mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5aad28da30
commit
3eff7fcd40
@ -52,90 +52,90 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-1.ibm.com/support/docview.wss?uid=swg27007054",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg27007054"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/258394eaa824f2c08525708a004209d3?OpenDocument",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/258394eaa824f2c08525708a004209d3?OpenDocument"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/040482aeb1416bb7852570e4001badd6?OpenDocument",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/040482aeb1416bb7852570e4001badd6?OpenDocument"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/2bb4f466a9e986ae852570e4001babbb?OpenDocument",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/2bb4f466a9e986ae852570e4001babbb?OpenDocument"
|
||||
},
|
||||
{
|
||||
"name": "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/4118a1f266afb26c852570e4001baf5e?OpenDocument",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/4118a1f266afb26c852570e4001baf5e?OpenDocument"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/5f166a44ee743b2c852570e4001baf31?OpenDocument",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/5f166a44ee743b2c852570e4001baf31?OpenDocument"
|
||||
},
|
||||
{
|
||||
"name": "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/ad0dd14aa109f96b852570e4001bb08c?OpenDocument",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/ad0dd14aa109f96b852570e4001bb08c?OpenDocument"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/ced5f873baea4e8b852570e4001baa6d?OpenDocument",
|
||||
"name": "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/5f166a44ee743b2c852570e4001baf31?OpenDocument",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/ced5f873baea4e8b852570e4001baa6d?OpenDocument"
|
||||
"url": "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/5f166a44ee743b2c852570e4001baf31?OpenDocument"
|
||||
},
|
||||
{
|
||||
"name" : "16158",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16158"
|
||||
"name": "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/040482aeb1416bb7852570e4001badd6?OpenDocument",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/040482aeb1416bb7852570e4001badd6?OpenDocument"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-0081",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/0081"
|
||||
},
|
||||
{
|
||||
"name" : "18328",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18328"
|
||||
},
|
||||
{
|
||||
"name" : "lotus-bmp-dos(24214)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24214"
|
||||
},
|
||||
{
|
||||
"name" : "lotus-certificate-parsing-dos(24216)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24216"
|
||||
},
|
||||
{
|
||||
"name" : "lotus-compact-dos(24213)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24213"
|
||||
},
|
||||
{
|
||||
"name" : "lotus-delete-attachment-dos(24215)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24215"
|
||||
"name": "http://www-1.ibm.com/support/docview.wss?uid=swg27007054",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg27007054"
|
||||
},
|
||||
{
|
||||
"name": "lotus-outofoffice-dos(24212)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24212"
|
||||
},
|
||||
{
|
||||
"name": "lotus-bmp-dos(24214)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24214"
|
||||
},
|
||||
{
|
||||
"name": "16158",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16158"
|
||||
},
|
||||
{
|
||||
"name": "lotus-compact-dos(24213)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24213"
|
||||
},
|
||||
{
|
||||
"name": "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/2bb4f466a9e986ae852570e4001babbb?OpenDocument",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/2bb4f466a9e986ae852570e4001babbb?OpenDocument"
|
||||
},
|
||||
{
|
||||
"name": "lotus-delete-attachment-dos(24215)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24215"
|
||||
},
|
||||
{
|
||||
"name": "lotus-certificate-parsing-dos(24216)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24216"
|
||||
},
|
||||
{
|
||||
"name": "lotus-ssl-keyring-dos(24217)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24217"
|
||||
},
|
||||
{
|
||||
"name": "18328",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18328"
|
||||
},
|
||||
{
|
||||
"name": "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/258394eaa824f2c08525708a004209d3?OpenDocument",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/258394eaa824f2c08525708a004209d3?OpenDocument"
|
||||
},
|
||||
{
|
||||
"name": "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/ced5f873baea4e8b852570e4001baa6d?OpenDocument",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/ced5f873baea4e8b852570e4001baa6d?OpenDocument"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0081",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0081"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "BEA06-119.00",
|
||||
"refsource" : "BEA",
|
||||
"url" : "http://dev2dev.bea.com/pub/advisory/176"
|
||||
},
|
||||
{
|
||||
"name" : "16358",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16358"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-0313",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0313"
|
||||
},
|
||||
{
|
||||
"name": "weblogic-jdni-security-weakness(24299)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24299"
|
||||
},
|
||||
{
|
||||
"name": "1015528",
|
||||
"refsource": "SECTRACK",
|
||||
@ -78,9 +73,14 @@
|
||||
"url": "http://secunia.com/advisories/18592"
|
||||
},
|
||||
{
|
||||
"name" : "weblogic-jdni-security-weakness(24299)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24299"
|
||||
"name": "BEA06-119.00",
|
||||
"refsource": "BEA",
|
||||
"url": "http://dev2dev.bea.com/pub/advisory/176"
|
||||
},
|
||||
{
|
||||
"name": "16358",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16358"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060218 [waraxe-2006-SA#045] - Bypassing CAPTCHA in phpNuke 6.x-7.9",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/425394/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.waraxe.us/advisory-45.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.waraxe.us/advisory-45.html"
|
||||
},
|
||||
{
|
||||
"name": "16722",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16722"
|
||||
},
|
||||
{
|
||||
"name": "455",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/455"
|
||||
},
|
||||
{
|
||||
"name": "20060218 [waraxe-2006-SA#045] - Bypassing CAPTCHA in phpNuke 6.x-7.9",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/425394/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "18936",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18936"
|
||||
},
|
||||
{
|
||||
"name" : "455",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/455"
|
||||
"name": "http://www.waraxe.us/advisory-45.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.waraxe.us/advisory-45.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://pridels0.blogspot.com/2006/06/dwzone-shopping-cart-xss-vuln.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://pridels0.blogspot.com/2006/06/dwzone-shopping-cart-xss-vuln.html"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-2291",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/2291"
|
||||
},
|
||||
{
|
||||
"name" : "26401",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/26401"
|
||||
"name": "20603",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20603"
|
||||
},
|
||||
{
|
||||
"name": "26402",
|
||||
@ -73,9 +63,19 @@
|
||||
"url": "http://www.osvdb.org/26402"
|
||||
},
|
||||
{
|
||||
"name" : "20603",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20603"
|
||||
"name": "26401",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/26401"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2291",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2291"
|
||||
},
|
||||
{
|
||||
"name": "http://pridels0.blogspot.com/2006/06/dwzone-shopping-cart-xss-vuln.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://pridels0.blogspot.com/2006/06/dwzone-shopping-cart-xss-vuln.html"
|
||||
},
|
||||
{
|
||||
"name": "dwzone-productdetailsform-xss(27032)",
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060710 Local file inclusion in Farsinews3.0BETA1",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/439664/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060721 SECURITY UPDATE::Farsinews release FarsiNewsPro3.0Stable1SecurityPath1",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/440757/100/0/threaded"
|
||||
"name": "1016464",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016464"
|
||||
},
|
||||
{
|
||||
"name": "http://forum.farsinewsteam.com/showthread.php?p=16",
|
||||
"refsource": "MISC",
|
||||
"url": "http://forum.farsinewsteam.com/showthread.php?p=16"
|
||||
},
|
||||
{
|
||||
"name": "20060721 SECURITY UPDATE::Farsinews release FarsiNewsPro3.0Stable1SecurityPath1",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/440757/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "18925",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18925"
|
||||
},
|
||||
{
|
||||
"name" : "1016464",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016464"
|
||||
},
|
||||
{
|
||||
"name": "farsinews-tinymcegzip-file-include(27650)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27650"
|
||||
},
|
||||
{
|
||||
"name": "20060710 Local file inclusion in Farsinews3.0BETA1",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/439664/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060727 Buffer Overflow Vulnerability in Winlpd",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/441302/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://foro.elhacker.net/index.php/topic,131756.htm",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://foro.elhacker.net/index.php/topic,131756.htm"
|
||||
},
|
||||
{
|
||||
"name" : "2014",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/2014"
|
||||
},
|
||||
{
|
||||
"name" : "19011",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19011"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2823",
|
||||
"refsource": "VUPEN",
|
||||
@ -83,9 +63,24 @@
|
||||
"url": "http://www.osvdb.org/displayvuln.php?osvdb_id=27332"
|
||||
},
|
||||
{
|
||||
"name" : "1016510",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016510"
|
||||
"name": "20060727 Buffer Overflow Vulnerability in Winlpd",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/441302/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://foro.elhacker.net/index.php/topic,131756.htm",
|
||||
"refsource": "MISC",
|
||||
"url": "http://foro.elhacker.net/index.php/topic,131756.htm"
|
||||
},
|
||||
{
|
||||
"name": "winlpd-long-request-bo(27759)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27759"
|
||||
},
|
||||
{
|
||||
"name": "2014",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2014"
|
||||
},
|
||||
{
|
||||
"name": "21058",
|
||||
@ -93,9 +88,14 @@
|
||||
"url": "http://secunia.com/advisories/21058"
|
||||
},
|
||||
{
|
||||
"name" : "winlpd-long-request-bo(27759)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27759"
|
||||
"name": "19011",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19011"
|
||||
},
|
||||
{
|
||||
"name": "1016510",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016510"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060718 WebScarab <= 20060621-0003 cross site scripting",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/440441/100/0/threaded"
|
||||
"name": "1276",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1276"
|
||||
},
|
||||
{
|
||||
"name": "19063",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19063"
|
||||
},
|
||||
{
|
||||
"name": "20060718 WebScarab <= 20060621-0003 cross site scripting",
|
||||
@ -68,9 +73,14 @@
|
||||
"url": "http://moritz-naumann.com/adv/0012/webscarabxss/0012.txt"
|
||||
},
|
||||
{
|
||||
"name" : "19063",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19063"
|
||||
"name": "20060718 WebScarab <= 20060621-0003 cross site scripting",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/440441/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "webscarab-uri-xss(27797)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27797"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2878",
|
||||
@ -81,16 +91,6 @@
|
||||
"name": "21114",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21114"
|
||||
},
|
||||
{
|
||||
"name" : "1276",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1276"
|
||||
},
|
||||
{
|
||||
"name" : "webscarab-uri-xss(27797)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27797"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060730 PHPAuction 2.1 (maybe higher) with phpAdsNew 2.0.5 RFI",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/441716/100/0/threaded"
|
||||
"name": "1320",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1320"
|
||||
},
|
||||
{
|
||||
"name": "http://www.bb-pcsecurity.de/sicherheit_264.htm",
|
||||
@ -63,9 +63,14 @@
|
||||
"url": "http://www.bb-pcsecurity.de/sicherheit_264.htm"
|
||||
},
|
||||
{
|
||||
"name" : "2100",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/2100"
|
||||
"name": "phpadsnew-viewinc-file-include(28110)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28110"
|
||||
},
|
||||
{
|
||||
"name": "20060730 PHPAuction 2.1 (maybe higher) with phpAdsNew 2.0.5 RFI",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/441716/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "19254",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/19254"
|
||||
},
|
||||
{
|
||||
"name" : "1320",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1320"
|
||||
},
|
||||
{
|
||||
"name" : "phpadsnew-viewinc-file-include(28110)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28110"
|
||||
"name": "2100",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2100"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,55 +52,55 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060818 mambo-phphop Product Scroller Module R.F.I",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/443623/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "19591",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19591"
|
||||
},
|
||||
{
|
||||
"name" : "28151",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/28151"
|
||||
},
|
||||
{
|
||||
"name" : "28152",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/28152"
|
||||
},
|
||||
{
|
||||
"name": "28153",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/28153"
|
||||
},
|
||||
{
|
||||
"name" : "28154",
|
||||
"name": "28152",
|
||||
"refsource": "OSVDB",
|
||||
"url" : "http://www.osvdb.org/28154"
|
||||
},
|
||||
{
|
||||
"name" : "28155",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/28155"
|
||||
},
|
||||
{
|
||||
"name" : "28156",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/28156"
|
||||
"url": "http://www.osvdb.org/28152"
|
||||
},
|
||||
{
|
||||
"name": "28158",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/28158"
|
||||
},
|
||||
{
|
||||
"name": "28155",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/28155"
|
||||
},
|
||||
{
|
||||
"name": "28151",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/28151"
|
||||
},
|
||||
{
|
||||
"name": "20060818 mambo-phphop Product Scroller Module R.F.I",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/443623/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "phpshop-toolbarphpshop-file-include(28441)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28441"
|
||||
},
|
||||
{
|
||||
"name": "28156",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/28156"
|
||||
},
|
||||
{
|
||||
"name": "28154",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/28154"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "30370",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/30370"
|
||||
},
|
||||
{
|
||||
"name": "20061111 shambo2 Component For Mambo 4.5 Remote File Inclusion Exploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/451347/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name": "shambo2-mosconfigabsoluetpath-file-include(30235)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30235"
|
||||
},
|
||||
{
|
||||
"name": "21030",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21030"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4503",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4503"
|
||||
},
|
||||
{
|
||||
"name" : "30370",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/30370"
|
||||
},
|
||||
{
|
||||
"name": "22870",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22870"
|
||||
},
|
||||
{
|
||||
"name" : "shambo2-mosconfigabsoluetpath-file-include(30235)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30235"
|
||||
"name": "ADV-2006-4503",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4503"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://projects.info-pull.com/mokb/MOKB-24-11-2006.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://projects.info-pull.com/mokb/MOKB-24-11-2006.html"
|
||||
"name": "26444",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/26444"
|
||||
},
|
||||
{
|
||||
"name" : "http://docs.info.apple.com/article.html?artnum=307041",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://docs.info.apple.com/article.html?artnum=307041"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2007-11-14",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA07-319A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-319A.html"
|
||||
"name": "macosx-kqueue-dos(30544)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30544"
|
||||
},
|
||||
{
|
||||
"name": "21285",
|
||||
@ -78,39 +68,49 @@
|
||||
"url": "http://www.securityfocus.com/bid/21285"
|
||||
},
|
||||
{
|
||||
"name" : "26444",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/26444"
|
||||
"name": "APPLE-SA-2007-11-14",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "http://docs.info.apple.com/article.html?artnum=307041",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://docs.info.apple.com/article.html?artnum=307041"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4715",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4715"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-3868",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/3868"
|
||||
},
|
||||
{
|
||||
"name" : "30695",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/30695"
|
||||
},
|
||||
{
|
||||
"name": "23114",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23114"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-3868",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/3868"
|
||||
},
|
||||
{
|
||||
"name": "27643",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27643"
|
||||
},
|
||||
{
|
||||
"name" : "macosx-kqueue-dos(30544)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30544"
|
||||
"name": "http://projects.info-pull.com/mokb/MOKB-24-11-2006.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://projects.info-pull.com/mokb/MOKB-24-11-2006.html"
|
||||
},
|
||||
{
|
||||
"name": "TA07-319A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html"
|
||||
},
|
||||
{
|
||||
"name": "30695",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/30695"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "2194",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/2194"
|
||||
},
|
||||
{
|
||||
"name": "2204",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2204"
|
||||
},
|
||||
{
|
||||
"name": "19520",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19520"
|
||||
},
|
||||
{
|
||||
"name": "2210",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2210"
|
||||
},
|
||||
{
|
||||
"name": "2194",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2194"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xsec.org/index.php?module=Releases&act=view&type=1&id=6",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.xsec.org/index.php?module=Releases&act=view&type=1&id=6"
|
||||
},
|
||||
{
|
||||
"name" : "19520",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19520"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-2235",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=607662",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "RHSA-2010:0775",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2010-0775.html"
|
||||
},
|
||||
{
|
||||
"name": "http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100610 ZDI-10-107: Multiple Sourcefire Products Static Web SSL Keys Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/511792/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-10-107/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-10-107/"
|
||||
"name": "65470",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/65470"
|
||||
},
|
||||
{
|
||||
"name": "https://support.sourcefire.com/notices/notice/1437",
|
||||
@ -68,9 +63,9 @@
|
||||
"url": "https://support.sourcefire.com/notices/notice/1437"
|
||||
},
|
||||
{
|
||||
"name" : "65470",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/65470"
|
||||
"name": "40143",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/40143"
|
||||
},
|
||||
{
|
||||
"name": "1024092",
|
||||
@ -78,15 +73,20 @@
|
||||
"url": "http://www.securitytracker.com/id?1024092"
|
||||
},
|
||||
{
|
||||
"name" : "40143",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/40143"
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-107/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-107/"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1438",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1438"
|
||||
},
|
||||
{
|
||||
"name": "20100610 ZDI-10-107: Multiple Sourcefire Products Static Web SSL Keys Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/511792/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "sourcefire3d-ssl-mitm(59380)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,26 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590298",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590298"
|
||||
},
|
||||
{
|
||||
"name" : "http://security-tracker.debian.org/tracker/CVE-2010-2320",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://security-tracker.debian.org/tracker/CVE-2010-2320"
|
||||
},
|
||||
{
|
||||
"name": "http://www.eterna.com.au/bozohttpd/CHANGES",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.eterna.com.au/bozohttpd/CHANGES"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.launchpad.net/ubuntu/+source/bozohttpd/+bug/582473",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.launchpad.net/ubuntu/+source/bozohttpd/+bug/582473"
|
||||
},
|
||||
{
|
||||
"name": "40737",
|
||||
"refsource": "SECUNIA",
|
||||
@ -81,6 +66,21 @@
|
||||
"name": "bozohttp-publichtml-info-disclosure(60812)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60812"
|
||||
},
|
||||
{
|
||||
"name": "http://security-tracker.debian.org/tracker/CVE-2010-2320",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://security-tracker.debian.org/tracker/CVE-2010-2320"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.launchpad.net/ubuntu/+source/bozohttpd/+bug/582473",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.launchpad.net/ubuntu/+source/bozohttpd/+bug/582473"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590298",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590298"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2010-2395",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2010-2840",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100825 Cisco Unified Presence Denial of Service Vulnerabilities",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43909.shtml"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-2186",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/2186"
|
||||
},
|
||||
{
|
||||
"name": "20100825 Cisco Unified Presence Denial of Service Vulnerabilities",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b43909.shtml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2010-3082",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20100909 CVE Assignment: django",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=128403961700444&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.djangoproject.com/weblog/2010/sep/08/security-release/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.djangoproject.com/weblog/2010/sep/08/security-release/"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=632239",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=632239"
|
||||
},
|
||||
{
|
||||
"name": "USN-1004-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1004-1"
|
||||
},
|
||||
{
|
||||
"name": "django-token-csrf(61729)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61729"
|
||||
},
|
||||
{
|
||||
"name": "43116",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/43116"
|
||||
},
|
||||
{
|
||||
"name" : "django-token-csrf(61729)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/61729"
|
||||
"name": "[oss-security] 20100909 CVE Assignment: django",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=128403961700444&w=2"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=632239",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=632239"
|
||||
},
|
||||
{
|
||||
"name": "http://www.djangoproject.com/weblog/2010/sep/08/security-release/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.djangoproject.com/weblog/2010/sep/08/security-release/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-0018",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,14 +58,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/515971/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "16086",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/16086"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.openvas.org/OVSA20110118.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.openvas.org/OVSA20110118.html"
|
||||
"name": "43037",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43037"
|
||||
},
|
||||
{
|
||||
"name": "45987",
|
||||
@ -73,20 +68,25 @@
|
||||
"url": "http://www.securityfocus.com/bid/45987"
|
||||
},
|
||||
{
|
||||
"name" : "70639",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/70639"
|
||||
},
|
||||
{
|
||||
"name" : "43037",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43037"
|
||||
"name": "http://www.openvas.org/OVSA20110118.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.openvas.org/OVSA20110118.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0208",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0208"
|
||||
},
|
||||
{
|
||||
"name": "70639",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/70639"
|
||||
},
|
||||
{
|
||||
"name": "16086",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/16086"
|
||||
},
|
||||
{
|
||||
"name": "openvas-email-command-execution(65011)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2011-0123",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4554",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4554"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4564",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4564"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:17018",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17018"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4566",
|
||||
"refsource": "CONFIRM",
|
||||
@ -77,15 +77,15 @@
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4554",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4554"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-03-09-2",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:17018",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17018"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-0588",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
|
||||
"name": "oval:org.mitre.oval:def:12378",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12378"
|
||||
},
|
||||
{
|
||||
"name": "46254",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/46254"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:12378",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12378"
|
||||
"name": "ADV-2011-0337",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0337"
|
||||
},
|
||||
{
|
||||
"name": "1025033",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://www.securitytracker.com/id?1025033"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0337",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0337"
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
|
||||
},
|
||||
{
|
||||
"name": "adobe-reader-dll-code-exec(65293)",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20110128 Vulnerabilities in Adobe ColdFusion",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2011-01/0537.html"
|
||||
"name": "70779",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/70779"
|
||||
},
|
||||
{
|
||||
"name": "http://websecurity.com.ua/4879/",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb11-04.html"
|
||||
},
|
||||
{
|
||||
"name" : "70779",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/70779"
|
||||
"name": "20110128 Vulnerabilities in Adobe ColdFusion",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-01/0537.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-11-142/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-11-142/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21496106",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21496106"
|
||||
},
|
||||
{
|
||||
"name" : "47584",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/47584"
|
||||
},
|
||||
{
|
||||
"name": "1025451",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1025451"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-11-142/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-142/"
|
||||
},
|
||||
{
|
||||
"name": "44380",
|
||||
"refsource": "SECUNIA",
|
||||
@ -82,10 +72,20 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/1117"
|
||||
},
|
||||
{
|
||||
"name": "47584",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/47584"
|
||||
},
|
||||
{
|
||||
"name": "soliddb-null-pointer-dos(67019)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67019"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg21496106",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg21496106"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://downloads.digium.com/pub/security/AST-2011-005.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://downloads.digium.com/pub/security/AST-2011-005.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=698916",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=698916"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2225",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2011/dsa-2225"
|
||||
"name": "ADV-2011-1188",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/1188"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-5835",
|
||||
@ -73,25 +63,15 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058922.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2011-6208",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059702.html"
|
||||
"name": "DSA-2225",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2011/dsa-2225"
|
||||
},
|
||||
{
|
||||
"name": "1025432",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1025432"
|
||||
},
|
||||
{
|
||||
"name" : "44197",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/44197"
|
||||
},
|
||||
{
|
||||
"name" : "44529",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/44529"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-1086",
|
||||
"refsource": "VUPEN",
|
||||
@ -103,9 +83,29 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2011/1107"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-1188",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/1188"
|
||||
"name": "44529",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/44529"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2011-6208",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/059702.html"
|
||||
},
|
||||
{
|
||||
"name": "http://downloads.digium.com/pub/security/AST-2011-005.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://downloads.digium.com/pub/security/AST-2011-005.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=698916",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=698916"
|
||||
},
|
||||
{
|
||||
"name": "44197",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/44197"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20110322 ZDI-11-110: (0day) IBM Lotus Domino Server Controller Authentication Bypass Remote Code Execution Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/517119/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-11-110",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-110"
|
||||
},
|
||||
{
|
||||
"name" : "46985",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/46985"
|
||||
"name": "ADV-2011-0758",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0758"
|
||||
},
|
||||
{
|
||||
"name": "1025241",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1025241"
|
||||
},
|
||||
{
|
||||
"name": "20110322 ZDI-11-110: (0day) IBM Lotus Domino Server Controller Authentication Bypass Remote Code Execution Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/517119/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "43860",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43860"
|
||||
},
|
||||
{
|
||||
"name": "46985",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/46985"
|
||||
},
|
||||
{
|
||||
"name": "8164",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/8164"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2011-0758",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2011/0758"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20110606 ZDI-11-173: Novell iPrint nipplib.dll profile-time Remote Code Execution Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/518267/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://zerodayinitiative.com/advisories/ZDI-11-173/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://zerodayinitiative.com/advisories/ZDI-11-173/"
|
||||
},
|
||||
{
|
||||
"name": "1025606",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1025606"
|
||||
},
|
||||
{
|
||||
"name": "20110606 ZDI-11-173: Novell iPrint nipplib.dll profile-time Remote Code Execution Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/518267/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://download.novell.com/Download?buildid=6_bNby38ERg~",
|
||||
"refsource": "CONFIRM",
|
||||
@ -72,20 +77,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008722"
|
||||
},
|
||||
{
|
||||
"name" : "48124",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/48124"
|
||||
},
|
||||
{
|
||||
"name" : "1025606",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1025606"
|
||||
},
|
||||
{
|
||||
"name": "44811",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/44811"
|
||||
},
|
||||
{
|
||||
"name": "48124",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48124"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2011-1991",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-071"
|
||||
},
|
||||
{
|
||||
"name" : "TA11-256A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA11-256A.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:12871",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12871"
|
||||
},
|
||||
{
|
||||
"name": "TA11-256A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-256A.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2014-3080",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "34132",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/34132/"
|
||||
},
|
||||
{
|
||||
"name" : "20140721 IBM GCM16/32 v1.20.0.22575 vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Jul/113"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/127543/IBM-1754-GCM-KVM-Code-Execution-File-Read-XSS.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/127543/IBM-1754-GCM-KVM-Code-Execution-File-Read-XSS.html"
|
||||
},
|
||||
{
|
||||
"name": "68777",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/68777"
|
||||
},
|
||||
{
|
||||
"name": "34132",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/34132/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095983",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095983"
|
||||
},
|
||||
{
|
||||
"name" : "68777",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/68777"
|
||||
"name": "20140721 IBM GCM16/32 v1.20.0.22575 vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Jul/113"
|
||||
},
|
||||
{
|
||||
"name": "ibm-gcm-cve20143080-xss(93929)",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "67442",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/67442"
|
||||
},
|
||||
{
|
||||
"name": "20140519 Construtiva CIS Manager CMS POST SQLi",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "20140516 [CVE-2014-3749] Construtiva CIS Manager CMS POST SQLi",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/May/73"
|
||||
},
|
||||
{
|
||||
"name" : "67442",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/67442"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://mumble.info/security/Mumble-SA-2014-005.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://mumble.info/security/Mumble-SA-2014-005.txt"
|
||||
},
|
||||
{
|
||||
"name": "https://qt.gitorious.org/qt/mumble-developers-qt/commit/2147fa767980fe27a14f018b1528dbf880b96814",
|
||||
"refsource": "MISC",
|
||||
"url": "https://qt.gitorious.org/qt/mumble-developers-qt/commit/2147fa767980fe27a14f018b1528dbf880b96814"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20140514 Re: Mumble 1.2.6: Mumble-SA-2014-005 and Mumble-SA-2014-006",
|
||||
"refsource": "MLIST",
|
||||
@ -62,16 +72,6 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2014/05/15/1"
|
||||
},
|
||||
{
|
||||
"name" : "https://qt.gitorious.org/qt/mumble-developers-qt/commit/2147fa767980fe27a14f018b1528dbf880b96814",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://qt.gitorious.org/qt/mumble-developers-qt/commit/2147fa767980fe27a14f018b1528dbf880b96814"
|
||||
},
|
||||
{
|
||||
"name" : "http://mumble.info/security/Mumble-SA-2014-005.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://mumble.info/security/Mumble-SA-2014-005.txt"
|
||||
},
|
||||
{
|
||||
"name": "67400",
|
||||
"refsource": "BID",
|
||||
|
@ -52,56 +52,56 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2014-17.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2014-17.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10381",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10381"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=73959159dbf34b4a0b50fbd19e05cb1b470be9b0",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=73959159dbf34b4a0b50fbd19e05cb1b470be9b0"
|
||||
},
|
||||
{
|
||||
"name": "http://linux.oracle.com/errata/ELSA-2014-1676",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://linux.oracle.com/errata/ELSA-2014-1676"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3049",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-3049"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:1676",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1676.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:1221",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:1249",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html"
|
||||
},
|
||||
{
|
||||
"name" : "60578",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/60578"
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10381",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10381"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2014-17.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2014-17.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:1676",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3049",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-3049"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:1221",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html"
|
||||
},
|
||||
{
|
||||
"name": "60280",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60280"
|
||||
},
|
||||
{
|
||||
"name": "60578",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60578"
|
||||
},
|
||||
{
|
||||
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=73959159dbf34b4a0b50fbd19e05cb1b470be9b0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=73959159dbf34b4a0b50fbd19e05cb1b470be9b0"
|
||||
},
|
||||
{
|
||||
"name": "61929",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-6742",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#512361",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-6753",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#433513",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20140927 XSS Reflected vulnerabilities and CSRF in Exinda WAN Optimization Suite (CVE-2014-7157, CVE-2014-7158)",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Sep/108"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/128459/Exinda-WAN-Optimization-Suite-7.0.0-CSRF-XSS.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/128459/Exinda-WAN-Optimization-Suite-7.0.0-CSRF-XSS.html"
|
||||
},
|
||||
{
|
||||
"name": "exindawan-cve20147158-csrf(96702)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96702"
|
||||
},
|
||||
{
|
||||
"name": "70161",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/70161"
|
||||
},
|
||||
{
|
||||
"name" : "exindawan-cve20147158-csrf(96702)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/96702"
|
||||
"name": "20140927 XSS Reflected vulnerabilities and CSRF in Exinda WAN Optimization Suite (CVE-2014-7157, CVE-2014-7158)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Sep/108"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564"
|
||||
},
|
||||
{
|
||||
"name": "1035767",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035767"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-2253",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0002",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0002"
|
||||
},
|
||||
{
|
||||
"name": "97658",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97658"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0002",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/ud2/advisories/tree/master/android/samsung/nocve-2016-0002"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0464",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -60,6 +60,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
||||
},
|
||||
{
|
||||
"name": "1037968",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037968"
|
||||
},
|
||||
{
|
||||
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=051597a4fe19fd1292fb7ea2e627d12d1fd2934f",
|
||||
"refsource": "CONFIRM",
|
||||
@ -69,11 +74,6 @@
|
||||
"name": "96735",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96735"
|
||||
},
|
||||
{
|
||||
"name" : "1037968",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1037968"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,35 +57,35 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00018.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/apple/cups/issues/5143",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/apple/cups/issues/5143"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180703 [SECURITY] [DLA 1412-1] cups security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-3713-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3713-1/"
|
||||
},
|
||||
{
|
||||
"name": "https://security.cucumberlinux.com/security/details.php?id=346",
|
||||
"refsource": "MISC",
|
||||
"url": "https://security.cucumberlinux.com/security/details.php?id=346"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/apple/cups/commit/49fa4983f25b64ec29d548ffa3b9782426007df3",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/apple/cups/commit/49fa4983f25b64ec29d548ffa3b9782426007df3"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/apple/cups/issues/5143",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/apple/cups/issues/5143"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/apple/cups/releases/tag/v2.2.6",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/apple/cups/releases/tag/v2.2.6"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3713-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3713-1/"
|
||||
"name": "https://github.com/apple/cups/commit/49fa4983f25b64ec29d548ffa3b9782426007df3",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/apple/cups/commit/49fa4983f25b64ec29d548ffa3b9782426007df3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,9 +62,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "42260",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/42260/"
|
||||
"name": "99271",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99271"
|
||||
},
|
||||
{
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/125159",
|
||||
@ -76,15 +76,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22004878"
|
||||
},
|
||||
{
|
||||
"name" : "99271",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/99271"
|
||||
},
|
||||
{
|
||||
"name": "1038772",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038772"
|
||||
},
|
||||
{
|
||||
"name": "42260",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/42260/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,16 +76,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10716997",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10716997"
|
||||
},
|
||||
{
|
||||
"name": "104885",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104885"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=ibm10716997",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10716997"
|
||||
},
|
||||
{
|
||||
"name": "ibm-sterling-cve20171544-info-disc(130812)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://seclists.org/fulldisclosure/2017/Jun/49",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://seclists.org/fulldisclosure/2017/Jun/49"
|
||||
},
|
||||
{
|
||||
"name": "99354",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1038815",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038815"
|
||||
},
|
||||
{
|
||||
"name": "http://seclists.org/fulldisclosure/2017/Jun/49",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jun/49"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,35 +57,35 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://crbug.com/676623",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://crbug.com/676623"
|
||||
},
|
||||
{
|
||||
"name": "https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5"
|
||||
},
|
||||
{
|
||||
"name": "1038157",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038157"
|
||||
},
|
||||
{
|
||||
"name": "https://crbug.com/676623",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://crbug.com/676623"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3810",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3810"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:0499",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0499.html"
|
||||
},
|
||||
{
|
||||
"name": "96767",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96767"
|
||||
},
|
||||
{
|
||||
"name" : "1038157",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038157"
|
||||
"name": "RHSA-2017:0499",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0499.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
|
||||
"name": "RHSA-2017:1124",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1124"
|
||||
},
|
||||
{
|
||||
"name": "https://crbug.com/690821",
|
||||
@ -68,19 +68,19 @@
|
||||
"url": "https://security.gentoo.org/glsa/201705-02"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1124",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1124"
|
||||
"name": "1038317",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038317"
|
||||
},
|
||||
{
|
||||
"name": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"name": "97939",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97939"
|
||||
},
|
||||
{
|
||||
"name" : "1038317",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038317"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://code610.blogspot.com/2017/01/genixcms-sql-injection-quick-autopsy.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/semplon/GeniXCMS/issues/61",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/semplon/GeniXCMS/issues/61"
|
||||
},
|
||||
{
|
||||
"name": "95655",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95655"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/semplon/GeniXCMS/issues/61",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/semplon/GeniXCMS/issues/61"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user