"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 21:43:41 +00:00
parent b35c538208
commit 37e4eadec7
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 4204 additions and 4204 deletions

View File

@ -53,59 +53,59 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS05-040", "name": "oval:org.mitre.oval:def:1297",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-040"
},
{
"name" : "14518",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/14518"
},
{
"name" : "oval:org.mitre.oval:def:100084",
"refsource": "OVAL", "refsource": "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100084" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1297"
},
{
"name" : "oval:org.mitre.oval:def:100085",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100085"
},
{
"name" : "oval:org.mitre.oval:def:100086",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100086"
}, },
{ {
"name": "oval:org.mitre.oval:def:100088", "name": "oval:org.mitre.oval:def:100088",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100088" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100088"
}, },
{
"name": "14518",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14518"
},
{ {
"name": "oval:org.mitre.oval:def:1075", "name": "oval:org.mitre.oval:def:1075",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1075" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1075"
}, },
{ {
"name" : "oval:org.mitre.oval:def:1213", "name": "MS05-040",
"refsource" : "OVAL", "refsource": "MS",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1213" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-040"
},
{
"name" : "oval:org.mitre.oval:def:1297",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1297"
}, },
{ {
"name": "1014639", "name": "1014639",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014639" "url": "http://securitytracker.com/id?1014639"
}, },
{
"name": "oval:org.mitre.oval:def:100086",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100086"
},
{ {
"name": "16354", "name": "16354",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16354/" "url": "http://secunia.com/advisories/16354/"
},
{
"name": "oval:org.mitre.oval:def:100084",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100084"
},
{
"name": "oval:org.mitre.oval:def:1213",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1213"
},
{
"name": "oval:org.mitre.oval:def:100085",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100085"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "linksys-psus4-dos(19222)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19222"
},
{ {
"name": "20050203 [ RSTACK Public Security Advisory ] Remote DOS against Linksys PSUS4", "name": "20050203 [ RSTACK Public Security Advisory ] Remote DOS against Linksys PSUS4",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -66,11 +71,6 @@
"name": "14136", "name": "14136",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14136" "url": "http://secunia.com/advisories/14136"
},
{
"name" : "linksys-psus4-dos(19222)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19222"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "HPSBUX01117",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=110805105200470&w=2"
},
{ {
"name": "oval:org.mitre.oval:def:5690", "name": "oval:org.mitre.oval:def:5690",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5690" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5690"
}, },
{
"name": "hpux-bind-dos(19276)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19276"
},
{ {
"name": "14220", "name": "14220",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14220/" "url": "http://secunia.com/advisories/14220/"
}, },
{ {
"name" : "hpux-bind-dos(19276)", "name": "HPSBUX01117",
"refsource" : "XF", "refsource": "HP",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19276" "url": "http://marc.info/?l=bugtraq&m=110805105200470&w=2"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20050222 [SCAN Associates Security Advisory] vbulletin 3.0.6 and below php code injection", "name": "14326",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://marc.info/?l=bugtraq&m=110910899415763&w=2" "url": "http://secunia.com/advisories/14326"
}, },
{ {
"name": "http://www.vbulletin.com/forum/showthread.php?postid=819562", "name": "http://www.vbulletin.com/forum/showthread.php?postid=819562",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.vbulletin.com/forum/showthread.php?postid=819562" "url": "http://www.vbulletin.com/forum/showthread.php?postid=819562"
}, },
{
"name": "20050222 [SCAN Associates Security Advisory] vbulletin 3.0.6 and below php code injection",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110910899415763&w=2"
},
{ {
"name": "12622", "name": "12622",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/12622" "url": "http://www.securityfocus.com/bid/12622"
},
{
"name" : "14326",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/14326"
} }
] ]
} }

View File

@ -52,15 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "MDKSA-2005:059",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:059"
},
{ {
"name": "http://bugzilla.ximian.com/show_bug.cgi?id=72609", "name": "http://bugzilla.ximian.com/show_bug.cgi?id=72609",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://bugzilla.ximian.com/show_bug.cgi?id=72609" "url": "http://bugzilla.ximian.com/show_bug.cgi?id=72609"
}, },
{ {
"name" : "MDKSA-2005:059", "name": "oval:org.mitre.oval:def:10532",
"refsource" : "MANDRAKE", "refsource": "OVAL",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:059" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10532"
}, },
{ {
"name": "RHSA-2005:397", "name": "RHSA-2005:397",
@ -71,11 +76,6 @@
"name": "USN-166-1", "name": "USN-166-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/166-1/" "url": "https://usn.ubuntu.com/166-1/"
},
{
"name" : "oval:org.mitre.oval:def:10532",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10532"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-1155", "ID": "CVE-2005-1155",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.mikx.de/firelinking/", "name": "oval:org.mitre.oval:def:10655",
"refsource" : "MISC", "refsource": "OVAL",
"url" : "http://www.mikx.de/firelinking/" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10655"
},
{
"name" : "http://www.mozilla.org/security/announce/mfsa2005-37.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/mfsa2005-37.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=290036",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=290036"
},
{
"name" : "GLSA-200504-18",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml"
},
{
"name" : "RHSA-2005:383",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-383.html"
}, },
{ {
"name": "RHSA-2005:386", "name": "RHSA-2005:386",
@ -83,9 +63,9 @@
"url": "http://www.redhat.com/support/errata/RHSA-2005-386.html" "url": "http://www.redhat.com/support/errata/RHSA-2005-386.html"
}, },
{ {
"name" : "RHSA-2005:384", "name": "14992",
"refsource" : "REDHAT", "refsource": "SECUNIA",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-384.html" "url": "http://secunia.com/advisories/14992"
}, },
{ {
"name": "SCOSA-2005.49", "name": "SCOSA-2005.49",
@ -93,19 +73,9 @@
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt" "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt"
}, },
{ {
"name" : "VU#973309", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=290036",
"refsource" : "CERT-VN", "refsource": "CONFIRM",
"url" : "http://www.kb.cert.org/vuls/id/973309" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=290036"
},
{
"name" : "15495",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15495"
},
{
"name" : "13216",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/13216"
}, },
{ {
"name": "oval:org.mitre.oval:def:100021", "name": "oval:org.mitre.oval:def:100021",
@ -113,9 +83,24 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100021" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100021"
}, },
{ {
"name" : "oval:org.mitre.oval:def:10655", "name": "http://www.mikx.de/firelinking/",
"refsource" : "OVAL", "refsource": "MISC",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10655" "url": "http://www.mikx.de/firelinking/"
},
{
"name": "15495",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15495"
},
{
"name": "VU#973309",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/973309"
},
{
"name": "GLSA-200504-18",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200504-18.xml"
}, },
{ {
"name": "14938", "name": "14938",
@ -123,9 +108,24 @@
"url": "http://secunia.com/advisories/14938" "url": "http://secunia.com/advisories/14938"
}, },
{ {
"name" : "14992", "name": "RHSA-2005:384",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/14992" "url": "http://www.redhat.com/support/errata/RHSA-2005-384.html"
},
{
"name": "http://www.mozilla.org/security/announce/mfsa2005-37.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/mfsa2005-37.html"
},
{
"name": "13216",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/13216"
},
{
"name": "RHSA-2005:383",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-383.html"
} }
] ]
} }

View File

@ -57,16 +57,16 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/396628" "url": "http://www.securityfocus.com/archive/1/396628"
}, },
{
"name" : "http://www.venera.com/downloads/Canonicalization_problems_in_iSeries_FTP_security.pdf",
"refsource" : "MISC",
"url" : "http://www.venera.com/downloads/Canonicalization_problems_in_iSeries_FTP_security.pdf"
},
{ {
"name": "13312", "name": "13312",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/13312" "url": "http://www.securityfocus.com/bid/13312"
}, },
{
"name": "http://www.venera.com/downloads/Canonicalization_problems_in_iSeries_FTP_security.pdf",
"refsource": "MISC",
"url": "http://www.venera.com/downloads/Canonicalization_problems_in_iSeries_FTP_security.pdf"
},
{ {
"name": "multiple-vendor-security-bypass(20260)", "name": "multiple-vendor-security-bypass(20260)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.under9round.com/avn13.txt",
"refsource" : "MISC",
"url" : "http://www.under9round.com/avn13.txt"
},
{ {
"name": "1013933", "name": "1013933",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1013933" "url": "http://securitytracker.com/id?1013933"
},
{
"name": "http://www.under9round.com/avn13.txt",
"refsource": "MISC",
"url": "http://www.under9round.com/avn13.txt"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "18136",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18136"
},
{ {
"name": "16054", "name": "16054",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/16054" "url": "http://www.securityfocus.com/bid/16054"
}, },
{
"name" : "ADV-2005-3062",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/3062"
},
{ {
"name": "22035", "name": "22035",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/22035" "url": "http://www.osvdb.org/22035"
}, },
{
"name" : "18136",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18136"
},
{ {
"name": "shopengine-search-xss(23841)", "name": "shopengine-search-xss(23841)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23841" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23841"
},
{
"name": "ADV-2005-3062",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/3062"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://projects.edgewall.com/trac/ticket/2473", "name": "18555",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://projects.edgewall.com/trac/ticket/2473" "url": "http://secunia.com/advisories/18555"
}, },
{ {
"name": "http://trac.edgewall.org/ticket/2473", "name": "http://trac.edgewall.org/ticket/2473",
@ -63,19 +63,9 @@
"url": "http://trac.edgewall.org/ticket/2473" "url": "http://trac.edgewall.org/ticket/2473"
}, },
{ {
"name" : "DSA-951", "name": "trac-html-xss(24183)",
"refsource" : "DEBIAN", "refsource": "XF",
"url" : "http://www.debian.org/security/2006/dsa-951" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183"
},
{
"name" : "16198",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16198"
},
{
"name" : "ADV-2006-0226",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/0226"
}, },
{ {
"name": "18465", "name": "18465",
@ -83,14 +73,24 @@
"url": "http://secunia.com/advisories/18465" "url": "http://secunia.com/advisories/18465"
}, },
{ {
"name" : "18555", "name": "http://projects.edgewall.com/trac/ticket/2473",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/18555" "url": "http://projects.edgewall.com/trac/ticket/2473"
}, },
{ {
"name" : "trac-html-xss(24183)", "name": "ADV-2006-0226",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24183" "url": "http://www.vupen.com/english/advisories/2006/0226"
},
{
"name": "16198",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16198"
},
{
"name": "DSA-951",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-951"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2009-0087", "ID": "CVE-2009-0087",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS09-010", "name": "1022043",
"refsource" : "MS", "refsource": "SECTRACK",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010" "url": "http://www.securitytracker.com/id?1022043"
}, },
{ {
"name": "TA09-104A", "name": "TA09-104A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-104A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA09-104A.html"
}, },
{
"name" : "53662",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/53662"
},
{ {
"name": "oval:org.mitre.oval:def:5799", "name": "oval:org.mitre.oval:def:5799",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5799" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5799"
}, },
{ {
"name" : "1022043", "name": "53662",
"refsource" : "SECTRACK", "refsource": "OSVDB",
"url" : "http://www.securitytracker.com/id?1022043" "url": "http://osvdb.org/53662"
},
{
"name": "MS09-010",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010"
}, },
{ {
"name": "ADV-2009-1024", "name": "ADV-2009-1024",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2009-0093", "ID": "CVE-2009-0093",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "oval:org.mitre.oval:def:6138",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6138"
},
{
"name": "TA09-069A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-069A.html"
},
{ {
"name": "http://blog.ncircle.com/blogs/vert/archives/2009/03/successful_exploit_renders_mic.html", "name": "http://blog.ncircle.com/blogs/vert/archives/2009/03/successful_exploit_renders_mic.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://blog.ncircle.com/blogs/vert/archives/2009/03/successful_exploit_renders_mic.html" "url": "http://blog.ncircle.com/blogs/vert/archives/2009/03/successful_exploit_renders_mic.html"
}, },
{ {
"name" : "http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx", "name": "ADV-2009-0661",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx" "url": "http://www.vupen.com/english/advisories/2009/0661"
},
{
"name": "34217",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34217"
},
{
"name": "52519",
"refsource": "OSVDB",
"url": "http://osvdb.org/52519"
},
{
"name": "33989",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33989"
}, },
{ {
"name": "http://support.avaya.com/elmodocs2/security/ASA-2009-083.htm", "name": "http://support.avaya.com/elmodocs2/security/ASA-2009-083.htm",
@ -72,40 +97,15 @@
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008"
}, },
{
"name" : "TA09-069A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-069A.html"
},
{
"name" : "33989",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33989"
},
{
"name" : "52519",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/52519"
},
{
"name" : "oval:org.mitre.oval:def:6138",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6138"
},
{ {
"name": "1021830", "name": "1021830",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021830" "url": "http://www.securitytracker.com/id?1021830"
}, },
{ {
"name" : "34217", "name": "http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/34217" "url": "http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx"
},
{
"name" : "ADV-2009-0661",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0661"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "8020",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/8020"
},
{
"name" : "33704",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33704"
},
{
"name" : "33862",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33862"
},
{ {
"name": "ADV-2009-0383", "name": "ADV-2009-0383",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -76,6 +61,21 @@
"name": "yanocc-checklang-file-include(48608)", "name": "yanocc-checklang-file-include(48608)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48608" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48608"
},
{
"name": "33704",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33704"
},
{
"name": "8020",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/8020"
},
{
"name": "33862",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33862"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-0620", "ID": "CVE-2009-0620",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2009-1016", "ID": "CVE-2009-1016",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://secunia.com/secunia_research/2009-23/", "name": "oracle-bea-ssl-bo(64934)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://secunia.com/secunia_research/2009-23/" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64934"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html"
},
{
"name" : "TA09-105A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-105A.html"
},
{
"name" : "34461",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/34461"
}, },
{ {
"name": "1022059", "name": "1022059",
@ -78,9 +63,24 @@
"url": "http://www.securitytracker.com/id?1022059" "url": "http://www.securitytracker.com/id?1022059"
}, },
{ {
"name" : "oracle-bea-ssl-bo(64934)", "name": "34461",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64934" "url": "http://www.securityfocus.com/bid/34461"
},
{
"name": "TA09-105A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-105A.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html"
},
{
"name": "http://secunia.com/secunia_research/2009-23/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2009-23/"
} }
] ]
} }

View File

@ -57,16 +57,16 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/502256/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/502256/100/0/threaded"
}, },
{
"name" : "20090330 Check Point Firewall-1 PKI Web Service HTTP Header Remote Overflow",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0463.html"
},
{ {
"name": "8313", "name": "8313",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/8313" "url": "https://www.exploit-db.com/exploits/8313"
}, },
{
"name": "20090330 Check Point Firewall-1 PKI Web Service HTTP Header Remote Overflow",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0463.html"
},
{ {
"name": "34286", "name": "34286",
"refsource": "BID", "refsource": "BID",

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20090616 ZDI-09-043: Apple Java CColorUIResource Pointer Derference Code Execution Vulnerability", "name": "APPLE-SA-2009-06-15-1",
"refsource" : "BUGTRAQ", "refsource": "APPLE",
"url" : "http://www.securityfocus.com/archive/1/504364/100/0/threaded" "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00003.html"
},
{
"name": "35401",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35401"
}, },
{ {
"name": "http://www.zerodayinitiative.com/advisories/ZDI-09-043", "name": "http://www.zerodayinitiative.com/advisories/ZDI-09-043",
@ -63,14 +68,9 @@
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-043" "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-043"
}, },
{ {
"name" : "http://support.apple.com/kb/HT3632", "name": "20090616 ZDI-09-043: Apple Java CColorUIResource Pointer Derference Code Execution Vulnerability",
"refsource" : "CONFIRM", "refsource": "BUGTRAQ",
"url" : "http://support.apple.com/kb/HT3632" "url": "http://www.securityfocus.com/archive/1/504364/100/0/threaded"
},
{
"name" : "APPLE-SA-2009-06-15-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/Jun/msg00003.html"
}, },
{ {
"name": "35381", "name": "35381",
@ -78,9 +78,9 @@
"url": "http://www.securityfocus.com/bid/35381" "url": "http://www.securityfocus.com/bid/35381"
}, },
{ {
"name" : "35401", "name": "http://support.apple.com/kb/HT3632",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/35401" "url": "http://support.apple.com/kb/HT3632"
}, },
{ {
"name": "hotspot-ccolouruiresource-code-execution(51185)", "name": "hotspot-ccolouruiresource-code-execution(51185)",

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://packetstormsecurity.org/0908-exploits/egoldgame-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/0908-exploits/egoldgame-sql.txt"
},
{ {
"name": "36488", "name": "36488",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -66,6 +61,11 @@
"name": "ADV-2009-2442", "name": "ADV-2009-2442",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2442" "url": "http://www.vupen.com/english/advisories/2009/2442"
},
{
"name": "http://packetstormsecurity.org/0908-exploits/egoldgame-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0908-exploits/egoldgame-sql.txt"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://companionway.net/files/myphile/", "name": "myphile-password-security-bypass(54350)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://companionway.net/files/myphile/" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54350"
}, },
{ {
"name": "37322", "name": "37322",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37322" "url": "http://secunia.com/advisories/37322"
}, },
{
"name": "http://companionway.net/files/myphile/",
"refsource": "CONFIRM",
"url": "http://companionway.net/files/myphile/"
},
{ {
"name": "ADV-2009-3289", "name": "ADV-2009-3289",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3289" "url": "http://www.vupen.com/english/advisories/2009/3289"
},
{
"name" : "myphile-password-security-bypass(54350)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54350"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.net-security.org/secworld.php?id=8527",
"refsource" : "MISC",
"url" : "http://www.net-security.org/secworld.php?id=8527"
},
{
"name" : "https://addons.mozilla.org/en-US/firefox/addons/versions/1833#version-6.1.1",
"refsource" : "CONFIRM",
"url" : "https://addons.mozilla.org/en-US/firefox/addons/versions/1833#version-6.1.1"
},
{ {
"name": "37123", "name": "37123",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/37123" "url": "http://www.securityfocus.com/bid/37123"
}, },
{
"name" : "37468",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37468"
},
{ {
"name": "ADV-2009-3326", "name": "ADV-2009-3326",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3326" "url": "http://www.vupen.com/english/advisories/2009/3326"
}, },
{
"name": "https://addons.mozilla.org/en-US/firefox/addons/versions/1833#version-6.1.1",
"refsource": "CONFIRM",
"url": "https://addons.mozilla.org/en-US/firefox/addons/versions/1833#version-6.1.1"
},
{ {
"name": "yoonoo-domevent-xss(54417)", "name": "yoonoo-domevent-xss(54417)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54417" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54417"
},
{
"name": "http://www.net-security.org/secworld.php?id=8527",
"refsource": "MISC",
"url": "http://www.net-security.org/secworld.php?id=8527"
},
{
"name": "37468",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37468"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.suspekt.org/2009/11/28/shocking-news-in-php-exploitation/",
"refsource" : "MISC",
"url" : "http://www.suspekt.org/2009/11/28/shocking-news-in-php-exploitation/"
},
{ {
"name": "http://www.suspekt.org/downloads/POC2009-ShockingNewsInPHPExploitation.pdf", "name": "http://www.suspekt.org/downloads/POC2009-ShockingNewsInPHPExploitation.pdf",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.suspekt.org/downloads/POC2009-ShockingNewsInPHPExploitation.pdf" "url": "http://www.suspekt.org/downloads/POC2009-ShockingNewsInPHPExploitation.pdf"
},
{
"name": "http://www.suspekt.org/2009/11/28/shocking-news-in-php-exploitation/",
"refsource": "MISC",
"url": "http://www.suspekt.org/2009/11/28/shocking-news-in-php-exploitation/"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf",
"refsource" : "MISC",
"url" : "http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf"
},
{ {
"name": "1023387", "name": "1023387",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023387" "url": "http://securitytracker.com/id?1023387"
}, },
{
"name": "http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf",
"refsource": "MISC",
"url": "http://soroush.secproject.com/downloadable/iis-semicolon-report.pdf"
},
{ {
"name": "ms-iis-colon-security-bypass(55308)", "name": "ms-iis-colon-security-bypass(55308)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "kwebkitpart-webkitpart-xss(60878)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60878"
},
{ {
"name": "http://websvn.kde.org/?view=rev&revision=1059140", "name": "http://websvn.kde.org/?view=rev&revision=1059140",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "https://bugs.kde.org/show_bug.cgi?id=217464", "name": "https://bugs.kde.org/show_bug.cgi?id=217464",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugs.kde.org/show_bug.cgi?id=217464" "url": "https://bugs.kde.org/show_bug.cgi?id=217464"
},
{
"name" : "kwebkitpart-webkitpart-xss(60878)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/60878"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2012-2241", "ID": "CVE-2012-2241",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,30 +53,30 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=0fd15bdec07b085f9ef438dacd18e159ac60b810", "name": "55564",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=0fd15bdec07b085f9ef438dacd18e159ac60b810" "url": "http://www.securityfocus.com/bid/55564"
}, },
{ {
"name": "DSA-2549", "name": "DSA-2549",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2549" "url": "http://www.debian.org/security/2012/dsa-2549"
}, },
{
"name" : "USN-1593-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1593-1"
},
{
"name" : "55564",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/55564"
},
{ {
"name": "50600", "name": "50600",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50600" "url": "http://secunia.com/advisories/50600"
}, },
{
"name": "http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=0fd15bdec07b085f9ef438dacd18e159ac60b810",
"refsource": "CONFIRM",
"url": "http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=0fd15bdec07b085f9ef438dacd18e159ac60b810"
},
{
"name": "USN-1593-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1593-1"
},
{ {
"name": "devscripts-file-deletion(78977)", "name": "devscripts-file-deletion(78977)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,40 +53,55 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20120418 TC-SA-2012-01: Multiple web-vulnerabilities in ownCloud 3.0.0", "name": "81210",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-04/0127.html" "url": "http://osvdb.org/81210"
},
{
"name" : "[oss-security] 20120810 ownCloud - matching CVEs to fix information and vice versa",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/08/11/1"
},
{
"name" : "[oss-security] 20120901 Re: CVE - ownCloud",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/09/02/2"
},
{
"name" : "http://www.tele-consulting.com/advisories/TC-SA-2012-01.txt",
"refsource" : "MISC",
"url" : "http://www.tele-consulting.com/advisories/TC-SA-2012-01.txt"
}, },
{ {
"name": "http://owncloud.org/security/advisories/CVE-2012-2269/", "name": "http://owncloud.org/security/advisories/CVE-2012-2269/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://owncloud.org/security/advisories/CVE-2012-2269/" "url": "http://owncloud.org/security/advisories/CVE-2012-2269/"
}, },
{
"name" : "53145",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/53145"
},
{ {
"name": "81206", "name": "81206",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/81206" "url": "http://osvdb.org/81206"
}, },
{
"name": "http://www.tele-consulting.com/advisories/TC-SA-2012-01.txt",
"refsource": "MISC",
"url": "http://www.tele-consulting.com/advisories/TC-SA-2012-01.txt"
},
{
"name": "[oss-security] 20120810 ownCloud - matching CVEs to fix information and vice versa",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/11/1"
},
{
"name": "20120418 TC-SA-2012-01: Multiple web-vulnerabilities in ownCloud 3.0.0",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0127.html"
},
{
"name": "[oss-security] 20120901 Re: CVE - ownCloud",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/09/02/2"
},
{
"name": "48850",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48850"
},
{
"name": "81209",
"refsource": "OSVDB",
"url": "http://osvdb.org/81209"
},
{
"name": "53145",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53145"
},
{ {
"name": "81207", "name": "81207",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -97,21 +112,6 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/81208" "url": "http://osvdb.org/81208"
}, },
{
"name" : "81209",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/81209"
},
{
"name" : "81210",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/81210"
},
{
"name" : "48850",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48850"
},
{ {
"name": "owncloud-multiple1-xss(75028)", "name": "owncloud-multiple1-xss(75028)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-2486", "ID": "CVE-2012-2486",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices", "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch",
"refsource": "CISCO", "refsource": "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms"
}, },
{ {
"name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager", "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Manager",
@ -63,9 +63,9 @@
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman"
}, },
{ {
"name" : "20120711 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch", "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices",
"refsource": "CISCO", "refsource": "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts"
}, },
{ {
"name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server", "name": "20120711 Multiple Vulnerabilities in Cisco TelePresence Recording Server",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2749", "ID": "CVE-2012-2749",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,40 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html",
"refsource" : "CONFIRM",
"url" : "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=833737",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=833737"
},
{
"name" : "GLSA-201308-06",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"name" : "MDVSA-2013:150",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{ {
"name": "RHSA-2012:1462", "name": "RHSA-2012:1462",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html" "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html"
}, },
{
"name": "53372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53372"
},
{ {
"name": "RHSA-2013:0180", "name": "RHSA-2013:0180",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html"
}, },
{ {
"name" : "55120", "name": "GLSA-201308-06",
"refsource" : "BID", "refsource": "GENTOO",
"url" : "http://www.securityfocus.com/bid/55120" "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=833737",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737"
}, },
{ {
"name": "51309", "name": "51309",
@ -93,9 +83,19 @@
"url": "http://secunia.com/advisories/51309" "url": "http://secunia.com/advisories/51309"
}, },
{ {
"name" : "53372", "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/53372" "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html"
},
{
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name": "55120",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55120"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2012-2791", "ID": "CVE-2012-2791",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,46 +52,46 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/08/31/3"
},
{ {
"name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?", "name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/09/02/4" "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
}, },
{
"name" : "http://ffmpeg.org/security.html",
"refsource" : "CONFIRM",
"url" : "http://ffmpeg.org/security.html"
},
{
"name" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0846719dd11ab3f7a7caee13e7af71f71d913389",
"refsource" : "CONFIRM",
"url" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0846719dd11ab3f7a7caee13e7af71f71d913389"
},
{
"name" : "http://libav.org/releases/libav-0.7.7.changelog",
"refsource" : "CONFIRM",
"url" : "http://libav.org/releases/libav-0.7.7.changelog"
},
{ {
"name": "http://libav.org/releases/libav-0.8.5.changelog", "name": "http://libav.org/releases/libav-0.8.5.changelog",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://libav.org/releases/libav-0.8.5.changelog" "url": "http://libav.org/releases/libav-0.8.5.changelog"
}, },
{
"name" : "USN-1705-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1705-1"
},
{ {
"name": "55355", "name": "55355",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/55355" "url": "http://www.securityfocus.com/bid/55355"
}, },
{
"name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
},
{
"name": "http://ffmpeg.org/security.html",
"refsource": "CONFIRM",
"url": "http://ffmpeg.org/security.html"
},
{
"name": "http://libav.org/releases/libav-0.7.7.changelog",
"refsource": "CONFIRM",
"url": "http://libav.org/releases/libav-0.7.7.changelog"
},
{
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0846719dd11ab3f7a7caee13e7af71f71d913389",
"refsource": "CONFIRM",
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0846719dd11ab3f7a7caee13e7af71f71d913389"
},
{
"name": "USN-1705-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1705-1"
},
{ {
"name": "50468", "name": "50468",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2012-2825", "ID": "CVE-2012-2825",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,26 +57,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=127417" "url": "http://code.google.com/p/chromium/issues/detail?id=127417"
}, },
{
"name" : "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html"
},
{
"name" : "http://support.apple.com/kb/HT5934",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5934"
},
{
"name" : "http://support.apple.com/kb/HT6001",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6001"
},
{
"name" : "APPLE-SA-2013-09-18-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
},
{ {
"name": "APPLE-SA-2013-10-22-8", "name": "APPLE-SA-2013-10-22-8",
"refsource": "APPLE", "refsource": "APPLE",
@ -92,6 +72,16 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html" "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html"
}, },
{
"name": "http://support.apple.com/kb/HT6001",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6001"
},
{
"name": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html"
},
{ {
"name": "SUSE-SU-2013:1656", "name": "SUSE-SU-2013:1656",
"refsource": "SUSE", "refsource": "SUSE",
@ -101,6 +91,16 @@
"name": "54886", "name": "54886",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54886" "url": "http://secunia.com/advisories/54886"
},
{
"name": "http://support.apple.com/kb/HT5934",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5934"
},
{
"name": "APPLE-SA-2013-09-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
} }
] ]
} }

View File

@ -53,14 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[Xen-announce] 20120905 Xen Security Advisory 15 (CVE-2012-3497) - multiple TMEM hypercall vulnerabilities", "name": "55082",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html" "url": "http://secunia.com/advisories/55082"
}, },
{ {
"name" : "[oss-security] 20120905 Xen Security Advisory 15 (CVE-2012-3497) - multiple TMEM hypercall vulnerabilities", "name": "1027482",
"refsource" : "MLIST", "refsource": "SECTRACK",
"url" : "http://www.openwall.com/lists/oss-security/2012/09/05/8" "url": "http://www.securitytracker.com/id?1027482"
}, },
{ {
"name": "http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities", "name": "http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities",
@ -72,25 +72,30 @@
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
}, },
{
"name" : "GLSA-201604-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201604-03"
},
{ {
"name": "55410", "name": "55410",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/55410" "url": "http://www.securityfocus.com/bid/55410"
}, },
{
"name": "[oss-security] 20120905 Xen Security Advisory 15 (CVE-2012-3497) - multiple TMEM hypercall vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/09/05/8"
},
{
"name": "xen-tmem-priv-esc(78268)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78268"
},
{ {
"name": "85199", "name": "85199",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/85199" "url": "http://osvdb.org/85199"
}, },
{ {
"name" : "1027482", "name": "[Xen-announce] 20120905 Xen Security Advisory 15 (CVE-2012-3497) - multiple TMEM hypercall vulnerabilities",
"refsource" : "SECTRACK", "refsource": "MLIST",
"url" : "http://www.securitytracker.com/id?1027482" "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html"
}, },
{ {
"name": "50472", "name": "50472",
@ -98,14 +103,9 @@
"url": "http://secunia.com/advisories/50472" "url": "http://secunia.com/advisories/50472"
}, },
{ {
"name" : "55082", "name": "GLSA-201604-03",
"refsource" : "SECUNIA", "refsource": "GENTOO",
"url" : "http://secunia.com/advisories/55082" "url": "https://security.gentoo.org/glsa/201604-03"
},
{
"name" : "xen-tmem-priv-esc(78268)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/78268"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20150122 CVE-2015-1178-xss-x-cart-ecommerce", "name": "72275",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/534529/100/0/threaded" "url": "http://www.securityfocus.com/bid/72275"
}, },
{ {
"name": "http://packetstormsecurity.com/files/130061/X-CART-e-Commerce-5.1.8-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/130061/X-CART-e-Commerce-5.1.8-Cross-Site-Scripting.html",
@ -63,9 +63,9 @@
"url": "http://packetstormsecurity.com/files/130061/X-CART-e-Commerce-5.1.8-Cross-Site-Scripting.html" "url": "http://packetstormsecurity.com/files/130061/X-CART-e-Commerce-5.1.8-Cross-Site-Scripting.html"
}, },
{ {
"name" : "72275", "name": "20150122 CVE-2015-1178-xss-x-cart-ecommerce",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/72275" "url": "http://www.securityfocus.com/archive/1/534529/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-1704", "ID": "CVE-2015-1704",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS15-043",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043"
},
{ {
"name": "74521", "name": "74521",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "1032282", "name": "1032282",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032282" "url": "http://www.securitytracker.com/id/1032282"
},
{
"name": "MS15-043",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2015-5426", "ID": "CVE-2015-5426",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-408",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-408"
},
{ {
"name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04692147", "name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04692147",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "1033561", "name": "1033561",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033561" "url": "http://www.securitytracker.com/id/1033561"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-408",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-408"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-5942", "ID": "CVE-2015-5942",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT205370", "name": "APPLE-SA-2015-10-21-4",
"refsource" : "CONFIRM", "refsource": "APPLE",
"url" : "https://support.apple.com/HT205370" "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"
},
{
"name" : "https://support.apple.com/HT205375",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205375"
},
{
"name" : "https://support.apple.com/HT205378",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205378"
}, },
{ {
"name": "APPLE-SA-2015-10-21-1", "name": "APPLE-SA-2015-10-21-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html"
}, },
{
"name": "https://support.apple.com/HT205375",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205375"
},
{ {
"name": "APPLE-SA-2015-10-21-2", "name": "APPLE-SA-2015-10-21-2",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00003.html" "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00003.html"
}, },
{ {
"name" : "APPLE-SA-2015-10-21-4", "name": "https://support.apple.com/HT205370",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html" "url": "https://support.apple.com/HT205370"
},
{
"name": "https://support.apple.com/HT205378",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205378"
}, },
{ {
"name": "1033929", "name": "1033929",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@suse.com",
"ID": "CVE-2015-5969", "ID": "CVE-2015-5969",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://bugzilla.suse.com/957174", "name": "openSUSE-SU-2016:0367",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://bugzilla.suse.com/957174" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html"
}, },
{ {
"name": "SUSE-SU-2016:0296", "name": "SUSE-SU-2016:0296",
@ -63,9 +63,9 @@
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html" "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
}, },
{ {
"name" : "openSUSE-SU-2016:0367", "name": "openSUSE-SU-2016:0379",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00050.html"
}, },
{ {
"name": "openSUSE-SU-2016:0368", "name": "openSUSE-SU-2016:0368",
@ -73,9 +73,9 @@
"url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html"
}, },
{ {
"name" : "openSUSE-SU-2016:0379", "name": "https://bugzilla.suse.com/957174",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-02/msg00050.html" "url": "https://bugzilla.suse.com/957174"
} }
] ]
} }

View File

@ -60,6 +60,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{ {
"name": "https://pivotal.io/security/cve-2018-11039", "name": "https://pivotal.io/security/cve-2018-11039",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -69,11 +74,6 @@
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource" : "CONFIRM",
"url" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
} }
] ]
}, },

View File

@ -57,11 +57,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{ {
"name": "105598", "name": "105598",
"refsource": "BID", "refsource": "BID",
@ -71,6 +66,11 @@
"name": "1041891", "name": "1041891",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041891" "url": "http://www.securitytracker.com/id/1041891"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20180330 [SECURITY] [DLA 1332-1] libvncserver security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/03/msg00035.html"
},
{
"name" : "http://www.openwall.com/lists/oss-security/2018/02/18/1",
"refsource" : "MISC",
"url" : "http://www.openwall.com/lists/oss-security/2018/02/18/1"
},
{
"name" : "https://github.com/LibVNC/libvncserver/issues/218",
"refsource" : "MISC",
"url" : "https://github.com/LibVNC/libvncserver/issues/218"
},
{ {
"name": "DSA-4221", "name": "DSA-4221",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4221" "url": "https://www.debian.org/security/2018/dsa-4221"
}, },
{
"name" : "RHSA-2018:1055",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:1055"
},
{ {
"name": "USN-3618-1", "name": "USN-3618-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3618-1/" "url": "https://usn.ubuntu.com/3618-1/"
}, },
{
"name": "https://github.com/LibVNC/libvncserver/issues/218",
"refsource": "MISC",
"url": "https://github.com/LibVNC/libvncserver/issues/218"
},
{
"name": "[debian-lts-announce] 20180330 [SECURITY] [DLA 1332-1] libvncserver security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00035.html"
},
{ {
"name": "103107", "name": "103107",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/103107" "url": "http://www.securityfocus.com/bid/103107"
},
{
"name": "http://www.openwall.com/lists/oss-security/2018/02/18/1",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2018/02/18/1"
},
{
"name": "RHSA-2018:1055",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1055"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://gist.github.com/anonymous/cfc3f3419804b22ee9e82ee8d16a661d", "name": "https://github.com/VerSprite/research/blob/master/advisories/VS-2018-004.md",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://gist.github.com/anonymous/cfc3f3419804b22ee9e82ee8d16a661d" "url": "https://github.com/VerSprite/research/blob/master/advisories/VS-2018-004.md"
}, },
{ {
"name": "https://github.com/VerSprite/research/blob/eba22c8b506be6f7128ef5356281915d5667bfff/advisories/VS-2018-004.md", "name": "https://github.com/VerSprite/research/blob/eba22c8b506be6f7128ef5356281915d5667bfff/advisories/VS-2018-004.md",
@ -63,9 +63,9 @@
"url": "https://github.com/VerSprite/research/blob/eba22c8b506be6f7128ef5356281915d5667bfff/advisories/VS-2018-004.md" "url": "https://github.com/VerSprite/research/blob/eba22c8b506be6f7128ef5356281915d5667bfff/advisories/VS-2018-004.md"
}, },
{ {
"name" : "https://github.com/VerSprite/research/blob/master/advisories/VS-2018-004.md", "name": "https://gist.github.com/anonymous/cfc3f3419804b22ee9e82ee8d16a661d",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://github.com/VerSprite/research/blob/master/advisories/VS-2018-004.md" "url": "https://gist.github.com/anonymous/cfc3f3419804b22ee9e82ee8d16a661d"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://blog.npmjs.org/post/171169301000/v571",
"refsource" : "MISC",
"url" : "http://blog.npmjs.org/post/171169301000/v571"
},
{ {
"name": "https://github.com/npm/npm/commit/74e149da6efe6ed89477faa81fef08eee7999ad0", "name": "https://github.com/npm/npm/commit/74e149da6efe6ed89477faa81fef08eee7999ad0",
"refsource": "MISC", "refsource": "MISC",
@ -66,6 +61,11 @@
"name": "https://github.com/npm/npm/issues/19883", "name": "https://github.com/npm/npm/issues/19883",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/npm/npm/issues/19883" "url": "https://github.com/npm/npm/issues/19883"
},
{
"name": "http://blog.npmjs.org/post/171169301000/v571",
"refsource": "MISC",
"url": "http://blog.npmjs.org/post/171169301000/v571"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8539", "ID": "CVE-2018-8539",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -68,11 +68,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8539",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8539"
},
{ {
"name": "105835", "name": "105835",
"refsource": "BID", "refsource": "BID",
@ -82,6 +77,11 @@
"name": "1042112", "name": "1042112",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1042112" "url": "http://www.securitytracker.com/id/1042112"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8539",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8539"
} }
] ]
} }