"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:59:52 +00:00
parent fe4343059c
commit 16e5ef7de5
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 3578 additions and 3632 deletions

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "RHSA-2002:004",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2002-004.html"
},
{
"name": "MDKSA-2002:012",
"refsource": "MANDRAKE",
@ -72,6 +67,11 @@
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7881"
},
{
"name": "RHSA-2002:004",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2002-004.html"
},
{
"name": "3869",
"refsource": "BID",

View File

@ -52,6 +52,36 @@
},
"references": {
"reference_data": [
{
"name": "4509",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4509"
},
{
"name": "melange-chat-yell-bo(8842)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8842.php"
},
{
"name": "4510",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4510"
},
{
"name": "4508",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4508"
},
{
"name": "melange-chat-config-bo(8845)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8845.php"
},
{
"name": "melange-chat-filename-bo(8846)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8846.php"
},
{
"name": "20020414 Vulnerabilities in the Melange Chat Server",
"refsource": "BUGTRAQ",
@ -61,36 +91,6 @@
"name": "20020416 Melange Chat POC DOS",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/267932"
},
{
"name" : "4510",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/4510"
},
{
"name" : "melange-chat-config-bo(8845)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/8845.php"
},
{
"name" : "melange-chat-yell-bo(8842)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/8842.php"
},
{
"name" : "4508",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/4508"
},
{
"name" : "4509",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/4509"
},
{
"name" : "melange-chat-filename-bo(8846)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/8846.php"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20020712 Several problems in CARE 2002",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-07/0128.html"
"name": "5219",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5219"
},
{
"name": "http://www.care2x.com/modul.php?thispage=headlines&m_titel=NEWS&m_item=Headlines&lang=en",
@ -63,9 +63,9 @@
"url": "http://www.care2x.com/modul.php?thispage=headlines&m_titel=NEWS&m_item=Headlines&lang=en"
},
{
"name" : "5219",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/5219"
"name": "20020712 Several problems in CARE 2002",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0128.html"
},
{
"name": "care2002-sql-injection(9553)",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "mssql-agent-create-files(10257)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10257.php"
},
{
"name": "MS02-056",
"refsource": "MS",
@ -61,11 +66,6 @@
"name": "N-003",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/n-003.shtml"
},
{
"name" : "mssql-agent-create-files(10257)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/10257.php"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20021204 SAP database local root via symlink",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=103903565829796&w=2"
},
{
"name" : "http://www.sapdb.org/sap_db_alert.htm",
"refsource" : "CONFIRM",
"url" : "http://www.sapdb.org/sap_db_alert.htm"
},
{
"name": "sap-db-lserversrv-symlink(10762)",
"refsource": "XF",
@ -71,6 +61,16 @@
"name": "6316",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6316"
},
{
"name": "http://www.sapdb.org/sap_db_alert.htm",
"refsource": "CONFIRM",
"url": "http://www.sapdb.org/sap_db_alert.htm"
},
{
"name": "20021204 SAP database local root via symlink",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=103903565829796&w=2"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "mdaemon-weak-encryption(9025)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9025"
},
{
"name": "20020507 Multiple Vulnerabilities in MDaemon + WorldClient",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "4686",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4686"
},
{
"name" : "mdaemon-weak-encryption(9025)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/9025"
}
]
}

View File

@ -53,15 +53,20 @@
"references": {
"reference_data": [
{
"name" : "2002032 Automatically opening IE + Executing attachments",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=101680576827641&w=2"
"name": "msviewer-tvideo-execute-attachment(8609)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8609"
},
{
"name": "2002032 Automatically opening IE + Executing attachments",
"refsource": "NTBUGTRAQ",
"url": "http://marc.info/?l=ntbugtraq&m=101680201823534&w=2"
},
{
"name": "2002032 Automatically opening IE + Executing attachments",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=101680576827641&w=2"
},
{
"name": "http://security.greymagic.com/adv/gm002-ie/",
"refsource": "MISC",
@ -71,11 +76,6 @@
"name": "4343",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4343"
},
{
"name" : "msviewer-tvideo-execute-attachment(8609)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/8609"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20021111 Buffer Overflow in iSMTP Gateway",
"refsource" : "BUGTRAQ",
"url" : "http://online.securityfocus.com/archive/1/299232"
},
{
"name": "http://www.nii.co.in/vuln/ismtp.html",
"refsource": "MISC",
"url": "http://www.nii.co.in/vuln/ismtp.html"
},
{
"name" : "6151",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/6151"
"name": "20021111 Buffer Overflow in iSMTP Gateway",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/299232"
},
{
"name": "ismtp-mailfrom-command-bo(10577)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10577.php"
},
{
"name": "6151",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6151"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-11/0361.html"
},
{
"name" : "6280",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/6280"
},
{
"name": "winxp-fus-processes-disclosure(10736)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10736"
},
{
"name": "6280",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6280"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://www.gordano.com/kb.htm?q=1709",
"refsource" : "CONFIRM",
"url" : "http://www.gordano.com/kb.htm?q=1709"
"name": "1005650",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1005650"
},
{
"name": "6209",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6209"
},
{
"name" : "1005650",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1005650"
},
{
"name": "gmsmail-juce-filter-bypass(10657)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10657.php"
},
{
"name": "http://www.gordano.com/kb.htm?q=1709",
"refsource": "CONFIRM",
"url": "http://www.gordano.com/kb.htm?q=1709"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "RHSA-2003:181",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2003-181.html"
},
{
"name": "RHSA-2003:182",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2003-182.html"
},
{
"name": "RHSA-2003:181",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2003-181.html"
},
{
"name": "MDKSA-2003:065",
"refsource": "MANDRAKE",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2005-1219",
"STATE": "PUBLIC"
},
@ -62,45 +62,45 @@
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA05-193A.html"
},
{
"name" : "VU#720742",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/720742"
},
{
"name" : "14214",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/14214"
},
{
"name" : "oval:org.mitre.oval:def:330",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A330"
},
{
"name" : "oval:org.mitre.oval:def:440",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A440"
},
{
"name": "oval:org.mitre.oval:def:769",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A769"
},
{
"name" : "oval:org.mitre.oval:def:1125",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1125"
"name": "VU#720742",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/720742"
},
{
"name": "oval:org.mitre.oval:def:1280",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1280"
},
{
"name": "oval:org.mitre.oval:def:440",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A440"
},
{
"name": "16004",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16004/"
},
{
"name": "14214",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14214"
},
{
"name": "oval:org.mitre.oval:def:1125",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1125"
},
{
"name": "oval:org.mitre.oval:def:330",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A330"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "arcadescript-user-sql-injection(49500)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49500"
},
{
"name": "34506",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34506"
},
{
"name": "34284",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34284"
},
{
"name": "8304",
"refsource": "EXPLOIT-DB",
@ -61,21 +76,6 @@
"name": "http://z0rlu.blogspot.com/2009/03/arcadwy-arcade-script-auth-bypass.html",
"refsource": "MISC",
"url": "http://z0rlu.blogspot.com/2009/03/arcadwy-arcade-script-auth-bypass.html"
},
{
"name" : "34284",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/34284"
},
{
"name" : "34506",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34506"
},
{
"name" : "arcadescript-user-sql-injection(49500)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49500"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-5026",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20111018 Re: MySQL executable comment execution on MySQL slave server (from 2009)",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2011/q4/101"
},
{
"name" : "http://bugs.mysql.com/bug.php?id=49124",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=640177",
"refsource": "CONFIRM",
"url" : "http://bugs.mysql.com/bug.php?id=49124"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=640177"
},
{
"name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html",
@ -68,20 +63,25 @@
"url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html"
},
{
"name" : "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html",
"name": "http://bugs.mysql.com/bug.php?id=49124",
"refsource": "CONFIRM",
"url" : "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=640177",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=640177"
"url": "http://bugs.mysql.com/bug.php?id=49124"
},
{
"name": "SUSE-SU-2012:0984",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
},
{
"name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html",
"refsource": "CONFIRM",
"url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html"
},
{
"name": "[oss-security] 20111018 Re: MySQL executable comment execution on MySQL slave server (from 2009)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2011/q4/101"
},
{
"name": "49179",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0050",
"STATE": "PUBLIC"
},
@ -53,30 +53,50 @@
"references": {
"reference_data": [
{
"name" : "http://www.openssl.org/news/secadv_20120118.txt",
"refsource" : "CONFIRM",
"url" : "http://www.openssl.org/news/secadv_20120118.txt"
},
{
"name" : "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc",
"refsource" : "CONFIRM",
"url" : "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc"
},
{
"name" : "http://support.apple.com/kb/HT5784",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5784"
"name": "48528",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48528"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564"
},
{
"name": "MDVSA-2012:011",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:011"
},
{
"name": "47755",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47755"
},
{
"name": "1026548",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026548"
},
{
"name": "78320",
"refsource": "OSVDB",
"url": "http://osvdb.org/78320"
},
{
"name": "http://support.apple.com/kb/HT5784",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5784"
},
{
"name": "APPLE-SA-2013-06-04-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
},
{
"name": "51563",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/51563"
},
{
"name": "DSA-2392",
"refsource": "DEBIAN",
@ -87,75 +107,55 @@
"refsource": "HP",
"url": "http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03169289"
},
{
"name" : "SSRT100747",
"refsource" : "HP",
"url" : "http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03169289"
},
{
"name": "HPSBOV02793",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2"
},
{
"name" : "SSRT100891",
"name": "57353",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57353"
},
{
"name": "SSRT100747",
"refsource": "HP",
"url" : "http://marc.info/?l=bugtraq&m=134039053214295&w=2"
},
{
"name" : "HPSBMU02776",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133951357207000&w=2"
},
{
"name" : "SSRT100852",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133951357207000&w=2"
},
{
"name" : "MDVSA-2012:011",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:011"
},
{
"name" : "51563",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/51563"
},
{
"name" : "78320",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/78320"
},
{
"name" : "1026548",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1026548"
"url": "http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03169289"
},
{
"name": "47631",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47631"
},
{
"name": "SSRT100891",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2"
},
{
"name": "SSRT100852",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2"
},
{
"name": "47677",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47677"
},
{
"name" : "47755",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/47755"
"name": "HPSBMU02776",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2"
},
{
"name" : "48528",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48528"
"name": "http://www.openssl.org/news/secadv_20120118.txt",
"refsource": "CONFIRM",
"url": "http://www.openssl.org/news/secadv_20120118.txt"
},
{
"name" : "57353",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/57353"
"name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc",
"refsource": "CONFIRM",
"url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-0500",
"STATE": "PUBLIC"
},
@ -52,28 +52,58 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
},
{
"name" : "HPSBMU02797",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
},
{
"name" : "HPSBUX02757",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133364885411663&w=2"
},
{
"name": "HPSBUX02784",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133847939902305&w=2"
},
{
"name" : "SSRT100779",
"name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html"
},
{
"name": "HPSBMU02799",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
},
{
"name": "48589",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48589"
},
{
"name": "52015",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52015"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "SUSE-SU-2012:0603",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html"
},
{
"name": "48073",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48073"
},
{
"name": "48950",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48950"
},
{
"name": "SSRT100871",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133847939902305&w=2"
},
{
"name": "HPSBUX02757",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133364885411663&w=2"
},
@ -82,55 +112,25 @@
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
},
{
"name" : "SSRT100871",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133847939902305&w=2"
},
{
"name" : "HPSBMU02799",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
},
{
"name" : "RHSA-2013:1455",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "RHSA-2012:0514",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0514.html"
},
{
"name" : "SUSE-SU-2012:0603",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html"
},
{
"name" : "52015",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/52015"
},
{
"name": "oval:org.mitre.oval:def:14844",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14844"
},
{
"name" : "48589",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48589"
"name": "SSRT100779",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133364885411663&w=2"
},
{
"name" : "48950",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48950"
},
{
"name" : "48073",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48073"
"name": "HPSBMU02797",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-0525",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
},
{
"name" : "MDVSA-2013:150",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name": "SUSE-SU-2012:1020",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00018.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
},
{
"name": "1026929",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026929"
},
{
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
}
]
}

View File

@ -57,16 +57,16 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/522005"
},
{
"name" : "http://www.ieee-security.org/TC/SP2012/program.html",
"refsource" : "MISC",
"url" : "http://www.ieee-security.org/TC/SP2012/program.html"
},
{
"name": "52604",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52604"
},
{
"name": "http://www.ieee-security.org/TC/SP2012/program.html",
"refsource": "MISC",
"url": "http://www.ieee-security.org/TC/SP2012/program.html"
},
{
"name": "80429",
"refsource": "OSVDB",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-1750",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "solaris-mailx1-cve20121750(77051)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77051"
},
{
"name": "1027274",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027274"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"refsource": "CONFIRM",
@ -66,16 +76,6 @@
"name": "83933",
"refsource": "OSVDB",
"url": "http://osvdb.org/83933"
},
{
"name" : "1027274",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1027274"
},
{
"name" : "solaris-mailx1-cve20121750(77051)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/77051"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2012-3032",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "http://en.securitylab.ru/lab/PT-2012-44"
},
{
"name" : "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf",
"refsource" : "MISC",
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf"
},
{
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf",
"refsource": "CONFIRM",
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-864051.pdf"
},
{
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf",
"refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-256-01.pdf"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2012-3607",
"STATE": "PUBLIC"
},
@ -52,46 +52,46 @@
},
"references": {
"reference_data": [
{
"name": "APPLE-SA-2012-09-19-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"name": "http://support.apple.com/kb/HT5485",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5485"
},
{
"name" : "http://support.apple.com/kb/HT5502",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5502"
},
{
"name": "http://support.apple.com/kb/HT5642",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5642"
},
{
"name" : "APPLE-SA-2012-09-12-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"name" : "APPLE-SA-2012-09-19-3",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html"
},
{
"name" : "APPLE-SA-2013-01-28-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
"name": "http://support.apple.com/kb/HT5502",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5502"
},
{
"name": "55534",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55534"
},
{
"name": "APPLE-SA-2012-09-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"name": "oval:org.mitre.oval:def:17269",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17269"
},
{
"name": "APPLE-SA-2013-01-28-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
},
{
"name": "apple-itunes-webkit-cve20123607(78556)",
"refsource": "XF",

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20120801 nvidia linux binary driver priv escalation exploit",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2012/Aug/4"
},
{
"name" : "20120804 nvidia linux binary driver priv escalation exploit",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2012/Aug/76"
},
{
"name": "[oss-security] 20120801 CVE Request: NVidia Linux driver",
"refsource": "MLIST",
@ -77,10 +67,20 @@
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3140"
},
{
"name": "20120804 nvidia linux binary driver priv escalation exploit",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2012/Aug/76"
},
{
"name": "GLSA-201304-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201304-01.xml"
},
{
"name": "20120801 nvidia linux binary driver priv escalation exploit",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2012/Aug/4"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10022",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10022"
},
{
"name": "mcafee-emm-about-xss(78222)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78222"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10022",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10022"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2012-6069",
"STATE": "PUBLIC"
},
@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "56300",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56300"
},
{
"name": "http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html",
"refsource": "CONFIRM",
"url": "http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html"
},
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01"
},
{
"name": "http://www.digitalbond.com/tools/basecamp/3s-codesys/",
"refsource": "MISC",
@ -61,21 +76,6 @@
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf",
"refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf"
},
{
"name" : "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01",
"refsource" : "MISC",
"url" : "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01"
},
{
"name" : "http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html",
"refsource" : "CONFIRM",
"url" : "http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html"
},
{
"name" : "56300",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/56300"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-2021",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT207615",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207615"
},
{
"name": "97140",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97140"
},
{
"name": "https://support.apple.com/HT207615",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207615"
},
{
"name": "1038138",
"refsource": "SECTRACK",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-2605",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "GLSA-201706-26",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-26"
},
{
"name": "1037949",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037949"
},
{
"name": "https://github.com/vim/vim/commit/0c8485f0e4931463c0f7986e1ea84a7d79f10c75",
"refsource": "MISC",
@ -62,25 +72,15 @@
"refsource": "MISC",
"url": "https://groups.google.com/forum/#!topic/vim_dev/L_dOHOOiQ5Q"
},
{
"name" : "https://groups.google.com/forum/#!topic/vim_dev/QPZc0CY9j3Y",
"refsource" : "MISC",
"url" : "https://groups.google.com/forum/#!topic/vim_dev/QPZc0CY9j3Y"
},
{
"name" : "GLSA-201706-26",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201706-26"
},
{
"name": "96448",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96448"
},
{
"name" : "1037949",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037949"
"name": "https://groups.google.com/forum/#!topic/vim_dev/QPZc0CY9j3Y",
"refsource": "MISC",
"url": "https://groups.google.com/forum/#!topic/vim_dev/QPZc0CY9j3Y"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1038122",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038122"
},
{
"name": "https://erpscan.io/advisories/erpscan-17-011-sap-gui-versions-remote-code-execution-bypass-security-policy/",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "96872",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96872"
},
{
"name" : "1038122",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038122"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=21137",
"refsource" : "CONFIRM",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=21137"
},
{
"name": "GLSA-201709-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201709-02"
},
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=21137",
"refsource": "CONFIRM",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=21137"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/HT207800",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207800"
},
{
"name": "42555",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42555/"
},
{
"name": "98571",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98571"
},
{
"name": "https://support.apple.com/HT207798",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207798"
},
{
"name" : "https://support.apple.com/HT207800",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207800"
},
{
"name": "https://support.apple.com/HT207801",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207801"
},
{
"name" : "98571",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/98571"
}
]
}

View File

@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/",
"refsource" : "MISC",
"url" : "https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/"
},
{
"name": "https://bugs.exim.org/show_bug.cgi?id=2052",
"refsource": "CONFIRM",
"url": "https://bugs.exim.org/show_bug.cgi?id=2052"
},
{
"name" : "https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date",
"refsource" : "CONFIRM",
"url" : "https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date"
},
{
"name" : "https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date",
"refsource" : "CONFIRM",
"url" : "https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date"
},
{
"name" : "https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date",
"refsource" : "CONFIRM",
"url" : "https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date"
},
{
"name" : "https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date",
"refsource" : "CONFIRM",
"url" : "https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date"
},
{
"name": "GLSA-201710-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201710-09"
},
{
"name" : "GLSA-201710-25",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201710-25"
"name": "https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date",
"refsource": "CONFIRM",
"url": "https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date"
},
{
"name": "https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date",
"refsource": "CONFIRM",
"url": "https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date"
},
{
"name": "https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date",
"refsource": "CONFIRM",
"url": "https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date"
},
{
"name": "97030",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97030"
},
{
"name": "https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/",
"refsource": "MISC",
"url": "https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/"
},
{
"name": "https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date",
"refsource": "CONFIRM",
"url": "https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date"
},
{
"name": "RHSA-2018:2486",
@ -98,9 +98,9 @@
"url": "https://access.redhat.com/errata/RHSA-2018:2486"
},
{
"name" : "97030",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/97030"
"name": "GLSA-201710-25",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201710-25"
}
]
}

View File

@ -75,16 +75,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1344034",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1344034"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2017-18/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2017-18/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-19/",
"refsource": "CONFIRM",
@ -100,6 +90,16 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100243"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-18/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-18/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1344034",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1344034"
},
{
"name": "1039124",
"refsource": "SECTRACK",

View File

@ -2,30 +2,7 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-10093",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
@ -34,38 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow Remote Code Execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://packetstormsecurity.com/files/151116/AudioCode-400HD-Remote-Command-Injection.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/151116/AudioCode-400HD-Remote-Command-Injection.html"
},
{
"url": "http://seclists.org/fulldisclosure/2019/Jan/38",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2019/Jan/38"
},
{
"url": "https://www.exploit-db.com/exploits/46164/",
"refsource": "MISC",
"name": "https://www.exploit-db.com/exploits/46164/"
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-15785",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1041809",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041809"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "105432",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105432"
},
{
"name" : "1041809",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041809"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20190211 [SECURITY] [DLA 1673-1] wordpress security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2019/02/msg00019.html"
},
{
"name" : "https://codex.wordpress.org/Version_4.9.9",
"refsource" : "MISC",
"url" : "https://codex.wordpress.org/Version_4.9.9"
},
{
"name" : "https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a",
"refsource" : "MISC",
"url" : "https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a"
},
{
"name" : "https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/",
"refsource" : "MISC",
"url" : "https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/"
"name": "106220",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106220"
},
{
"name": "https://wordpress.org/support/wordpress-version/version-5-0-1/",
@ -78,24 +63,39 @@
"url": "https://wordpress.org/support/wordpress-version/version-5-0-1/"
},
{
"name" : "https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/",
"name": "https://codex.wordpress.org/Version_4.9.9",
"refsource": "MISC",
"url" : "https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/"
"url": "https://codex.wordpress.org/Version_4.9.9"
},
{
"name": "https://wpvulndb.com/vulnerabilities/9175",
"refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/9175"
},
{
"name": "https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a",
"refsource": "MISC",
"url": "https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a"
},
{
"name": "DSA-4401",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4401"
},
{
"name" : "106220",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/106220"
"name": "https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/",
"refsource": "MISC",
"url": "https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/"
},
{
"name": "[debian-lts-announce] 20190211 [SECURITY] [DLA 1673-1] wordpress security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00019.html"
},
{
"name": "https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/",
"refsource": "MISC",
"url": "https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/"
}
]
}