"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 21:33:10 +00:00
parent dba4b21c5c
commit 1fc1f0a87c
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
53 changed files with 3495 additions and 3495 deletions

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20050127 [SIG^2 G-TEC] Magic Winmail Server v4.0 Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=110685011825461&w=2"
},
{
"name": "12388",
"refsource": "BID",
@ -67,6 +62,11 @@
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1013017"
},
{
"name": "20050127 [SIG^2 G-TEC] Magic Winmail Server v4.0 Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110685011825461&w=2"
},
{
"name": "14053",
"refsource": "SECUNIA",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20050406 [NOBYTES.COM: #6] CubeCart 2.0.6 - Information Disclosure",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=111281457918479&w=2"
},
{
"name": "14064",
"refsource": "OSVDB",
@ -66,6 +61,11 @@
"name": "1013660",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1013660"
},
{
"name": "20050406 [NOBYTES.COM: #6] CubeCart 2.0.6 - Information Disclosure",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111281457918479&w=2"
}
]
}

View File

@ -52,6 +52,31 @@
},
"references": {
"reference_data": [
{
"name": "15869",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/15869"
},
{
"name": "13395",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/13395"
},
{
"name": "15136",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15136"
},
{
"name": "15868",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/15868"
},
{
"name": "metabid-item-login-sql-injection(20286)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20286"
},
{
"name": "20050426 Multiple SQL Injections in MetaBid Auctions",
"refsource": "BUGTRAQ",
@ -61,31 +86,6 @@
"name": "http://digitalparadox.org/advisories/metabid.txt",
"refsource": "MISC",
"url": "http://digitalparadox.org/advisories/metabid.txt"
},
{
"name" : "13395",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/13395"
},
{
"name" : "15868",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/15868"
},
{
"name" : "15869",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/15869"
},
{
"name" : "15136",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/15136"
},
{
"name" : "metabid-item-login-sql-injection(20286)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20286"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "MISC",
"url": "http://www.systemsecure.org/ssforum/viewtopic.php?t=250"
},
{
"name": "1014932",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014932"
},
{
"name": "14876",
"refsource": "BID",
@ -67,11 +72,6 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/19611"
},
{
"name" : "1014932",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1014932"
},
{
"name": "mxshop-index-sql-injection(22328)",
"refsource": "XF",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20051007 Antivirus detection bypass by special crafted archive.",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=112879611919750&w=2"
},
{
"name": "http://shadock.net/secubox/AVCraftedArchive.html",
"refsource": "MISC",
"url": "http://shadock.net/secubox/AVCraftedArchive.html"
},
{
"name": "20051007 Antivirus detection bypass by special crafted archive.",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112879611919750&w=2"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "1015545",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015545"
},
{
"name": "18615",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18615"
},
{
"name": "http://www.legato.com/support/websupport/product_alerts/011606_NW.htm",
"refsource": "CONFIRM",
"url": "http://www.legato.com/support/websupport/product_alerts/011606_NW.htm"
},
{
"name": "20060117 EMC Legato Networker nsrd.exe Heap Overflow Vulnerability",
"refsource": "IDEFENSE",
@ -63,19 +78,29 @@
"url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?id=374"
},
{
"name" : "ftp://ftp.legato.com/pub/NetWorker/Updates/LGTpa83990/README.TXT",
"refsource" : "CONFIRM",
"url" : "ftp://ftp.legato.com/pub/NetWorker/Updates/LGTpa83990/README.TXT"
"name": "legato-nsrd-bo(24175)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24175"
},
{
"name" : "http://www.legato.com/support/websupport/product_alerts/011606_NW.htm",
"refsource" : "CONFIRM",
"url" : "http://www.legato.com/support/websupport/product_alerts/011606_NW.htm"
"name": "ADV-2006-0343",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0343"
},
{
"name" : "102148",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102148-1"
"name": "legato-nsrexecd-bo(24174)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24174"
},
{
"name": "18495",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18495"
},
{
"name": "1015500",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015500"
},
{
"name": "16275",
@ -88,39 +113,14 @@
"url": "http://www.vupen.com/english/advisories/2006/0233"
},
{
"name" : "ADV-2006-0343",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0343"
"name": "102148",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102148-1"
},
{
"name" : "1015500",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015500"
},
{
"name" : "1015545",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015545"
},
{
"name" : "18495",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18495"
},
{
"name" : "18615",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18615"
},
{
"name" : "legato-nsrd-bo(24175)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24175"
},
{
"name" : "legato-nsrexecd-bo(24174)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24174"
"name": "ftp://ftp.legato.com/pub/NetWorker/Updates/LGTpa83990/README.TXT",
"refsource": "CONFIRM",
"url": "ftp://ftp.legato.com/pub/NetWorker/Updates/LGTpa83990/README.TXT"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2005-3703",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://pridels0.blogspot.com/2005/11/entergal-mx-v20-sql-vuln.html",
"refsource" : "MISC",
"url" : "http://pridels0.blogspot.com/2005/11/entergal-mx-v20-sql-vuln.html"
},
{
"name" : "15631",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15631"
},
{
"name" : "ADV-2005-2626",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2626"
},
{
"name" : "21164",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21164"
"name": "entergal-index-sql-injection(23262)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23262"
},
{
"name": "17753",
@ -78,9 +63,24 @@
"url": "http://secunia.com/advisories/17753"
},
{
"name" : "entergal-index-sql-injection(23262)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23262"
"name": "15631",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15631"
},
{
"name": "http://pridels0.blogspot.com/2005/11/entergal-mx-v20-sql-vuln.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2005/11/entergal-mx-v20-sql-vuln.html"
},
{
"name": "21164",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21164"
},
{
"name": "ADV-2005-2626",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2626"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20051205 Buffer Overflow in MultiTech VoIP Implementations",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/418653/100/0/threaded"
"name": "multivoip-sip-invite-bo(23416)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23416"
},
{
"name": "1015314",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015314"
},
{
"name": "http://www.securitylab.net/research/2005/12/buffer_overflow_in_multitech_v.html",
@ -73,9 +78,9 @@
"url": "http://www.vupen.com/english/advisories/2005/2781"
},
{
"name" : "1015314",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015314"
"name": "20051205 Buffer Overflow in MultiTech VoIP Implementations",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/418653/100/0/threaded"
},
{
"name": "17852",
@ -86,11 +91,6 @@
"name": "231",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/231"
},
{
"name" : "multivoip-sip-invite-bo(23416)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23416"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://pridels0.blogspot.com/2005/12/dcforum-xss-vuln.html",
"refsource" : "MISC",
"url" : "http://pridels0.blogspot.com/2005/12/dcforum-xss-vuln.html"
},
{
"name": "15885",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15885"
},
{
"name" : "ADV-2005-2940",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2940"
},
{
"name": "18093",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18093"
},
{
"name": "http://pridels0.blogspot.com/2005/12/dcforum-xss-vuln.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2005/12/dcforum-xss-vuln.html"
},
{
"name": "ADV-2005-2940",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2940"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt",
"refsource" : "MISC",
"url" : "http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt"
},
{
"name": "14779",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14779"
},
{
"name": "http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt",
"refsource": "MISC",
"url": "http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-0055",
"STATE": "PUBLIC"
},
@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20090114 IronPort Encryption Appliance / PostX and PXE Encryption Vulnerabilities",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml"
},
{
"name": "33268",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33268"
},
{
"name" : "ADV-2009-0140",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0140"
"name": "20090114 IronPort Encryption Appliance / PostX and PXE Encryption Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml"
},
{
"name": "51397",
@ -73,14 +68,19 @@
"url": "http://osvdb.org/51397"
},
{
"name" : "1021594",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1021594"
"name": "ADV-2009-0140",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0140"
},
{
"name": "33479",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33479"
},
{
"name": "1021594",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021594"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2009-0218",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "34395",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34395"
},
{
"name": "http://www.kb.cert.org/vuls/id/WDON-7Q4RZN",
"refsource": "MISC",
@ -67,11 +72,6 @@
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/908801"
},
{
"name" : "34395",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/34395"
},
{
"name": "intralaunch-activex-code-execution(49684)",
"refsource": "XF",

View File

@ -52,55 +52,55 @@
},
"references": {
"reference_data": [
{
"name" : "20090206 RealNetworks RealPlayer IVR File Processing Multiple Code Execute Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/500722/100/0/threaded"
},
{
"name": "20100121 ZDI-10-009: RealNetworks RealPlayer IVR Format Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/509097/100/0/threaded"
},
{
"name" : "http://www.fortiguardcenter.com/advisory/FGA-2009-04.html",
"refsource" : "MISC",
"url" : "http://www.fortiguardcenter.com/advisory/FGA-2009-04.html"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-009/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-009/"
},
{
"name" : "http://service.real.com/realplayer/security/01192010_player/en/",
"refsource" : "CONFIRM",
"url" : "http://service.real.com/realplayer/security/01192010_player/en/"
},
{
"name" : "33652",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33652"
},
{
"name" : "33810",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33810"
},
{
"name" : "38218",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38218"
},
{
"name": "ADV-2010-0178",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0178"
},
{
"name": "http://service.real.com/realplayer/security/01192010_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/01192010_player/en/"
},
{
"name": "realplayer-ivr-code-execution(48568)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48568"
},
{
"name": "http://www.fortiguardcenter.com/advisory/FGA-2009-04.html",
"refsource": "MISC",
"url": "http://www.fortiguardcenter.com/advisory/FGA-2009-04.html"
},
{
"name": "33810",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33810"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-009/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-009/"
},
{
"name": "20090206 RealNetworks RealPlayer IVR File Processing Multiple Code Execute Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/500722/100/0/threaded"
},
{
"name": "38218",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38218"
},
{
"name": "33652",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33652"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.fujitsu.com/global/support/software/security/products-f/esf-200901e.html",
"refsource" : "CONFIRM",
"url" : "http://www.fujitsu.com/global/support/software/security/products-f/esf-200901e.html"
"name": "fujitsu-enhanced-hrms-info-disclosure(48817)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48817"
},
{
"name": "33831",
@ -68,9 +68,9 @@
"url": "http://secunia.com/advisories/33974"
},
{
"name" : "fujitsu-enhanced-hrms-info-disclosure(48817)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/48817"
"name": "http://www.fujitsu.com/global/support/software/security/products-f/esf-200901e.html",
"refsource": "CONFIRM",
"url": "http://www.fujitsu.com/global/support/software/security/products-f/esf-200901e.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "9726",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/9726"
},
{
"name": "36815",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36815"
},
{
"name": "9726",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/9726"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-3616",
"STATE": "PUBLIC"
},
@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20091016 QEMU VNC use-after-free",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2009/10/16/5"
},
{
"name" : "[oss-security] 20091016 Re: QEMU VNC use-after-free",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2009/10/16/8"
},
{
"name" : "[qemu-devel] 20090525 Re: [STABLE] [BUG] VNC mode can crash QEMU",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=qemu-devel&m=124324043812915"
},
{
"name" : "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=501131",
"refsource": "CONFIRM",
"url" : "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=501131"
},
{
"name": "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331",
@ -78,19 +63,19 @@
"url": "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331"
},
{
"name" : "http://rhn.redhat.com/errata/RHEA-2009-1272.html",
"refsource" : "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHEA-2009-1272.html"
"name": "[oss-security] 20091016 Re: QEMU VNC use-after-free",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/10/16/8"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=501131",
"name": "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5",
"refsource": "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=501131"
"url": "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=505641",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=505641"
"name": "[qemu-devel] 20090525 Re: [STABLE] [BUG] VNC mode can crash QEMU",
"refsource": "MLIST",
"url": "http://marc.info/?l=qemu-devel&m=124324043812915"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=508567",
@ -101,6 +86,21 @@
"name": "36716",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36716"
},
{
"name": "http://rhn.redhat.com/errata/RHEA-2009-1272.html",
"refsource": "CONFIRM",
"url": "http://rhn.redhat.com/errata/RHEA-2009-1272.html"
},
{
"name": "[oss-security] 20091016 QEMU VNC use-after-free",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/10/16/5"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=505641",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=505641"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2012-2287",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20120920 ESA-2012-037: RSA(r) Authentication Agent 7.1 for Microsoft Windows(r) and RSA(r) Authentication Client 3.5 Access Control Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-09/0102.html"
},
{
"name": "55662",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "rsa-authentication-security-bypass(78802)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78802"
},
{
"name": "20120920 ESA-2012-037: RSA(r) Authentication Agent 7.1 for Microsoft Windows(r) and RSA(r) Authentication Client 3.5 Access Control Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0102.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2012-2841",
"STATE": "PUBLIC"
},
@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "[libexif-devel] 20120712 libexif project security advisory July 12, 2012",
"refsource" : "MLIST",
"url" : "http://sourceforge.net/mailarchive/message.php?msg_id=29534027"
"name": "54437",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54437"
},
{
"name": "DSA-2559",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2559"
},
{
"name" : "RHSA-2012:1255",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1255.html"
},
{
"name" : "SUSE-SU-2012:0902",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html"
},
{
"name": "SUSE-SU-2012:0903",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html"
},
{
"name": "[libexif-devel] 20120712 libexif project security advisory July 12, 2012",
"refsource": "MLIST",
"url": "http://sourceforge.net/mailarchive/message.php?msg_id=29534027"
},
{
"name": "49988",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49988"
},
{
"name": "RHSA-2012:1255",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1255.html"
},
{
"name": "USN-1513-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1513-1"
},
{
"name" : "54437",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/54437"
},
{
"name" : "49988",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/49988"
"name": "SUSE-SU-2012:0902",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2012-2884",
"STATE": "PUBLIC"
},
@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html"
"name": "oval:org.mitre.oval:def:15507",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15507"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=141651",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=141651"
},
{
"name": "http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html"
},
{
"name": "openSUSE-SU-2012:1376",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00012.html"
},
{
"name" : "oval:org.mitre.oval:def:15507",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15507"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.org/files/112797/SiliSoftware-phpThumb-1.7.11-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/files/112797/SiliSoftware-phpThumb-1.7.11-Cross-Site-Scripting.html"
},
{
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5088.php",
"refsource": "MISC",
"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5088.php"
},
{
"name" : "53572",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/53572"
"name": "http://packetstormsecurity.org/files/112797/SiliSoftware-phpThumb-1.7.11-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/files/112797/SiliSoftware-phpThumb-1.7.11-Cross-Site-Scripting.html"
},
{
"name": "silisoftware-phpthumb-multiple-xss(75709)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75709"
},
{
"name": "53572",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53572"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-6089",
"STATE": "PUBLIC"
},
@ -62,15 +62,15 @@
"refsource": "MLIST",
"url": "https://lists.iai.uni-bonn.de/pipermail/swi-prolog/2012/009428.html"
},
{
"name" : "http://www.swi-prolog.org/git/pl.git/commit/a9a6fc8a2a9cf3b9154b490a4b1ffaa8be4d723c",
"refsource" : "CONFIRM",
"url" : "http://www.swi-prolog.org/git/pl.git/commit/a9a6fc8a2a9cf3b9154b490a4b1ffaa8be4d723c"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=891577",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=891577"
},
{
"name": "http://www.swi-prolog.org/git/pl.git/commit/a9a6fc8a2a9cf3b9154b490a4b1ffaa8be4d723c",
"refsource": "CONFIRM",
"url": "http://www.swi-prolog.org/git/pl.git/commit/a9a6fc8a2a9cf3b9154b490a4b1ffaa8be4d723c"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2012-6200",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-0898",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://jvn.jp/en/jp/JVN39175666/221504/index.html",
"refsource" : "CONFIRM",
"url" : "http://jvn.jp/en/jp/JVN39175666/221504/index.html"
"name": "JVN#39175666",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN39175666/index.html"
},
{
"name": "http://www.futomi.com/library/info/2015/20150319.html",
@ -63,9 +63,9 @@
"url": "http://www.futomi.com/library/info/2015/20150319.html"
},
{
"name" : "JVN#39175666",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN39175666/index.html"
"name": "http://jvn.jp/en/jp/JVN39175666/221504/index.html",
"refsource": "CONFIRM",
"url": "http://jvn.jp/en/jp/JVN39175666/221504/index.html"
},
{
"name": "JVNDB-2015-000041",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-1654",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-1667",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "MS15-032",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032"
},
{
"name": "1032108",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032108"
},
{
"name": "MS15-032",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-1691",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "MS15-043",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043"
},
{
"name": "74507",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "1032282",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032282"
},
{
"name": "MS15-043",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-1884",
"STATE": "PUBLIC"
},
@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21700831",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21700831"
"name": "1032700",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032700"
},
{
"name": "JR52957",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR52957"
},
{
"name" : "75360",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75360"
},
{
"name" : "1032700",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032700"
},
{
"name": "1032701",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032701"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21700831",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700831"
},
{
"name": "75360",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75360"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-5134",
"STATE": "PUBLIC"
},
@ -52,30 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "37852",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/37852/"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
"name": "37852",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37852/"
},
{
"name": "GLSA-201508-01",
@ -83,24 +68,39 @@
"url": "https://security.gentoo.org/glsa/201508-01"
},
{
"name" : "RHSA-2015:1603",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1603.html"
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html"
},
{
"name": "openSUSE-SU-2015:1781",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
},
{
"name": "1033235",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033235"
},
{
"name": "76288",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76288"
},
{
"name" : "1033235",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033235"
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
},
{
"name": "RHSA-2015:1603",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1603.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2015-5428",
"STATE": "PUBLIC"
},

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20150723 Re: CVE request: WordPress 4.2.2 and earlier cross-site scripting vulnerability",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2015/07/23/18"
},
{
"name" : "https://wpvulndb.com/vulnerabilities/8111",
"refsource" : "MISC",
"url" : "https://wpvulndb.com/vulnerabilities/8111"
"name": "DSA-3328",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3328"
},
{
"name": "http://codex.wordpress.org/Version_4.2.3",
@ -72,25 +67,30 @@
"refsource": "CONFIRM",
"url": "https://core.trac.wordpress.org/changeset/33357"
},
{
"name": "1033037",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033037"
},
{
"name": "https://wordpress.org/news/2015/07/wordpress-4-2-3/",
"refsource": "CONFIRM",
"url": "https://wordpress.org/news/2015/07/wordpress-4-2-3/"
},
{
"name" : "DSA-3328",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3328"
},
{
"name": "76011",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76011"
},
{
"name" : "1033037",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033037"
"name": "[oss-security] 20150723 Re: CVE request: WordPress 4.2.2 and earlier cross-site scripting vulnerability",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2015/07/23/18"
},
{
"name": "https://wpvulndb.com/vulnerabilities/8111",
"refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/8111"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://marc.info/?l=git&m=152761328506724&w=2",
"refsource" : "MISC",
"url" : "https://marc.info/?l=git&m=152761328506724&w=2"
},
{
"name" : "GLSA-201805-13",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201805-13"
},
{
"name": "RHSA-2018:2147",
"refsource": "REDHAT",
@ -77,10 +67,20 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104346"
},
{
"name": "https://marc.info/?l=git&m=152761328506724&w=2",
"refsource": "MISC",
"url": "https://marc.info/?l=git&m=152761328506724&w=2"
},
{
"name": "1040991",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040991"
},
{
"name": "GLSA-201805-13",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201805-13"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/DediData/wpforo/issues/1",
"refsource" : "MISC",
"url" : "https://github.com/DediData/wpforo/issues/1"
},
{
"name": "https://wpvulndb.com/vulnerabilities/9089",
"refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/9089"
},
{
"name": "https://github.com/DediData/wpforo/issues/1",
"refsource": "MISC",
"url": "https://github.com/DediData/wpforo/issues/1"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20180608 libfsntfs 20180420 vulns",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/Jun/17"
},
{
"name": "http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/148115/libfsntfs-20180420-Information-Disclosure.html"
},
{
"name": "20180608 libfsntfs 20180420 vulns",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Jun/17"
}
]
}

View File

@ -61,6 +61,11 @@
},
"references": {
"reference_data": [
{
"name": "1041891",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041891"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
@ -70,11 +75,6 @@
"name": "105609",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105609"
},
{
"name" : "1041891",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041891"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html"
},
{
"name" : "https://bugs.freedesktop.org/show_bug.cgi?id=105205",
"refsource" : "MISC",
"url" : "https://bugs.freedesktop.org/show_bug.cgi?id=105205"
"name": "USN-3668-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3668-1/"
},
{
"name": "https://cgit.freedesktop.org/exempi/commit/?id=e163667a06a9b656a047b0ec660b871f29a83c9f",
@ -68,9 +68,9 @@
"url": "https://cgit.freedesktop.org/exempi/commit/?id=e163667a06a9b656a047b0ec660b871f29a83c9f"
},
{
"name" : "USN-3668-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3668-1/"
"name": "https://bugs.freedesktop.org/show_bug.cgi?id=105205",
"refsource": "MISC",
"url": "https://bugs.freedesktop.org/show_bug.cgi?id=105205"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8137",
"STATE": "PUBLIC"
},