"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:38:47 +00:00
parent 4546162c05
commit 14d3084286
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
65 changed files with 4435 additions and 4435 deletions

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "19991217 NAV2000 Email Protection DoS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/38970"
},
{ {
"name": "19991220 Norton Email Protection Remote Overflow (Addendum)", "name": "19991220 Norton Email Protection Remote Overflow (Addendum)",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/39194" "url": "http://www.securityfocus.com/archive/1/39194"
}, },
{
"name": "6267",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/6267"
},
{ {
"name": "http://service1.symantec.com/SUPPORT/nav.nsf/df0a595864594c86852567ac0063608c/6206f660a1f2516a882568660082c930?OpenDocument&Highlight=0,poproxy", "name": "http://service1.symantec.com/SUPPORT/nav.nsf/df0a595864594c86852567ac0063608c/6206f660a1f2516a882568660082c930?OpenDocument&Highlight=0,poproxy",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://service1.symantec.com/SUPPORT/nav.nsf/df0a595864594c86852567ac0063608c/6206f660a1f2516a882568660082c930?OpenDocument&Highlight=0,poproxy" "url": "http://service1.symantec.com/SUPPORT/nav.nsf/df0a595864594c86852567ac0063608c/6206f660a1f2516a882568660082c930?OpenDocument&Highlight=0,poproxy"
}, },
{ {
"name" : "6267", "name": "19991217 NAV2000 Email Protection DoS",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://www.osvdb.org/6267" "url": "http://www.securityfocus.com/archive/1/38970"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "19981109 Several new CGI vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/11175"
},
{ {
"name": "http://lakeweb.com/scripts/", "name": "http://lakeweb.com/scripts/",
"refsource": "MISC", "refsource": "MISC",
"url": "http://lakeweb.com/scripts/" "url": "http://lakeweb.com/scripts/"
}, },
{
"name": "19981109 Several new CGI vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/11175"
},
{ {
"name": "cgi-perl-mail-programs(1400)", "name": "cgi-perl-mail-programs(1400)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "19990304 Oracle Plaintext Password", "name": "oracle-passwords(1902)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/12744" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1902"
}, },
{ {
"name": "19990304 Oracle Plaintext Password", "name": "19990304 Oracle Plaintext Password",
@ -63,9 +63,9 @@
"url": "http://marc.info/?l=ntbugtraq&m=92056752115116&w=2" "url": "http://marc.info/?l=ntbugtraq&m=92056752115116&w=2"
}, },
{ {
"name" : "oracle-passwords(1902)", "name": "19990304 Oracle Plaintext Password",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/1902" "url": "http://www.securityfocus.com/archive/1/12744"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "CSSA-1999-029.1",
"refsource" : "CALDERA",
"url" : "ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-029.1.txt"
},
{ {
"name": "1266", "name": "1266",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1266" "url": "http://www.securityfocus.com/bid/1266"
},
{
"name": "CSSA-1999-029.1",
"refsource": "CALDERA",
"url": "ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-029.1.txt"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0124.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0124.html"
}, },
{
"name" : "20000510 Gnapster Vulnerability Compromises User-readable Files",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-05/0127.html"
},
{ {
"name": "FreeBSD-SA-00:18", "name": "FreeBSD-SA-00:18",
"refsource": "FREEBSD", "refsource": "FREEBSD",
@ -71,6 +66,11 @@
"name": "1186", "name": "1186",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1186" "url": "http://www.securityfocus.com/bid/1186"
},
{
"name": "20000510 Gnapster Vulnerability Compromises User-readable Files",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0127.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20000705 Novell BorderManager 3.0 EE - Encoded URL rule bypass",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-07/0038.html"
},
{ {
"name": "1432", "name": "1432",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1432" "url": "http://www.securityfocus.com/bid/1432"
},
{
"name": "20000705 Novell BorderManager 3.0 EE - Encoded URL rule bypass",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-07/0038.html"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "pagelog-cgi-dir-traverse(5451)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5451"
},
{ {
"name": "20001029 Minor bug in Pagelog.cgi", "name": "20001029 Minor bug in Pagelog.cgi",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "1864", "name": "1864",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/1864" "url": "http://www.securityfocus.com/bid/1864"
},
{
"name" : "pagelog-cgi-dir-traverse(5451)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5451"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20000919 Cisco PIX Firewall (smtp content filtering hack)",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-09/0222.html"
},
{
"name" : "20000920 Re: Cisco PIX Firewall (smtp content filtering hack) - Version 4.2(1) not exploitable",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-09/0241.html"
},
{
"name" : "20001005 Cisco Secure PIX Firewall Mailguard Vulnerability",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/PIXfirewallSMTPfilter-pub.shtml"
},
{ {
"name": "1698", "name": "1698",
"refsource": "BID", "refsource": "BID",
@ -76,6 +61,21 @@
"name": "cisco-pix-smtp-filtering(5277)", "name": "cisco-pix-smtp-filtering(5277)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5277" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5277"
},
{
"name": "20001005 Cisco Secure PIX Firewall Mailguard Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/PIXfirewallSMTPfilter-pub.shtml"
},
{
"name": "20000920 Re: Cisco PIX Firewall (smtp content filtering hack) - Version 4.2(1) not exploitable",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0241.html"
},
{
"name": "20000919 Cisco PIX Firewall (smtp content filtering hack)",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0222.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "2008",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2008"
},
{ {
"name": "20001126 Vulnerablity in PTlink3.5.3ircd + PTlink.Services.1.8.1...", "name": "20001126 Vulnerablity in PTlink3.5.3ircd + PTlink.Services.1.8.1...",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/147115" "url": "http://www.securityfocus.com/archive/1/147115"
},
{
"name": "2008",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2008"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20050620 [Hat-Squad] i-Gallery directory traversal",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=111936111630489&w=2"
},
{ {
"name": "ADV-2005-0825", "name": "ADV-2005-0825",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/0825" "url": "http://www.vupen.com/english/advisories/2005/0825"
},
{
"name": "20050620 [Hat-Squad] i-Gallery directory traversal",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111936111630489&w=2"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20050629 Original imTRBBS(ver1.02) and prior remote command execution",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=112006605026261&w=2"
},
{ {
"name": "http://www.cgi-club.com/imTRBBS/", "name": "http://www.cgi-club.com/imTRBBS/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.cgi-club.com/imTRBBS/" "url": "http://www.cgi-club.com/imTRBBS/"
},
{
"name": "20050629 Original imTRBBS(ver1.02) and prior remote command execution",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112006605026261&w=2"
} }
] ]
} }

View File

@ -53,14 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=94584", "name": "SUSE-SA:2005:050",
"refsource" : "MISC", "refsource": "SUSE",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=94584" "url": "http://www.novell.com/linux/security/advisories/2005_50_kernel.html"
}, },
{ {
"name" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5", "name": "18056",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5" "url": "http://secunia.com/advisories/18056"
},
{
"name": "USN-169-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/169-1/"
},
{
"name": "16500",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16500"
},
{
"name": "MDKSA-2005:220",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220"
},
{
"name": "18059",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18059"
},
{
"name": "SUSE-SA:2005:068",
"refsource": "SUSE",
"url": "http://www.securityfocus.com/archive/1/419522/100/0/threaded"
}, },
{ {
"name": "DSA-922", "name": "DSA-922",
@ -73,64 +98,39 @@
"url": "http://www.debian.org/security/2005/dsa-921" "url": "http://www.debian.org/security/2005/dsa-921"
}, },
{ {
"name" : "MDKSA-2005:219", "name": "17826",
"refsource" : "MANDRAKE", "refsource": "SECUNIA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" "url": "http://secunia.com/advisories/17826"
}, },
{ {
"name" : "MDKSA-2005:220", "name": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5",
"refsource" : "MANDRAKE", "refsource": "CONFIRM",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" "url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5"
},
{
"name" : "SUSE-SA:2005:050",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2005_50_kernel.html"
},
{
"name" : "SUSE-SA:2005:068",
"refsource" : "SUSE",
"url" : "http://www.securityfocus.com/archive/1/419522/100/0/threaded"
},
{
"name" : "USN-169-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/169-1/"
}, },
{ {
"name": "14720", "name": "14720",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/14720" "url": "http://www.securityfocus.com/bid/14720"
}, },
{
"name" : "16355",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/16355/"
},
{
"name" : "16500",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/16500"
},
{ {
"name": "17918", "name": "17918",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17918" "url": "http://secunia.com/advisories/17918"
}, },
{ {
"name" : "18056", "name": "MDKSA-2005:219",
"refsource" : "SECUNIA", "refsource": "MANDRAKE",
"url" : "http://secunia.com/advisories/18056" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219"
}, },
{ {
"name" : "18059", "name": "16355",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18059" "url": "http://secunia.com/advisories/16355/"
}, },
{ {
"name" : "17826", "name": "http://bugs.gentoo.org/show_bug.cgi?id=94584",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/17826" "url": "http://bugs.gentoo.org/show_bug.cgi?id=94584"
} }
] ]
} }

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20050928 SquirrelMail Address Add Plugin XSS", "name": "ADV-2007-2732",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://marc.info/?l=bugtraq&m=112801672520766&w=2" "url": "http://www.vupen.com/english/advisories/2007/2732"
},
{
"name" : "http://moritz-naumann.com/adv/0002/sqmadd/0002.txt",
"refsource" : "MISC",
"url" : "http://moritz-naumann.com/adv/0002/sqmadd/0002.txt"
},
{
"name" : "http://squirrelmail.org/plugin_view.php?id=101",
"refsource" : "CONFIRM",
"url" : "http://squirrelmail.org/plugin_view.php?id=101"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=306172",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=306172"
}, },
{ {
"name": "APPLE-SA-2007-07-31", "name": "APPLE-SA-2007-07-31",
@ -82,26 +67,46 @@
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:178" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:178"
}, },
{
"name": "http://squirrelmail.org/plugin_view.php?id=101",
"refsource": "CONFIRM",
"url": "http://squirrelmail.org/plugin_view.php?id=101"
},
{
"name": "http://moritz-naumann.com/adv/0002/sqmadd/0002.txt",
"refsource": "MISC",
"url": "http://moritz-naumann.com/adv/0002/sqmadd/0002.txt"
},
{ {
"name": "14973", "name": "14973",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/14973" "url": "http://www.securityfocus.com/bid/14973"
}, },
{
"name" : "25159",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25159"
},
{
"name" : "ADV-2007-2732",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/2732"
},
{ {
"name": "1014988", "name": "1014988",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014988" "url": "http://securitytracker.com/id?1014988"
}, },
{
"name": "http://docs.info.apple.com/article.html?artnum=306172",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=306172"
},
{
"name": "20050928 SquirrelMail Address Add Plugin XSS",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112801672520766&w=2"
},
{
"name": "squirrelmail-add-xss(22453)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22453"
},
{
"name": "25159",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25159"
},
{ {
"name": "16987", "name": "16987",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -111,11 +116,6 @@
"name": "26235", "name": "26235",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26235" "url": "http://secunia.com/advisories/26235"
},
{
"name" : "squirrelmail-add-xss(22453)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22453"
} }
] ]
} }

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/", "name": "1015227",
"refsource" : "MISC", "refsource": "SECTRACK",
"url" : "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/" "url": "http://securitytracker.com/id?1015227"
},
{
"name" : "HPSBUX02076",
"refsource" : "HP",
"url" : "http://www.kb.cert.org/vuls/id/MIMG-6J6QS4"
},
{
"name" : "SSRT5979",
"refsource" : "HP",
"url" : "http://www.kb.cert.org/vuls/id/MIMG-6J6QS4"
}, },
{ {
"name": "HPSBPI02078", "name": "HPSBPI02078",
@ -73,9 +63,14 @@
"url": "http://www.kb.cert.org/vuls/id/MIMG-6J6QS4" "url": "http://www.kb.cert.org/vuls/id/MIMG-6J6QS4"
}, },
{ {
"name" : "HPSBTU02100", "name": "1015229",
"refsource" : "HP", "refsource": "SECTRACK",
"url" : "http://www2.itrc.hp.com/service/cki/docDisplay.do?admit=-1335382922+1141762289787+28353475&docId=c00602119" "url": "http://securitytracker.com/id?1015229"
},
{
"name": "ADV-2006-0880",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0880"
}, },
{ {
"name": "SSRT050979", "name": "SSRT050979",
@ -87,55 +82,20 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en" "url": "http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en"
}, },
{
"name" : "http://jvn.jp/niscc/NISCC-273756/index.html",
"refsource" : "MISC",
"url" : "http://jvn.jp/niscc/NISCC-273756/index.html"
},
{
"name" : "VU#226364",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/226364"
},
{
"name" : "15474",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15474"
},
{ {
"name": "15471", "name": "15471",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/15471" "url": "http://www.securityfocus.com/bid/15471"
}, },
{
"name" : "17030",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17030"
},
{
"name" : "oval:org.mitre.oval:def:5642",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5642"
},
{ {
"name": "ADV-2005-2462", "name": "ADV-2005-2462",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2462" "url": "http://www.vupen.com/english/advisories/2005/2462"
}, },
{ {
"name" : "ADV-2006-0880", "name": "http://jvn.jp/niscc/NISCC-273756/index.html",
"refsource" : "VUPEN", "refsource": "MISC",
"url" : "http://www.vupen.com/english/advisories/2006/0880" "url": "http://jvn.jp/niscc/NISCC-273756/index.html"
},
{
"name" : "1015227",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015227"
},
{
"name" : "1015229",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015229"
}, },
{ {
"name": "1015727", "name": "1015727",
@ -143,14 +103,54 @@
"url": "http://securitytracker.com/id?1015727" "url": "http://securitytracker.com/id?1015727"
}, },
{ {
"name" : "17598", "name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/17598" "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/"
},
{
"name": "17030",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17030"
},
{
"name": "15474",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15474"
},
{
"name": "VU#226364",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/226364"
},
{
"name": "HPSBTU02100",
"refsource": "HP",
"url": "http://www2.itrc.hp.com/service/cki/docDisplay.do?admit=-1335382922+1141762289787+28353475&docId=c00602119"
},
{
"name": "SSRT5979",
"refsource": "HP",
"url": "http://www.kb.cert.org/vuls/id/MIMG-6J6QS4"
}, },
{ {
"name": "19174", "name": "19174",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19174" "url": "http://secunia.com/advisories/19174"
},
{
"name": "oval:org.mitre.oval:def:5642",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5642"
},
{
"name": "17598",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17598"
},
{
"name": "HPSBUX02076",
"refsource": "HP",
"url": "http://www.kb.cert.org/vuls/id/MIMG-6J6QS4"
} }
] ]
} }

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "17633",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17633"
},
{
"name": "ADV-2005-2484",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2484"
},
{
"name": "15494",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15494"
},
{ {
"name": "http://secunia.com/secunia_research/2005-59/advisory/", "name": "http://secunia.com/secunia_research/2005-59/advisory/",
"refsource": "MISC", "refsource": "MISC",
@ -62,25 +77,10 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/" "url": "http://www.mailenable.com/hotfix/"
}, },
{
"name" : "15494",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15494"
},
{
"name" : "ADV-2005-2484",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2484"
},
{ {
"name": "1015239", "name": "1015239",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015239" "url": "http://securitytracker.com/id?1015239"
},
{
"name" : "17633",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17633"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[linux-kernel] 20051112 Re: local denial-of-service with file leases", "name": "RHSA-2006:0140",
"refsource" : "MLIST", "refsource": "REDHAT",
"url" : "http://marc.info/?l=linux-kernel&m=113175851920568&w=2" "url": "http://www.redhat.com/support/errata/RHSA-2006-0140.html"
},
{
"name" : "[linux-kernel] 20051113 [GIT] Fix memory leak in lease code",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=linux-kernel&m=113190437101622&w=2"
}, },
{ {
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174337", "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174337",
@ -73,99 +68,89 @@
"url": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7ed0175a462c4c30f6df6fac1cccac058f997739" "url": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7ed0175a462c4c30f6df6fac1cccac058f997739"
}, },
{ {
"name" : "DSA-1017", "name": "19369",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1017"
},
{
"name" : "DSA-1018",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1018"
},
{
"name" : "FLSA:157459-1",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/428028/100/0/threaded"
},
{
"name" : "FLSA:157459-2",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/428058/100/0/threaded"
},
{
"name" : "FLSA:157459-4",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/427981/100/0/threaded"
},
{
"name" : "MDKSA-2006:072",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:072"
},
{
"name" : "RHSA-2006:0101",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0101.html"
},
{
"name" : "RHSA-2006:0140",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0140.html"
},
{
"name" : "20060402-01-U",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U"
},
{
"name" : "TSLSA-2005-0070",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2005/0070"
},
{
"name" : "USN-231-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/231-1/"
},
{
"name" : "15627",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15627"
},
{
"name" : "oval:org.mitre.oval:def:9727",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9727"
},
{
"name" : "ADV-2005-2649",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2649"
},
{
"name" : "17786",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/17786" "url": "http://secunia.com/advisories/19369"
}, },
{ {
"name": "18203", "name": "18203",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18203" "url": "http://secunia.com/advisories/18203"
}, },
{
"name": "RHSA-2006:0101",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0101.html"
},
{
"name": "DSA-1018",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1018"
},
{
"name": "oval:org.mitre.oval:def:9727",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9727"
},
{
"name": "19607",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19607"
},
{
"name": "FLSA:157459-2",
"refsource": "FEDORA",
"url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded"
},
{
"name": "[linux-kernel] 20051113 [GIT] Fix memory leak in lease code",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel&m=113190437101622&w=2"
},
{
"name": "FLSA:157459-4",
"refsource": "FEDORA",
"url": "http://www.securityfocus.com/archive/1/427981/100/0/threaded"
},
{ {
"name": "18510", "name": "18510",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18510" "url": "http://secunia.com/advisories/18510"
}, },
{ {
"name" : "18562", "name": "FLSA:157459-1",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/18562" "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded"
}, },
{ {
"name" : "17787", "name": "[linux-kernel] 20051112 Re: local denial-of-service with file leases",
"refsource" : "SECUNIA", "refsource": "MLIST",
"url" : "http://secunia.com/advisories/17787" "url": "http://marc.info/?l=linux-kernel&m=113175851920568&w=2"
},
{
"name": "TSLSA-2005-0070",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2005/0070"
},
{
"name": "20060402-01-U",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U"
},
{
"name": "MDKSA-2006:072",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:072"
},
{
"name": "15627",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15627"
},
{
"name": "DSA-1017",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1017"
}, },
{ {
"name": "19374", "name": "19374",
@ -173,14 +158,29 @@
"url": "http://secunia.com/advisories/19374" "url": "http://secunia.com/advisories/19374"
}, },
{ {
"name" : "19369", "name": "USN-231-1",
"refsource" : "SECUNIA", "refsource": "UBUNTU",
"url" : "http://secunia.com/advisories/19369" "url": "https://usn.ubuntu.com/231-1/"
}, },
{ {
"name" : "19607", "name": "17787",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19607" "url": "http://secunia.com/advisories/17787"
},
{
"name": "17786",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17786"
},
{
"name": "18562",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18562"
},
{
"name": "ADV-2005-2649",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2649"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://pridels0.blogspot.com/2005/12/extreme-search-corporate-edition-6x.html", "name": "21336",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://pridels0.blogspot.com/2005/12/extreme-search-corporate-edition-6x.html" "url": "http://www.osvdb.org/21336"
},
{
"name" : "15675",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15675"
}, },
{ {
"name": "ADV-2005-2687", "name": "ADV-2005-2687",
@ -68,14 +63,19 @@
"url": "http://www.vupen.com/english/advisories/2005/2687" "url": "http://www.vupen.com/english/advisories/2005/2687"
}, },
{ {
"name" : "21336", "name": "15675",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://www.osvdb.org/21336" "url": "http://www.securityfocus.com/bid/15675"
}, },
{ {
"name": "17816", "name": "17816",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17816" "url": "http://secunia.com/advisories/17816"
},
{
"name": "http://pridels0.blogspot.com/2005/12/extreme-search-corporate-edition-6x.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2005/12/extreme-search-corporate-edition-6x.html"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "http://www.astaro.org/showflat.php?Cat=&Number=63958&page=0&view=collapsed&sb=5&o=&fpart=1#63958" "url": "http://www.astaro.org/showflat.php?Cat=&Number=63958&page=0&view=collapsed&sb=5&o=&fpart=1#63958"
}, },
{ {
"name" : "15666", "name": "17838",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/15666" "url": "http://secunia.com/advisories/17838"
}, },
{ {
"name": "ADV-2005-2678", "name": "ADV-2005-2678",
@ -68,9 +68,9 @@
"url": "http://www.vupen.com/english/advisories/2005/2678" "url": "http://www.vupen.com/english/advisories/2005/2678"
}, },
{ {
"name" : "17838", "name": "15666",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/17838" "url": "http://www.securityfocus.com/bid/15666"
} }
] ]
} }

View File

@ -52,40 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20071017 Oracle TNS Listener DoS and/or remote memory inspection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482423/100/0/threaded"
},
{
"name" : "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-tns-listener/",
"refsource" : "MISC",
"url" : "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-tns-listener/"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2007-092913.html"
}, },
{ {
"name" : "HPSBMA02133", "name": "20071017 Oracle TNS Listener DoS and/or remote memory inspection",
"refsource" : "HP", "refsource": "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2" "url": "http://www.securityfocus.com/archive/1/482423/100/0/threaded"
},
{
"name" : "SSRT061201",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name" : "TA07-290A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
},
{
"name" : "26103",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/26103"
}, },
{ {
"name": "ADV-2007-3524", "name": "ADV-2007-3524",
@ -97,15 +72,40 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3626" "url": "http://www.vupen.com/english/advisories/2007/3626"
}, },
{
"name": "TA07-290A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-290A.html"
},
{
"name": "SSRT061201",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name": "HPSBMA02133",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=119332677525918&w=2"
},
{
"name": "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-tns-listener/",
"refsource": "MISC",
"url": "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-oracle-tns-listener/"
},
{
"name": "26103",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26103"
},
{ {
"name": "1018823", "name": "1018823",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018823" "url": "http://www.securitytracker.com/id?1018823"
}, },
{ {
"name" : "27251", "name": "3250",
"refsource" : "SECUNIA", "refsource": "SREASON",
"url" : "http://secunia.com/advisories/27251" "url": "http://securityreason.com/securityalert/3250"
}, },
{ {
"name": "27409", "name": "27409",
@ -113,9 +113,9 @@
"url": "http://secunia.com/advisories/27409" "url": "http://secunia.com/advisories/27409"
}, },
{ {
"name" : "3250", "name": "27251",
"refsource" : "SREASON", "refsource": "SECUNIA",
"url" : "http://securityreason.com/securityalert/3250" "url": "http://secunia.com/advisories/27251"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "http://arfis.wordpress.com/2007/09/13/rfi-02-galmeta-post/" "url": "http://arfis.wordpress.com/2007/09/13/rfi-02-galmeta-post/"
}, },
{ {
"name" : "20071018 true: Galmeta Post 0.11 RFI", "name": "galmetapost-uploadconfig-file-include(37412)",
"refsource" : "VIM", "refsource": "XF",
"url" : "http://www.attrition.org/pipermail/vim/2007-October/001836.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37412"
}, },
{ {
"name": "26329", "name": "26329",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/26329" "url": "http://www.securityfocus.com/bid/26329"
}, },
{ {
"name" : "galmetapost-uploadconfig-file-include(37412)", "name": "20071018 true: Galmeta Post 0.11 RFI",
"refsource" : "XF", "refsource": "VIM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37412" "url": "http://www.attrition.org/pipermail/vim/2007-October/001836.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-2047", "ID": "CVE-2009-2047",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20090715 Vulnerabilities in Unified Contact Center Express Administration Pages",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml"
},
{
"name" : "35706",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35706"
},
{
"name" : "55936",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/55936"
},
{ {
"name": "1022569", "name": "1022569",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -77,6 +62,11 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35861" "url": "http://secunia.com/advisories/35861"
}, },
{
"name": "35706",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35706"
},
{ {
"name": "ADV-2009-1913", "name": "ADV-2009-1913",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -86,6 +76,16 @@
"name": "unified-ccx-interface-directory-traversal(51731)", "name": "unified-ccx-interface-directory-traversal(51731)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51731" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51731"
},
{
"name": "20090715 Vulnerabilities in Unified Contact Center Express Administration Pages",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080ae04b2.shtml"
},
{
"name": "55936",
"refsource": "OSVDB",
"url": "http://osvdb.org/55936"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://pridels-team.blogspot.com/2009/06/directadmin-v1336-xss-vuln.html", "name": "directadmin-cmdredirect-xss(51292)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://pridels-team.blogspot.com/2009/06/directadmin-v1336-xss-vuln.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51292"
},
{
"name" : "35450",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35450"
}, },
{ {
"name": "35525", "name": "35525",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35525" "url": "http://secunia.com/advisories/35525"
}, },
{
"name": "35450",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35450"
},
{ {
"name": "ADV-2009-1663", "name": "ADV-2009-1663",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1663" "url": "http://www.vupen.com/english/advisories/2009/1663"
}, },
{ {
"name" : "directadmin-cmdredirect-xss(51292)", "name": "http://pridels-team.blogspot.com/2009/06/directadmin-v1336-xss-vuln.html",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51292" "url": "http://pridels-team.blogspot.com/2009/06/directadmin-v1336-xss-vuln.html"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "8756",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/8756"
},
{ {
"name": "35054", "name": "35054",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/35054" "url": "http://www.securityfocus.com/bid/35054"
}, },
{
"name" : "35187",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35187"
},
{ {
"name": "aspinline-activeappointments-sql-injection(50667)", "name": "aspinline-activeappointments-sql-injection(50667)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50667" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50667"
},
{
"name": "8756",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/8756"
},
{
"name": "35187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35187"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2009-2524", "ID": "CVE-2009-2524",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS09-059",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-059"
},
{ {
"name": "TA09-286A", "name": "TA09-286A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-286A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA09-286A.html"
}, },
{
"name": "MS09-059",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-059"
},
{ {
"name": "oval:org.mitre.oval:def:6263", "name": "oval:org.mitre.oval:def:6263",
"refsource": "OVAL", "refsource": "OVAL",

View File

@ -53,74 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "name": "oval:org.mitre.oval:def:11115",
"refsource" : "BUGTRAQ", "refsource": "OVAL",
"url" : "http://www.securityfocus.com/archive/1/507985/100/0/threaded" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11115"
},
{
"name" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
"refsource" : "CONFIRM",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"name" : "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20",
"refsource" : "CONFIRM",
"url" : "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20"
},
{
"name" : "http://java.sun.com/javase/6/webnotes/6u15.html",
"refsource" : "CONFIRM",
"url" : "http://java.sun.com/javase/6/webnotes/6u15.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name" : "APPLE-SA-2009-09-03-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"name" : "FEDORA-2009-8329",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"
},
{
"name" : "FEDORA-2009-8337",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"
},
{
"name" : "GLSA-200911-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"name" : "HPSBUX02476",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=125787273209737&w=2"
},
{
"name" : "SSRT090250",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=125787273209737&w=2"
},
{
"name" : "MDVSA-2009:209",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"
},
{
"name" : "RHSA-2009:1199",
"refsource" : "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2009-1199.html"
}, },
{ {
"name": "RHSA-2009:1200", "name": "RHSA-2009:1200",
@ -128,54 +63,9 @@
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
}, },
{ {
"name" : "RHSA-2009:1201", "name": "RHSA-2009:1199",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2009-1201.html" "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html"
},
{
"name" : "263409",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1"
},
{
"name" : "SUSE-SA:2009:043",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html"
},
{
"name" : "SUSE-SR:2009:016",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"
},
{
"name" : "SUSE-SA:2009:053",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"name" : "TA09-294A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name" : "35943",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35943"
},
{
"name" : "oval:org.mitre.oval:def:11115",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11115"
},
{
"name" : "oval:org.mitre.oval:def:8259",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8259"
},
{
"name" : "1022659",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1022659"
}, },
{ {
"name": "36162", "name": "36162",
@ -183,14 +73,34 @@
"url": "http://secunia.com/advisories/36162" "url": "http://secunia.com/advisories/36162"
}, },
{ {
"name" : "36176", "name": "ADV-2009-2543",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/36176" "url": "http://www.vupen.com/english/advisories/2009/2543"
}, },
{ {
"name" : "36180", "name": "sun-jre-socks-info-disclosure(52336)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52336"
},
{
"name": "37460",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/36180" "url": "http://secunia.com/advisories/37460"
},
{
"name": "GLSA-200911-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "HPSBUX02476",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=125787273209737&w=2"
}, },
{ {
"name": "36199", "name": "36199",
@ -202,25 +112,115 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36248" "url": "http://secunia.com/advisories/36248"
}, },
{
"name": "MDVSA-2009:209",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"
},
{
"name": "FEDORA-2009-8329",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"
},
{
"name": "SSRT090250",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=125787273209737&w=2"
},
{
"name": "http://java.sun.com/javase/6/webnotes/6u15.html",
"refsource": "CONFIRM",
"url": "http://java.sun.com/javase/6/webnotes/6u15.html"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "TA09-294A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name": "35943",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35943"
},
{
"name": "36180",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36180"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
"refsource": "CONFIRM",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"name": "263409",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1"
},
{
"name": "36176",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36176"
},
{
"name": "FEDORA-2009-8337",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"
},
{
"name": "1022659",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022659"
},
{
"name": "SUSE-SR:2009:016",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"
},
{ {
"name": "37300", "name": "37300",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37300" "url": "http://secunia.com/advisories/37300"
}, },
{
"name": "APPLE-SA-2009-09-03-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"name": "SUSE-SA:2009:053",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"name": "RHSA-2009:1201",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"name": "SUSE-SA:2009:043",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html"
},
{ {
"name": "37386", "name": "37386",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37386" "url": "http://secunia.com/advisories/37386"
}, },
{ {
"name" : "37460", "name": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/37460" "url": "http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20"
},
{
"name" : "ADV-2009-2543",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/2543"
}, },
{ {
"name": "ADV-2009-3316", "name": "ADV-2009-3316",
@ -228,9 +228,9 @@
"url": "http://www.vupen.com/english/advisories/2009/3316" "url": "http://www.vupen.com/english/advisories/2009/3316"
}, },
{ {
"name" : "sun-jre-socks-info-disclosure(52336)", "name": "oval:org.mitre.oval:def:8259",
"refsource" : "XF", "refsource": "OVAL",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/52336" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8259"
} }
] ]
} }

View File

@ -52,31 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20091102 NSOADV-2009-001: Symantec ConsoleUtilities ActiveX Control Buffer Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/507625/100/0/threaded"
},
{ {
"name": "http://sotiriu.de/adv/NSOADV-2009-001.txt", "name": "http://sotiriu.de/adv/NSOADV-2009-001.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://sotiriu.de/adv/NSOADV-2009-001.txt" "url": "http://sotiriu.de/adv/NSOADV-2009-001.txt"
}, },
{
"name" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091102_00",
"refsource" : "CONFIRM",
"url" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091102_00"
},
{
"name" : "https://kb.altiris.com/article.asp?article=49389&p=1",
"refsource" : "CONFIRM",
"url" : "https://kb.altiris.com/article.asp?article=49389&p=1"
},
{
"name" : "https://kb.altiris.com/article.asp?article=49568&p=1",
"refsource" : "CONFIRM",
"url" : "https://kb.altiris.com/article.asp?article=49568&p=1"
},
{ {
"name": "36698", "name": "36698",
"refsource": "BID", "refsource": "BID",
@ -86,6 +66,26 @@
"name": "ADV-2009-3117", "name": "ADV-2009-3117",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3117" "url": "http://www.vupen.com/english/advisories/2009/3117"
},
{
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091102_00",
"refsource": "CONFIRM",
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091102_00"
},
{
"name": "20091102 NSOADV-2009-001: Symantec ConsoleUtilities ActiveX Control Buffer Overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/507625/100/0/threaded"
},
{
"name": "https://kb.altiris.com/article.asp?article=49568&p=1",
"refsource": "CONFIRM",
"url": "https://kb.altiris.com/article.asp?article=49568&p=1"
},
{
"name": "https://kb.altiris.com/article.asp?article=49389&p=1",
"refsource": "CONFIRM",
"url": "https://kb.altiris.com/article.asp?article=49389&p=1"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "9480",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/9480"
},
{ {
"name": "36450", "name": "36450",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -66,6 +61,11 @@
"name": "superchargedlinking-browse-sql-injection(52693)", "name": "superchargedlinking-browse-sql-injection(52693)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52693" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52693"
},
{
"name": "9480",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/9480"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2009-3997", "ID": "CVE-2009-3997",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20091217 Secunia Research: Winamp Oktalyzer Parsing Integer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/508524/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2009-57/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2009-57/"
},
{ {
"name": "http://forums.winamp.com/showthread.php?threadid=315355", "name": "http://forums.winamp.com/showthread.php?threadid=315355",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://forums.winamp.com/showthread.php?threadid=315355" "url": "http://forums.winamp.com/showthread.php?threadid=315355"
}, },
{
"name": "20091217 Secunia Research: Winamp Oktalyzer Parsing Integer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/508524/100/0/threaded"
},
{ {
"name": "37374", "name": "37374",
"refsource": "BID", "refsource": "BID",
@ -86,6 +81,11 @@
"name": "ADV-2009-3575", "name": "ADV-2009-3575",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3575" "url": "http://www.vupen.com/english/advisories/2009/3575"
},
{
"name": "http://secunia.com/secunia_research/2009-57/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2009-57/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-0379", "ID": "CVE-2015-0379",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "oracle-cpujan2015-cve20150379(100111)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100111"
},
{
"name": "1031577",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031577"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,16 +71,6 @@
"name": "72244", "name": "72244",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/72244" "url": "http://www.securityfocus.com/bid/72244"
},
{
"name" : "1031577",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031577"
},
{
"name" : "oracle-cpujan2015-cve20150379(100111)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/100111"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-0449", "ID": "CVE-2015-0449",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@suse.com",
"ID": "CVE-2015-0779", "ID": "CVE-2015-0779",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/rapid7/metasploit-framework/pull/5096",
"refsource": "MISC",
"url": "https://github.com/rapid7/metasploit-framework/pull/5096"
},
{ {
"name": "36964", "name": "36964",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/36964/" "url": "https://www.exploit-db.com/exploits/36964/"
}, },
{ {
"name" : "20150407 [CVE-2015-0779]: Novell ZenWorks Configuration Management remote code execution", "name": "https://www.novell.com/support/kb/doc.php?id=7016419",
"refsource" : "FULLDISC", "refsource": "CONFIRM",
"url" : "http://seclists.org/fulldisclosure/2015/Apr/21" "url": "https://www.novell.com/support/kb/doc.php?id=7016419"
},
{
"name" : "https://github.com/rapid7/metasploit-framework/pull/5096",
"refsource" : "MISC",
"url" : "https://github.com/rapid7/metasploit-framework/pull/5096"
}, },
{ {
"name": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/zenworks_zcm_rce.txt", "name": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/zenworks_zcm_rce.txt",
@ -73,9 +73,9 @@
"url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/zenworks_zcm_rce.txt" "url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/zenworks_zcm_rce.txt"
}, },
{ {
"name" : "https://www.novell.com/support/kb/doc.php?id=7016419", "name": "20150407 [CVE-2015-0779]: Novell ZenWorks Configuration Management remote code execution",
"refsource" : "CONFIRM", "refsource": "FULLDISC",
"url" : "https://www.novell.com/support/kb/doc.php?id=7016419" "url": "http://seclists.org/fulldisclosure/2015/Apr/21"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4224", "ID": "CVE-2015-4224",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20150625 Cisco Wireless LAN Controller Command Injection Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=39517"
},
{ {
"name": "75415", "name": "75415",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75415" "url": "http://www.securityfocus.com/bid/75415"
}, },
{
"name": "20150625 Cisco Wireless LAN Controller Command Injection Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39517"
},
{ {
"name": "1032728", "name": "1032728",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4329", "ID": "CVE-2015-4329",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20150818 Cisco TelePresence Video Communication Server Expressway Command Injection Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=40523"
},
{ {
"name": "76395", "name": "76395",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "1033329", "name": "1033329",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033329" "url": "http://www.securitytracker.com/id/1033329"
},
{
"name": "20150818 Cisco TelePresence Video Communication Server Expressway Command Injection Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40523"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)", "name": "72957",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2015/04/25/6" "url": "http://www.securityfocus.com/bid/72957"
}, },
{ {
"name": "https://www.drupal.org/node/2445977", "name": "https://www.drupal.org/node/2445977",
@ -63,9 +63,9 @@
"url": "https://www.drupal.org/node/2445977" "url": "https://www.drupal.org/node/2445977"
}, },
{ {
"name" : "72957", "name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/72957" "url": "http://www.openwall.com/lists/oss-security/2015/04/25/6"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "74343",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74343"
},
{ {
"name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)", "name": "[oss-security] 20150425 CVE requests for Drupal contributed modules (from SA-CONTRIB-2015-034 to SA-CONTRIB-2015-099)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/25/6" "url": "http://www.openwall.com/lists/oss-security/2015/04/25/6"
}, },
{
"name" : "https://www.drupal.org/node/2459323",
"refsource" : "MISC",
"url" : "https://www.drupal.org/node/2459323"
},
{
"name" : "https://www.drupal.org/node/2459031",
"refsource" : "CONFIRM",
"url" : "https://www.drupal.org/node/2459031"
},
{ {
"name": "https://www.drupal.org/node/2459035", "name": "https://www.drupal.org/node/2459035",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2459035" "url": "https://www.drupal.org/node/2459035"
}, },
{ {
"name" : "74343", "name": "https://www.drupal.org/node/2459031",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/74343" "url": "https://www.drupal.org/node/2459031"
},
{
"name": "https://www.drupal.org/node/2459323",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2459323"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-4751", "ID": "CVE-2015-4751",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,26 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20151106 Re: Review+CVE request: multiple issues in redis EVAL command (lua sandbox)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/11/06/4"
},
{
"name" : "[oss-security] 20151106 Review+CVE request: multiple issues in redis EVAL command (lua sandbox)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/11/06/2"
},
{
"name" : "https://github.com/antirez/redis/issues/2855",
"refsource" : "MISC",
"url" : "https://github.com/antirez/redis/issues/2855"
},
{ {
"name": "https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES", "name": "https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES" "url": "https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES"
}, },
{
"name": "openSUSE-SU-2016:1444",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00126.html"
},
{
"name": "RHSA-2016:0097",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0097.html"
},
{ {
"name": "https://raw.githubusercontent.com/antirez/redis/3.0/00-RELEASENOTES", "name": "https://raw.githubusercontent.com/antirez/redis/3.0/00-RELEASENOTES",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -82,20 +77,25 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3412" "url": "http://www.debian.org/security/2015/dsa-3412"
}, },
{
"name" : "GLSA-201702-16",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201702-16"
},
{ {
"name": "RHSA-2016:0095", "name": "RHSA-2016:0095",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0095.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-0095.html"
}, },
{ {
"name" : "RHSA-2016:0097", "name": "[oss-security] 20151106 Review+CVE request: multiple issues in redis EVAL command (lua sandbox)",
"refsource" : "REDHAT", "refsource": "MLIST",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0097.html" "url": "http://www.openwall.com/lists/oss-security/2015/11/06/2"
},
{
"name": "77507",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/77507"
},
{
"name": "https://github.com/antirez/redis/issues/2855",
"refsource": "MISC",
"url": "https://github.com/antirez/redis/issues/2855"
}, },
{ {
"name": "RHSA-2016:0096", "name": "RHSA-2016:0096",
@ -103,14 +103,14 @@
"url": "http://rhn.redhat.com/errata/RHSA-2016-0096.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-0096.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1444", "name": "GLSA-201702-16",
"refsource" : "SUSE", "refsource": "GENTOO",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00126.html" "url": "https://security.gentoo.org/glsa/201702-16"
}, },
{ {
"name" : "77507", "name": "[oss-security] 20151106 Re: Review+CVE request: multiple issues in redis EVAL command (lua sandbox)",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/77507" "url": "http://www.openwall.com/lists/oss-security/2015/11/06/4"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "RHSA-2016:2919",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2919.html"
},
{
"name": "94633",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94633"
},
{ {
"name": "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html", "name": "https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,16 +76,6 @@
"name": "GLSA-201612-11", "name": "GLSA-201612-11",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-11" "url": "https://security.gentoo.org/glsa/201612-11"
},
{
"name" : "RHSA-2016:2919",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2919.html"
},
{
"name" : "94633",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94633"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2359", "ID": "CVE-2018-2359",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,16 +53,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://launchpad.support.sap.com/#/notes/2707024",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2707024"
},
{ {
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699", "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699",
"refsource": "MISC", "refsource": "MISC",
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699" "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699"
}, },
{
"name": "https://launchpad.support.sap.com/#/notes/2707024",
"refsource": "MISC",
"url": "https://launchpad.support.sap.com/#/notes/2707024"
},
{ {
"name": "106157", "name": "106157",
"refsource": "BID", "refsource": "BID",

View File

@ -81,6 +81,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1040694",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040694"
},
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -90,11 +95,6 @@
"name": "103873", "name": "103873",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/103873" "url": "http://www.securityfocus.com/bid/103873"
},
{
"name" : "1040694",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040694"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-7979", "ID": "CVE-2018-7979",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com", "ASSIGNER": "security@google.com",
"ID": "CVE-2019-5755", "ID": "CVE-2019-5755",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -54,19 +54,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://crbug.com/913296", "name": "106767",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://crbug.com/913296" "url": "http://www.securityfocus.com/bid/106767"
},
{
"name" : "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"refsource" : "CONFIRM",
"url" : "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"name" : "DSA-4395",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2019/dsa-4395"
}, },
{ {
"name": "RHSA-2019:0309", "name": "RHSA-2019:0309",
@ -74,9 +64,19 @@
"url": "https://access.redhat.com/errata/RHSA-2019:0309" "url": "https://access.redhat.com/errata/RHSA-2019:0309"
}, },
{ {
"name" : "106767", "name": "DSA-4395",
"refsource" : "BID", "refsource": "DEBIAN",
"url" : "http://www.securityfocus.com/bid/106767" "url": "https://www.debian.org/security/2019/dsa-4395"
},
{
"name": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/913296",
"refsource": "MISC",
"url": "https://crbug.com/913296"
} }
] ]
} }