-admin-auth-bypass(42464)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42464"
},
{
"name": "29243",
@ -68,9 +68,9 @@
"url": "http://secunia.com/advisories/30279"
},
{
"name" : "rantx-admin-auth-bypass(42464)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42464"
"name": "5628",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5628"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20080729 Memory corruption and NULL pointer in Unreal Tournament III 1.2",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/494929/100/0/threaded"
},
{
"name": "http://aluigi.altervista.org/adv/ut3mendo-adv.txt",
"refsource": "MISC",
@ -68,24 +63,29 @@
"url": "http://aluigi.org/poc/ut3mendo.zip"
},
{
"name" : "30430",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30430"
"name": "unrealtournament3-sizefield-dos(44104)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44104"
},
{
"name": "ADV-2008-2260",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2260/references"
},
{
"name": "20080729 Memory corruption and NULL pointer in Unreal Tournament III 1.2",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494929/100/0/threaded"
},
{
"name": "30430",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30430"
},
{
"name": "31265",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31265"
},
{
"name" : "unrealtournament3-sizefield-dos(44104)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44104"
}
]
}

View File

@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT3178",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3178"
},
{
"name" : "http://support.apple.com/kb/HT3179",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3179"
},
{
"name" : "APPLE-SA-2008-09-24",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce//2008/Sep/msg00007.html"
"name": "java-macos-hmac-code-execution(45396)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45396"
},
{
"name": "APPLE-SA-2008-09-24",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html"
},
{
"name": "32018",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32018"
},
{
"name": "31379",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31379"
},
{
"name": "APPLE-SA-2008-09-24",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00007.html"
},
{
"name": "http://support.apple.com/kb/HT3178",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3178"
},
{
"name": "1020943",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020943"
},
{
"name" : "32018",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32018"
},
{
"name" : "java-macos-hmac-code-execution(45396)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45396"
"name": "http://support.apple.com/kb/HT3179",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3179"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7519"
},
{
"name" : "32919",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32919"
},
{
"name": "33171",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33171"
},
{
"name": "32919",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32919"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "7016",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7016"
},
{
"name": "32145",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "photogallery-multiple-sql-injection(46400)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46400"
},
{
"name": "7016",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7016"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20081108 [AK-ADV2008-001] Openfire Jabber-Server: Multiple Vulnerabilities (Authentication Bypass, SQL injection, ...)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/498162/100/0/threaded"
},
{
"name": "7075",
"refsource": "EXPLOIT-DB",
@ -66,6 +61,11 @@
"name": "http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt",
"refsource": "MISC",
"url": "http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt"
},
{
"name": "20081108 [AK-ADV2008-001] Openfire Jabber-Server: Multiple Vulnerabilities (Authentication Bypass, SQL injection, ...)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/498162/100/0/threaded"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5466"
},
{
"name" : "28854",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28854"
},
{
"name": "openinvoice-cookie-security-bypass(41947)",
"refsource": "XF",
@ -71,6 +66,11 @@
"name": "openinvoice-uid-security-bypass(49580)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49580"
},
{
"name": "28854",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28854"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "6591",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6591"
"name": "rpgboard-keep4u-security-bypass(45501)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45501"
},
{
"name": "31466",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/31466"
},
{
"name" : "rpgboard-keep4u-security-bypass(45501)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45501"
"name": "6591",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6591"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5756"
},
{
"name" : "29600",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29600"
},
{
"name": "uploader-filename-file-include(42925)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42925"
},
{
"name": "29600",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29600"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-5039",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-5069",
"STATE": "PUBLIC"
},
@ -53,39 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21616490",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21616490"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21621154",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21621154"
},
{
"name" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
"refsource" : "CONFIRM",
"url" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21620037",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21620037"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21631786",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21631786"
},
{
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html"
"name": "SUSE-SU-2012:1398",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html"
},
{
"name": "GLSA-201406-32",
@ -93,49 +63,14 @@
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "HPSBUX02832",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
"name": "javaruntimeenvironment-cc-cve20125069(79428)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79428"
},
{
"name" : "SSRT101042",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
},
{
"name" : "HPSBOV02833",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
},
{
"name" : "SSRT101043",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
},
{
"name" : "RHSA-2012:1385",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1385.html"
},
{
"name" : "RHSA-2012:1386",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1386.html"
},
{
"name" : "RHSA-2012:1391",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1391.html"
},
{
"name" : "RHSA-2012:1392",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1392.html"
},
{
"name" : "RHSA-2012:1465",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1465.html"
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html"
},
{
"name": "RHSA-2012:1466",
@ -143,19 +78,34 @@
"url": "http://rhn.redhat.com/errata/RHSA-2012-1466.html"
},
{
"name" : "RHSA-2012:1467",
"name": "RHSA-2012:1386",
"refsource": "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1467.html"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1386.html"
},
{
"name" : "RHSA-2013:1455",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
"name": "51315",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51315"
},
{
"name" : "RHSA-2013:1456",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
"name": "51438",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51438"
},
{
"name": "51141",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51141"
},
{
"name": "SSRT101043",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21621154",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21621154"
},
{
"name": "openSUSE-SU-2012:1423",
@ -163,19 +113,34 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html"
},
{
"name" : "SUSE-SU-2012:1398",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html"
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name" : "SUSE-SU-2012:1595",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html"
"name": "RHSA-2012:1391",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1391.html"
},
{
"name" : "SUSE-SU-2012:1489",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00010.html"
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21620037",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21620037"
},
{
"name": "51029",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51029"
},
{
"name": "HPSBOV02833",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
},
{
"name": "51166",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51166"
},
{
"name": "56065",
@ -188,59 +153,94 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16685"
},
{
"name" : "51028",
"name": "51390",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/51028"
"url": "http://secunia.com/advisories/51390"
},
{
"name" : "51029",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51029"
"name": "RHSA-2012:1392",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1392.html"
},
{
"name" : "51141",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51141"
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21631786",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21631786"
},
{
"name" : "51315",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51315"
"name": "SUSE-SU-2012:1489",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00010.html"
},
{
"name" : "51326",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51326"
"name": "SUSE-SU-2012:1595",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21616490",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21616490"
},
{
"name": "51327",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51327"
},
{
"name": "RHSA-2012:1467",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1467.html"
},
{
"name": "RHSA-2012:1465",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1465.html"
},
{
"name": "51328",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51328"
},
{
"name" : "51390",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51390"
"name": "SSRT101042",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
},
{
"name" : "51438",
"name": "51028",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/51438"
"url": "http://secunia.com/advisories/51028"
},
{
"name" : "51166",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51166"
"name": "RHSA-2013:1456",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name" : "javaruntimeenvironment-cc-cve20125069(79428)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/79428"
"name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
},
{
"name": "51326",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51326"
},
{
"name": "RHSA-2012:1385",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1385.html"
},
{
"name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
"refsource": "CONFIRM",
"url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
},
{
"name": "HPSBUX02832",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
}
]
}

View File

@ -53,6 +53,11 @@
},
"references": {
"reference_data": [
{
"name": "1039787",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039787"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11770",
"refsource": "CONFIRM",
@ -67,11 +72,6 @@
"name": "101710",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101710"
},
{
"name" : "1039787",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039787"
}
]
}

View File

@ -58,15 +58,15 @@
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11932"
},
{
"name" : "102060",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102060"
},
{
"name": "1039996",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039996"
},
{
"name": "102060",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102060"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-285-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-285-01"
},
{
"name": "101259",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101259"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-285-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-285-01"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42618/"
},
{
"name" : "https://limbenjamin.com/articles/cve-2017-14126-participants-database-xss.html",
"refsource" : "MISC",
"url" : "https://limbenjamin.com/articles/cve-2017-14126-participants-database-xss.html"
},
{
"name": "https://wordpress.org/plugins/participants-database/#developers",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/participants-database/#developers"
},
{
"name": "https://limbenjamin.com/articles/cve-2017-14126-participants-database-xss.html",
"refsource": "MISC",
"url": "https://limbenjamin.com/articles/cve-2017-14126-participants-database-xss.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-15792",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-17-135/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-17-135/"
},
{
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-17-135/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-17-135/"
},
{
"name": "98320",
"refsource": "BID",

View File

@ -57,25 +57,25 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42382/"
},
{
"name" : "42429",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/42429/"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8464",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8464"
},
{
"name" : "98818",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/98818"
"name": "42429",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42429/"
},
{
"name": "1038671",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038671"
},
{
"name": "98818",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98818"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-18762",
"STATE" : "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,33 @@
"description_data": [
{
"lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "SaltOS 3.1 r8126 allows CSRF."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://packetstormsecurity.com/files/150005/SaltOS-Erp-Crm-3.1-r8126-Database-Download.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/150005/SaltOS-Erp-Crm-3.1-r8126-Database-Download.html"
},
{
"refsource": "EXPLOIT-DB",
"name": "45734",
"url": "https://www.exploit-db.com/exploits/45734/"
}
]
}