mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
dba4b21c5c
commit
1fc1f0a87c
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050127 [SIG^2 G-TEC] Magic Winmail Server v4.0 Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=110685011825461&w=2"
|
||||
},
|
||||
{
|
||||
"name": "12388",
|
||||
"refsource": "BID",
|
||||
@ -67,6 +62,11 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1013017"
|
||||
},
|
||||
{
|
||||
"name": "20050127 [SIG^2 G-TEC] Magic Winmail Server v4.0 Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=110685011825461&w=2"
|
||||
},
|
||||
{
|
||||
"name": "14053",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050406 [NOBYTES.COM: #6] CubeCart 2.0.6 - Information Disclosure",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=111281457918479&w=2"
|
||||
},
|
||||
{
|
||||
"name": "14064",
|
||||
"refsource": "OSVDB",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1013660",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1013660"
|
||||
},
|
||||
{
|
||||
"name": "20050406 [NOBYTES.COM: #6] CubeCart 2.0.6 - Information Disclosure",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111281457918479&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "15869",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/15869"
|
||||
},
|
||||
{
|
||||
"name": "13395",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/13395"
|
||||
},
|
||||
{
|
||||
"name": "15136",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15136"
|
||||
},
|
||||
{
|
||||
"name": "15868",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/15868"
|
||||
},
|
||||
{
|
||||
"name": "metabid-item-login-sql-injection(20286)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20286"
|
||||
},
|
||||
{
|
||||
"name": "20050426 Multiple SQL Injections in MetaBid Auctions",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,31 +86,6 @@
|
||||
"name": "http://digitalparadox.org/advisories/metabid.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://digitalparadox.org/advisories/metabid.txt"
|
||||
},
|
||||
{
|
||||
"name" : "13395",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/13395"
|
||||
},
|
||||
{
|
||||
"name" : "15868",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/15868"
|
||||
},
|
||||
{
|
||||
"name" : "15869",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/15869"
|
||||
},
|
||||
{
|
||||
"name" : "15136",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/15136"
|
||||
},
|
||||
{
|
||||
"name" : "metabid-item-login-sql-injection(20286)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20286"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.systemsecure.org/ssforum/viewtopic.php?t=250"
|
||||
},
|
||||
{
|
||||
"name": "1014932",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1014932"
|
||||
},
|
||||
{
|
||||
"name": "14876",
|
||||
"refsource": "BID",
|
||||
@ -67,11 +72,6 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/19611"
|
||||
},
|
||||
{
|
||||
"name" : "1014932",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1014932"
|
||||
},
|
||||
{
|
||||
"name": "mxshop-index-sql-injection(22328)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20051007 Antivirus detection bypass by special crafted archive.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=112879611919750&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://shadock.net/secubox/AVCraftedArchive.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://shadock.net/secubox/AVCraftedArchive.html"
|
||||
},
|
||||
{
|
||||
"name": "20051007 Antivirus detection bypass by special crafted archive.",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=112879611919750&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1015545",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015545"
|
||||
},
|
||||
{
|
||||
"name": "18615",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18615"
|
||||
},
|
||||
{
|
||||
"name": "http://www.legato.com/support/websupport/product_alerts/011606_NW.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.legato.com/support/websupport/product_alerts/011606_NW.htm"
|
||||
},
|
||||
{
|
||||
"name": "20060117 EMC Legato Networker nsrd.exe Heap Overflow Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
@ -63,19 +78,29 @@
|
||||
"url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=374"
|
||||
},
|
||||
{
|
||||
"name" : "ftp://ftp.legato.com/pub/NetWorker/Updates/LGTpa83990/README.TXT",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "ftp://ftp.legato.com/pub/NetWorker/Updates/LGTpa83990/README.TXT"
|
||||
"name": "legato-nsrd-bo(24175)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24175"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.legato.com/support/websupport/product_alerts/011606_NW.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.legato.com/support/websupport/product_alerts/011606_NW.htm"
|
||||
"name": "ADV-2006-0343",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0343"
|
||||
},
|
||||
{
|
||||
"name" : "102148",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102148-1"
|
||||
"name": "legato-nsrexecd-bo(24174)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24174"
|
||||
},
|
||||
{
|
||||
"name": "18495",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18495"
|
||||
},
|
||||
{
|
||||
"name": "1015500",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015500"
|
||||
},
|
||||
{
|
||||
"name": "16275",
|
||||
@ -88,39 +113,14 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0233"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0343",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0343"
|
||||
"name": "102148",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102148-1"
|
||||
},
|
||||
{
|
||||
"name" : "1015500",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015500"
|
||||
},
|
||||
{
|
||||
"name" : "1015545",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015545"
|
||||
},
|
||||
{
|
||||
"name" : "18495",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18495"
|
||||
},
|
||||
{
|
||||
"name" : "18615",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18615"
|
||||
},
|
||||
{
|
||||
"name" : "legato-nsrd-bo(24175)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24175"
|
||||
},
|
||||
{
|
||||
"name" : "legato-nsrexecd-bo(24174)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24174"
|
||||
"name": "ftp://ftp.legato.com/pub/NetWorker/Updates/LGTpa83990/README.TXT",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "ftp://ftp.legato.com/pub/NetWorker/Updates/LGTpa83990/README.TXT"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2005-3703",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://pridels0.blogspot.com/2005/11/entergal-mx-v20-sql-vuln.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://pridels0.blogspot.com/2005/11/entergal-mx-v20-sql-vuln.html"
|
||||
},
|
||||
{
|
||||
"name" : "15631",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/15631"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2005-2626",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2005/2626"
|
||||
},
|
||||
{
|
||||
"name" : "21164",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/21164"
|
||||
"name": "entergal-index-sql-injection(23262)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23262"
|
||||
},
|
||||
{
|
||||
"name": "17753",
|
||||
@ -78,9 +63,24 @@
|
||||
"url": "http://secunia.com/advisories/17753"
|
||||
},
|
||||
{
|
||||
"name" : "entergal-index-sql-injection(23262)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23262"
|
||||
"name": "15631",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15631"
|
||||
},
|
||||
{
|
||||
"name": "http://pridels0.blogspot.com/2005/11/entergal-mx-v20-sql-vuln.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://pridels0.blogspot.com/2005/11/entergal-mx-v20-sql-vuln.html"
|
||||
},
|
||||
{
|
||||
"name": "21164",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21164"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-2626",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2626"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20051205 Buffer Overflow in MultiTech VoIP Implementations",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/418653/100/0/threaded"
|
||||
"name": "multivoip-sip-invite-bo(23416)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23416"
|
||||
},
|
||||
{
|
||||
"name": "1015314",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015314"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securitylab.net/research/2005/12/buffer_overflow_in_multitech_v.html",
|
||||
@ -73,9 +78,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2781"
|
||||
},
|
||||
{
|
||||
"name" : "1015314",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015314"
|
||||
"name": "20051205 Buffer Overflow in MultiTech VoIP Implementations",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/418653/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "17852",
|
||||
@ -86,11 +91,6 @@
|
||||
"name": "231",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/231"
|
||||
},
|
||||
{
|
||||
"name" : "multivoip-sip-invite-bo(23416)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23416"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://pridels0.blogspot.com/2005/12/dcforum-xss-vuln.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://pridels0.blogspot.com/2005/12/dcforum-xss-vuln.html"
|
||||
},
|
||||
{
|
||||
"name": "15885",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15885"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2005-2940",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2005/2940"
|
||||
},
|
||||
{
|
||||
"name": "18093",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18093"
|
||||
},
|
||||
{
|
||||
"name": "http://pridels0.blogspot.com/2005/12/dcforum-xss-vuln.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://pridels0.blogspot.com/2005/12/dcforum-xss-vuln.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-2940",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2940"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt"
|
||||
},
|
||||
{
|
||||
"name": "14779",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/14779"
|
||||
},
|
||||
{
|
||||
"name": "http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2009-0055",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090114 IronPort Encryption Appliance / PostX and PXE Encryption Vulnerabilities",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml"
|
||||
},
|
||||
{
|
||||
"name": "33268",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33268"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-0140",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/0140"
|
||||
"name": "20090114 IronPort Encryption Appliance / PostX and PXE Encryption Vulnerabilities",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml"
|
||||
},
|
||||
{
|
||||
"name": "51397",
|
||||
@ -73,14 +68,19 @@
|
||||
"url": "http://osvdb.org/51397"
|
||||
},
|
||||
{
|
||||
"name" : "1021594",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1021594"
|
||||
"name": "ADV-2009-0140",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0140"
|
||||
},
|
||||
{
|
||||
"name": "33479",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33479"
|
||||
},
|
||||
{
|
||||
"name": "1021594",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1021594"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2009-0218",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "34395",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/34395"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kb.cert.org/vuls/id/WDON-7Q4RZN",
|
||||
"refsource": "MISC",
|
||||
@ -67,11 +72,6 @@
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/908801"
|
||||
},
|
||||
{
|
||||
"name" : "34395",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/34395"
|
||||
},
|
||||
{
|
||||
"name": "intralaunch-activex-code-execution(49684)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,55 +52,55 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090206 RealNetworks RealPlayer IVR File Processing Multiple Code Execute Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/500722/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20100121 ZDI-10-009: RealNetworks RealPlayer IVR Format Remote Code Execution Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/509097/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.fortiguardcenter.com/advisory/FGA-2009-04.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.fortiguardcenter.com/advisory/FGA-2009-04.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-009/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-009/"
|
||||
},
|
||||
{
|
||||
"name" : "http://service.real.com/realplayer/security/01192010_player/en/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://service.real.com/realplayer/security/01192010_player/en/"
|
||||
},
|
||||
{
|
||||
"name" : "33652",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/33652"
|
||||
},
|
||||
{
|
||||
"name" : "33810",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33810"
|
||||
},
|
||||
{
|
||||
"name" : "38218",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/38218"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-0178",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0178"
|
||||
},
|
||||
{
|
||||
"name": "http://service.real.com/realplayer/security/01192010_player/en/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://service.real.com/realplayer/security/01192010_player/en/"
|
||||
},
|
||||
{
|
||||
"name": "realplayer-ivr-code-execution(48568)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48568"
|
||||
},
|
||||
{
|
||||
"name": "http://www.fortiguardcenter.com/advisory/FGA-2009-04.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.fortiguardcenter.com/advisory/FGA-2009-04.html"
|
||||
},
|
||||
{
|
||||
"name": "33810",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33810"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-009/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-009/"
|
||||
},
|
||||
{
|
||||
"name": "20090206 RealNetworks RealPlayer IVR File Processing Multiple Code Execute Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/500722/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "38218",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38218"
|
||||
},
|
||||
{
|
||||
"name": "33652",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33652"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.fujitsu.com/global/support/software/security/products-f/esf-200901e.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.fujitsu.com/global/support/software/security/products-f/esf-200901e.html"
|
||||
"name": "fujitsu-enhanced-hrms-info-disclosure(48817)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48817"
|
||||
},
|
||||
{
|
||||
"name": "33831",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://secunia.com/advisories/33974"
|
||||
},
|
||||
{
|
||||
"name" : "fujitsu-enhanced-hrms-info-disclosure(48817)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/48817"
|
||||
"name": "http://www.fujitsu.com/global/support/software/security/products-f/esf-200901e.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.fujitsu.com/global/support/software/security/products-f/esf-200901e.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "9726",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/9726"
|
||||
},
|
||||
{
|
||||
"name": "36815",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36815"
|
||||
},
|
||||
{
|
||||
"name": "9726",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/9726"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2009-3616",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20091016 QEMU VNC use-after-free",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2009/10/16/5"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20091016 Re: QEMU VNC use-after-free",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2009/10/16/8"
|
||||
},
|
||||
{
|
||||
"name" : "[qemu-devel] 20090525 Re: [STABLE] [BUG] VNC mode can crash QEMU",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=qemu-devel&m=124324043812915"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=501131",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5"
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=501131"
|
||||
},
|
||||
{
|
||||
"name": "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331",
|
||||
@ -78,19 +63,19 @@
|
||||
"url": "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331"
|
||||
},
|
||||
{
|
||||
"name" : "http://rhn.redhat.com/errata/RHEA-2009-1272.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://rhn.redhat.com/errata/RHEA-2009-1272.html"
|
||||
"name": "[oss-security] 20091016 Re: QEMU VNC use-after-free",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2009/10/16/8"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=501131",
|
||||
"name": "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=501131"
|
||||
"url": "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=505641",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=505641"
|
||||
"name": "[qemu-devel] 20090525 Re: [STABLE] [BUG] VNC mode can crash QEMU",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=qemu-devel&m=124324043812915"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=508567",
|
||||
@ -101,6 +86,21 @@
|
||||
"name": "36716",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/36716"
|
||||
},
|
||||
{
|
||||
"name": "http://rhn.redhat.com/errata/RHEA-2009-1272.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://rhn.redhat.com/errata/RHEA-2009-1272.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20091016 QEMU VNC use-after-free",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2009/10/16/5"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=505641",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=505641"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security_alert@emc.com",
|
||||
"ID": "CVE-2012-2287",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20120920 ESA-2012-037: RSA(r) Authentication Agent 7.1 for Microsoft Windows(r) and RSA(r) Authentication Client 3.5 Access Control Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-09/0102.html"
|
||||
},
|
||||
{
|
||||
"name": "55662",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "rsa-authentication-security-bypass(78802)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78802"
|
||||
},
|
||||
{
|
||||
"name": "20120920 ESA-2012-037: RSA(r) Authentication Agent 7.1 for Microsoft Windows(r) and RSA(r) Authentication Client 3.5 Access Control Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0102.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2012-2841",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,44 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[libexif-devel] 20120712 libexif project security advisory July 12, 2012",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://sourceforge.net/mailarchive/message.php?msg_id=29534027"
|
||||
"name": "54437",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/54437"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2559",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2559"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:1255",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1255.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2012:0902",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:0903",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name": "[libexif-devel] 20120712 libexif project security advisory July 12, 2012",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://sourceforge.net/mailarchive/message.php?msg_id=29534027"
|
||||
},
|
||||
{
|
||||
"name": "49988",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/49988"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1255",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1255.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-1513-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1513-1"
|
||||
},
|
||||
{
|
||||
"name" : "54437",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/54437"
|
||||
},
|
||||
{
|
||||
"name" : "49988",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/49988"
|
||||
"name": "SUSE-SU-2012:0902",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2012-2884",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html"
|
||||
"name": "oval:org.mitre.oval:def:15507",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15507"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=141651",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=141651"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2012:1376",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:15507",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15507"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/files/112797/SiliSoftware-phpThumb-1.7.11-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/files/112797/SiliSoftware-phpThumb-1.7.11-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5088.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5088.php"
|
||||
},
|
||||
{
|
||||
"name" : "53572",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/53572"
|
||||
"name": "http://packetstormsecurity.org/files/112797/SiliSoftware-phpThumb-1.7.11-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/files/112797/SiliSoftware-phpThumb-1.7.11-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "silisoftware-phpthumb-multiple-xss(75709)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75709"
|
||||
},
|
||||
{
|
||||
"name": "53572",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53572"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-6089",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -62,15 +62,15 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.iai.uni-bonn.de/pipermail/swi-prolog/2012/009428.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.swi-prolog.org/git/pl.git/commit/a9a6fc8a2a9cf3b9154b490a4b1ffaa8be4d723c",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.swi-prolog.org/git/pl.git/commit/a9a6fc8a2a9cf3b9154b490a4b1ffaa8be4d723c"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=891577",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=891577"
|
||||
},
|
||||
{
|
||||
"name": "http://www.swi-prolog.org/git/pl.git/commit/a9a6fc8a2a9cf3b9154b490a4b1ffaa8be4d723c",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.swi-prolog.org/git/pl.git/commit/a9a6fc8a2a9cf3b9154b490a4b1ffaa8be4d723c"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2012-6200",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2015-0898",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://jvn.jp/en/jp/JVN39175666/221504/index.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://jvn.jp/en/jp/JVN39175666/221504/index.html"
|
||||
"name": "JVN#39175666",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN39175666/index.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.futomi.com/library/info/2015/20150319.html",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.futomi.com/library/info/2015/20150319.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVN#39175666",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/en/jp/JVN39175666/index.html"
|
||||
"name": "http://jvn.jp/en/jp/JVN39175666/221504/index.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://jvn.jp/en/jp/JVN39175666/221504/index.html"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2015-000041",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-1654",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2015-1667",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS15-032",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032"
|
||||
},
|
||||
{
|
||||
"name": "1032108",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032108"
|
||||
},
|
||||
{
|
||||
"name": "MS15-032",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2015-1691",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS15-043",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043"
|
||||
},
|
||||
{
|
||||
"name": "74507",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1032282",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032282"
|
||||
},
|
||||
{
|
||||
"name": "MS15-043",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2015-1884",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21700831",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21700831"
|
||||
"name": "1032700",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032700"
|
||||
},
|
||||
{
|
||||
"name": "JR52957",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR52957"
|
||||
},
|
||||
{
|
||||
"name" : "75360",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/75360"
|
||||
},
|
||||
{
|
||||
"name" : "1032700",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1032700"
|
||||
},
|
||||
{
|
||||
"name": "1032701",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032701"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21700831",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700831"
|
||||
},
|
||||
{
|
||||
"name": "75360",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75360"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2015-5134",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,30 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "37852",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/37852/"
|
||||
},
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
||||
"name": "37852",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/37852/"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201508-01",
|
||||
@ -83,24 +68,39 @@
|
||||
"url": "https://security.gentoo.org/glsa/201508-01"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:1603",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1603.html"
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1781",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
|
||||
},
|
||||
{
|
||||
"name": "1033235",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033235"
|
||||
},
|
||||
{
|
||||
"name": "76288",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/76288"
|
||||
},
|
||||
{
|
||||
"name" : "1033235",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033235"
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1603",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1603.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2015-5428",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150723 Re: CVE request: WordPress 4.2.2 and earlier cross-site scripting vulnerability",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://openwall.com/lists/oss-security/2015/07/23/18"
|
||||
},
|
||||
{
|
||||
"name" : "https://wpvulndb.com/vulnerabilities/8111",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://wpvulndb.com/vulnerabilities/8111"
|
||||
"name": "DSA-3328",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3328"
|
||||
},
|
||||
{
|
||||
"name": "http://codex.wordpress.org/Version_4.2.3",
|
||||
@ -72,25 +67,30 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://core.trac.wordpress.org/changeset/33357"
|
||||
},
|
||||
{
|
||||
"name": "1033037",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033037"
|
||||
},
|
||||
{
|
||||
"name": "https://wordpress.org/news/2015/07/wordpress-4-2-3/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wordpress.org/news/2015/07/wordpress-4-2-3/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3328",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3328"
|
||||
},
|
||||
{
|
||||
"name": "76011",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/76011"
|
||||
},
|
||||
{
|
||||
"name" : "1033037",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033037"
|
||||
"name": "[oss-security] 20150723 Re: CVE request: WordPress 4.2.2 and earlier cross-site scripting vulnerability",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://openwall.com/lists/oss-security/2015/07/23/18"
|
||||
},
|
||||
{
|
||||
"name": "https://wpvulndb.com/vulnerabilities/8111",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpvulndb.com/vulnerabilities/8111"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://marc.info/?l=git&m=152761328506724&w=2",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://marc.info/?l=git&m=152761328506724&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201805-13",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201805-13"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:2147",
|
||||
"refsource": "REDHAT",
|
||||
@ -77,10 +67,20 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104346"
|
||||
},
|
||||
{
|
||||
"name": "https://marc.info/?l=git&m=152761328506724&w=2",
|
||||
"refsource": "MISC",
|
||||
"url": "https://marc.info/?l=git&m=152761328506724&w=2"
|
||||
},
|
||||
{
|
||||
"name": "1040991",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040991"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201805-13",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201805-13"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/DediData/wpforo/issues/1",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/DediData/wpforo/issues/1"
|
||||
},
|
||||
{
|
||||
"name": "https://wpvulndb.com/vulnerabilities/9089",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpvulndb.com/vulnerabilities/9089"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/DediData/wpforo/issues/1",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/DediData/wpforo/issues/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20180608 libfsntfs 20180420 vulns",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2018/Jun/17"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html"
|
||||
},
|
||||
{
|
||||
"name": "20180608 libfsntfs 20180420 vulns",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2018/Jun/17"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1041891",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041891"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -70,11 +75,6 @@
|
||||
"name": "105609",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105609"
|
||||
},
|
||||
{
|
||||
"name" : "1041891",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041891"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.freedesktop.org/show_bug.cgi?id=105205",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.freedesktop.org/show_bug.cgi?id=105205"
|
||||
"name": "USN-3668-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3668-1/"
|
||||
},
|
||||
{
|
||||
"name": "https://cgit.freedesktop.org/exempi/commit/?id=e163667a06a9b656a047b0ec660b871f29a83c9f",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "https://cgit.freedesktop.org/exempi/commit/?id=e163667a06a9b656a047b0ec660b871f29a83c9f"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3668-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3668-1/"
|
||||
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=105205",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=105205"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "Secure@Microsoft.com",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2018-8137",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user