mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
1a3df0b8bd
commit
223dac0b61
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://security.nnov.ru/docs5347.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://security.nnov.ru/docs5347.html"
|
||||
},
|
||||
{
|
||||
"name": "8977",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/8977"
|
||||
},
|
||||
{
|
||||
"name": "http://security.nnov.ru/docs5347.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://security.nnov.ru/docs5347.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/0305-exploits/baby.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/0305-exploits/baby.txt"
|
||||
"name": "24539",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/24539"
|
||||
},
|
||||
{
|
||||
"name": "http://www.pablosoftwaresolutions.com/html/baby_ftp_server.html",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.pablosoftwaresolutions.com/html/baby_ftp_server.html"
|
||||
},
|
||||
{
|
||||
"name" : "24539",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/24539"
|
||||
"name": "http://packetstormsecurity.org/0305-exploits/baby.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0305-exploits/baby.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2004-0098",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040609 Cisco CatOS Telnet, HTTP and SSH Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml"
|
||||
},
|
||||
{
|
||||
"name": "VU#245190",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/245190"
|
||||
},
|
||||
{
|
||||
"name": "20040609 Cisco CatOS Telnet, HTTP and SSH Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml"
|
||||
},
|
||||
{
|
||||
"name": "cisco-catalyst-ack-dos(16370)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040628 Full path disclosure csFAQ",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=108844203121238&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.swp-zone.org/archivos/advisory-08.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.swp-zone.org/archivos/advisory-08.txt"
|
||||
},
|
||||
{
|
||||
"name" : "csfaq-path-disclosure(16526)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/16526"
|
||||
"name": "20040628 Full path disclosure csFAQ",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=108844203121238&w=2"
|
||||
},
|
||||
{
|
||||
"name": "10618",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/10618"
|
||||
},
|
||||
{
|
||||
"name": "csfaq-path-disclosure(16526)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16526"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,31 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20041025 debian dhcpd, old format string bug",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2004-10/0287.html"
|
||||
},
|
||||
{
|
||||
"name" : "20041102 Re: debian dhcpd, old format string bug",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2004-11/0037.html"
|
||||
},
|
||||
{
|
||||
"name": "20041105 Re: debian dhcpd, old format string bug",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=109968710822449&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-584",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2004/dsa-584"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2005:212",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-212.html"
|
||||
},
|
||||
{
|
||||
"name": "VU#448384",
|
||||
"refsource": "CERT-VN",
|
||||
@ -87,10 +67,30 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11591"
|
||||
},
|
||||
{
|
||||
"name": "20041025 debian dhcpd, old format string bug",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-10/0287.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-584",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-584"
|
||||
},
|
||||
{
|
||||
"name": "dhcp-log-format-string(17963)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17963"
|
||||
},
|
||||
{
|
||||
"name": "20041102 Re: debian dhcpd, old format string bug",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-11/0037.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2005:212",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-212.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "GLSA-200412-07",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200412-07.xml"
|
||||
},
|
||||
{
|
||||
"name": "2004-0063",
|
||||
"refsource": "TRUSTIX",
|
||||
"url": "http://www.trustix.net/errata/2004/0063/"
|
||||
},
|
||||
{
|
||||
"name" : "11771",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/11771"
|
||||
},
|
||||
{
|
||||
"name": "1012433",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1012433"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200412-07",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200412-07.xml"
|
||||
},
|
||||
{
|
||||
"name": "11771",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11771"
|
||||
},
|
||||
{
|
||||
"name": "file-elf-header-bo(18368)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20041220 Crystal FTP Pro Client Buffer Overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=110356203624337&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "13583",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/13583/"
|
||||
},
|
||||
{
|
||||
"name": "12038",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/12038"
|
||||
},
|
||||
{
|
||||
"name": "20041220 Crystal FTP Pro Client Buffer Overflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=110356203624337&w=2"
|
||||
},
|
||||
{
|
||||
"name": "crystal-ftp-list-bo(18594)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18594"
|
||||
},
|
||||
{
|
||||
"name": "13583",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/13583/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=108301983206107&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "1009935",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1009935"
|
||||
"name": "openbb-tags-execute-code(15967)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15967"
|
||||
},
|
||||
{
|
||||
"name": "11481",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://secunia.com/advisories/11481"
|
||||
},
|
||||
{
|
||||
"name" : "openbb-tags-execute-code(15967)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15967"
|
||||
"name": "1009935",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1009935"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=214860",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=214860"
|
||||
"name": "10862",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/10862"
|
||||
},
|
||||
{
|
||||
"name": "http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/comments.php?r1=1.1&r2=1.2",
|
||||
@ -67,11 +67,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/category.php?r1=1.4&r2=1.5"
|
||||
},
|
||||
{
|
||||
"name" : "http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/input.php?r1=1.7&r2=1.8",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/input.php?r1=1.7&r2=1.8"
|
||||
},
|
||||
{
|
||||
"name": "http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/browse.php?r1=1.5&r2=1.6",
|
||||
"refsource": "CONFIRM",
|
||||
@ -82,60 +77,65 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/facade/header.php?r1=1.4&r2=1.5"
|
||||
},
|
||||
{
|
||||
"name": "1009012",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1009012"
|
||||
},
|
||||
{
|
||||
"name": "http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/input.php?r1=1.7&r2=1.8",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/input.php?r1=1.7&r2=1.8"
|
||||
},
|
||||
{
|
||||
"name": "http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/phpcc/header.php?r1=1.4&r2=1.5",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/phpcc/header.php?r1=1.4&r2=1.5"
|
||||
},
|
||||
{
|
||||
"name" : "9601",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/9601"
|
||||
},
|
||||
{
|
||||
"name" : "9645",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/9645"
|
||||
},
|
||||
{
|
||||
"name" : "3885",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/3885"
|
||||
},
|
||||
{
|
||||
"name" : "3886",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/3886"
|
||||
},
|
||||
{
|
||||
"name" : "3887",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/3887"
|
||||
},
|
||||
{
|
||||
"name" : "16710",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/16710"
|
||||
},
|
||||
{
|
||||
"name": "16711",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/16711"
|
||||
},
|
||||
{
|
||||
"name" : "1009012",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1009012"
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=214860",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=214860"
|
||||
},
|
||||
{
|
||||
"name" : "10862",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/10862"
|
||||
"name": "3886",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/3886"
|
||||
},
|
||||
{
|
||||
"name": "phpcodecabinet-multiple-xss(15190)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15190"
|
||||
},
|
||||
{
|
||||
"name": "3885",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/3885"
|
||||
},
|
||||
{
|
||||
"name": "16710",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/16710"
|
||||
},
|
||||
{
|
||||
"name": "3887",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/3887"
|
||||
},
|
||||
{
|
||||
"name": "9645",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/9645"
|
||||
},
|
||||
{
|
||||
"name": "9601",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/9601"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://members.lycos.co.uk/r34ct/main/ADA%20Image%20Server%20(ImgSvr)%200.4.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://members.lycos.co.uk/r34ct/main/ADA%20Image%20Server%20(ImgSvr)%200.4.txt"
|
||||
},
|
||||
{
|
||||
"name" : "10046",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/10046"
|
||||
"name": "imgsvr-get-bo(16679)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16679"
|
||||
},
|
||||
{
|
||||
"name": "4945",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/4945"
|
||||
},
|
||||
{
|
||||
"name" : "11287",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/11287"
|
||||
},
|
||||
{
|
||||
"name": "img-svr-get-bo(15827)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15827"
|
||||
},
|
||||
{
|
||||
"name" : "imgsvr-get-bo(16679)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/16679"
|
||||
"name": "10046",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/10046"
|
||||
},
|
||||
{
|
||||
"name": "http://members.lycos.co.uk/r34ct/main/ADA%20Image%20Server%20(ImgSvr)%200.4.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://members.lycos.co.uk/r34ct/main/ADA%20Image%20Server%20(ImgSvr)%200.4.txt"
|
||||
},
|
||||
{
|
||||
"name": "11287",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/11287"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,20 +58,15 @@
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0733.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.swp-zone.org/archivos/advisory-09.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.swp-zone.org/archivos/advisory-09.txt"
|
||||
"name": "10756",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/10756"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securiteam.com/securitynews/5CP0O20DFI.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securiteam.com/securitynews/5CP0O20DFI.html"
|
||||
},
|
||||
{
|
||||
"name" : "10756",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/10756"
|
||||
},
|
||||
{
|
||||
"name": "8104",
|
||||
"refsource": "OSVDB",
|
||||
@ -87,6 +82,11 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/12084"
|
||||
},
|
||||
{
|
||||
"name": "http://www.swp-zone.org/archivos/advisory-09.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.swp-zone.org/archivos/advisory-09.txt"
|
||||
},
|
||||
{
|
||||
"name": "outblaze-email-xss(16788)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.uniras.gov.uk/vuls/2004/841713/index.htm",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.uniras.gov.uk/vuls/2004/841713/index.htm"
|
||||
"name": "11133",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/11133"
|
||||
},
|
||||
{
|
||||
"name": "11542",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11542"
|
||||
},
|
||||
{
|
||||
"name" : "11133",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/11133"
|
||||
},
|
||||
{
|
||||
"name": "1011942",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1011942"
|
||||
},
|
||||
{
|
||||
"name": "hummingbird-xwcd-dos(17855)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17855"
|
||||
},
|
||||
{
|
||||
"name": "12984",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/12984"
|
||||
},
|
||||
{
|
||||
"name" : "hummingbird-xwcd-dos(17855)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17855"
|
||||
"name": "http://www.uniras.gov.uk/vuls/2004/841713/index.htm",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.uniras.gov.uk/vuls/2004/841713/index.htm"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,25 +53,15 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-1.ibm.com/support/docview.wss?uid=swg21303877",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg21303877"
|
||||
},
|
||||
{
|
||||
"name" : "29036",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29036"
|
||||
"name": "1019964",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1019964"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-1427",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1427/references"
|
||||
},
|
||||
{
|
||||
"name" : "1019964",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1019964"
|
||||
},
|
||||
{
|
||||
"name": "30081",
|
||||
"refsource": "SECUNIA",
|
||||
@ -81,6 +71,16 @@
|
||||
"name": "ibmrationalbuild-buildforgeagent-dos(42173)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42173"
|
||||
},
|
||||
{
|
||||
"name": "http://www-1.ibm.com/support/docview.wss?uid=swg21303877",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21303877"
|
||||
},
|
||||
{
|
||||
"name": "29036",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29036"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "blackbook-multiple-xss(42147)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42147"
|
||||
},
|
||||
{
|
||||
"name": "20080502 BlackBook v1.0 Multiple XSS Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/491549/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "29015",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29015"
|
||||
},
|
||||
{
|
||||
"name": "3873",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3873"
|
||||
},
|
||||
{
|
||||
"name" : "blackbook-multiple-xss(42147)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42147"
|
||||
"name": "29015",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29015"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "5616",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/5616"
|
||||
},
|
||||
{
|
||||
"name" : "29226",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29226"
|
||||
"name": "30265",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30265"
|
||||
},
|
||||
{
|
||||
"name": "1020035",
|
||||
@ -68,14 +63,19 @@
|
||||
"url": "http://www.securitytracker.com/id?1020035"
|
||||
},
|
||||
{
|
||||
"name" : "30265",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30265"
|
||||
"name": "5616",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5616"
|
||||
},
|
||||
{
|
||||
"name": "activekb-admin-security-bypass(42427)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42427"
|
||||
},
|
||||
{
|
||||
"name": "29226",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29226"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "5784",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/5784"
|
||||
"name": "3971",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3971"
|
||||
},
|
||||
{
|
||||
"name": "29651",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29651"
|
||||
},
|
||||
{
|
||||
"name" : "30613",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30613"
|
||||
},
|
||||
{
|
||||
"name" : "3971",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3971"
|
||||
},
|
||||
{
|
||||
"name": "fogforum-index-file-include(42985)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42985"
|
||||
},
|
||||
{
|
||||
"name": "5784",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5784"
|
||||
},
|
||||
{
|
||||
"name": "30613",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30613"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6258",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6258"
|
||||
"name": "phpbasket-product-sql-injection(44524)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44524"
|
||||
},
|
||||
{
|
||||
"name": "30726",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/30726"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2414",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2414"
|
||||
"name": "6258",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6258"
|
||||
},
|
||||
{
|
||||
"name": "4165",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://securityreason.com/securityalert/4165"
|
||||
},
|
||||
{
|
||||
"name" : "phpbasket-product-sql-injection(44524)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44524"
|
||||
"name": "ADV-2008-2414",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2414"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7327",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7327"
|
||||
},
|
||||
{
|
||||
"name" : "32609",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/32609"
|
||||
},
|
||||
{
|
||||
"name": "32973",
|
||||
"refsource": "SECUNIA",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "calendarmx-calendareventup-sql-injection(47040)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47040"
|
||||
},
|
||||
{
|
||||
"name": "32609",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32609"
|
||||
},
|
||||
{
|
||||
"name": "7327",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7327"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-20080619-1/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-20080619-1/"
|
||||
"name": "46385",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/46385"
|
||||
},
|
||||
{
|
||||
"name": "29828",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29828"
|
||||
},
|
||||
{
|
||||
"name" : "46385",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/46385"
|
||||
},
|
||||
{
|
||||
"name": "dmmjobcontrol-unspecified-xss(43202)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43202"
|
||||
},
|
||||
{
|
||||
"name": "http://typo3.org/teams/security/security-bulletins/typo3-20080619-1/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://typo3.org/teams/security/security-bulletins/typo3-20080619-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "fuzzylimecms-commsrss-directory-traversal(43941)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43941"
|
||||
},
|
||||
{
|
||||
"name": "6060",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "30930",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30930"
|
||||
},
|
||||
{
|
||||
"name" : "fuzzylimecms-commsrss-directory-traversal(43941)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43941"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7227",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7227"
|
||||
},
|
||||
{
|
||||
"name": "32470",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "chipmunk-topsites-index-xss(46837)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46837"
|
||||
},
|
||||
{
|
||||
"name": "7227",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7227"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2012-5141",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:15428",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15428"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2012/12/stable-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "openSUSE-SU-2012:1682",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00073.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:15428",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15428"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.htbridge.com/advisory/HTB23108",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.htbridge.com/advisory/HTB23108"
|
||||
},
|
||||
{
|
||||
"name": "86172",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/86172"
|
||||
},
|
||||
{
|
||||
"name": "https://www.htbridge.com/advisory/HTB23108",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.htbridge.com/advisory/HTB23108"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,11 +62,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://wordpress.org/extend/plugins/white-label-cms/changelog/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/files/117590/White-Label-CMS-1.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/files/117590/White-Label-CMS-1.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "56166",
|
||||
"refsource": "BID",
|
||||
@ -76,6 +71,11 @@
|
||||
"name": "wp-whitelabelcms-admin-xss(79522)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79522"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/files/117590/White-Label-CMS-1.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/files/117590/White-Label-CMS-1.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-5540",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://drupal.org/node/1802048",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/1802048"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules",
|
||||
"refsource": "MLIST",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "http://drupal.org/node/1802046",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/1802046"
|
||||
},
|
||||
{
|
||||
"name" : "http://drupal.org/node/1802048",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://drupal.org/node/1802048"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2012-0017.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:17049",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17049"
|
||||
},
|
||||
{
|
||||
"name": "1027875",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1027875"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:17049",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17049"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,46 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "DSA-3927",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3927"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:0169",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:0169"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2918",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2918"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2931",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2931"
|
||||
},
|
||||
{
|
||||
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
|
||||
},
|
||||
{
|
||||
"name": "99919",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99919"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3945",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3945"
|
||||
},
|
||||
{
|
||||
"name": "45553",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -62,55 +102,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1"
|
||||
},
|
||||
{
|
||||
"name" : "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3927",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2017/dsa-3927"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3945",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2017/dsa-3945"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2918",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2918"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2930",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2930"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2931",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2931"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:0169",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:0169"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:3822",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3822"
|
||||
},
|
||||
{
|
||||
"name" : "99919",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/99919"
|
||||
"name": "RHSA-2017:2930",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2930"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,25 +53,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1039990",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039990"
|
||||
},
|
||||
{
|
||||
"name": "43469",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/43469/"
|
||||
},
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11918",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11918"
|
||||
},
|
||||
{
|
||||
"name": "102089",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102089"
|
||||
},
|
||||
{
|
||||
"name" : "1039990",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039990"
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11918",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11918"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "DSA-4243",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4243"
|
||||
},
|
||||
{
|
||||
"name": "https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-chrome-os_27.html",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "https://crbug.com/777215",
|
||||
"refsource": "MISC",
|
||||
"url": "https://crbug.com/777215"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4243",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4243"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-15496",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://blog.xenproject.org/2017/05/02/updates-on-xsa-213-xsa-214-and-xsa-215/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://blog.xenproject.org/2017/05/02/updates-on-xsa-213-xsa-214-and-xsa-215/"
|
||||
"name": "GLSA-201705-11",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201705-11"
|
||||
},
|
||||
{
|
||||
"name": "1038388",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038388"
|
||||
},
|
||||
{
|
||||
"name": "https://xenbits.xen.org/xsa/advisory-215.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://xenbits.xen.org/xsa/advisory-215.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201705-11",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201705-11"
|
||||
},
|
||||
{
|
||||
"name": "98436",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/98436"
|
||||
},
|
||||
{
|
||||
"name" : "1038388",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038388"
|
||||
"name": "https://blog.xenproject.org/2017/05/02/updates-on-xsa-213-xsa-214-and-xsa-215/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://blog.xenproject.org/2017/05/02/updates-on-xsa-213-xsa-214-and-xsa-215/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "96206",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96206"
|
||||
},
|
||||
{
|
||||
"name": "https://erpscan.io/advisories/erpscan-17-008-sap-hana-xs-sinopia-dos/",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/"
|
||||
},
|
||||
{
|
||||
"name" : "96206",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/96206"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9c691f69fe5dad2332",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9c691f69fe5dad2332"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/scravy/node-macaddress/pull/20/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/scravy/node-macaddress/pull/20/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9c691f69fe5dad2332",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9c691f69fe5dad2332"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/scravy/node-macaddress/releases/tag/0.2.9",
|
||||
"refsource": "MISC",
|
||||
|
Loading…
x
Reference in New Issue
Block a user