"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:27:28 +00:00
parent c71d5e5266
commit 6926126507
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
49 changed files with 3143 additions and 3143 deletions

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20050706 Advisory 07/2005: Jaws Multiple Remote Code Execution Vulnerabilities", "name": "1014395",
"refsource" : "BUGTRAQ", "refsource": "SECTRACK",
"url" : "http://marc.info/?l=bugtraq&m=112067013827970&w=2" "url": "http://securitytracker.com/id?1014395"
}, },
{ {
"name": "http://www.hardened-php.net/advisory-072005.php", "name": "http://www.hardened-php.net/advisory-072005.php",
@ -63,9 +63,9 @@
"url": "http://www.hardened-php.net/advisory-072005.php" "url": "http://www.hardened-php.net/advisory-072005.php"
}, },
{ {
"name" : "1014395", "name": "20050706 Advisory 07/2005: Jaws Multiple Remote Code Execution Vulnerabilities",
"refsource" : "SECTRACK", "refsource": "BUGTRAQ",
"url" : "http://securitytracker.com/id?1014395" "url": "http://marc.info/?l=bugtraq&m=112067013827970&w=2"
} }
] ]
} }

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1014695",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014695"
},
{
"name": "VU#172948",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/172948"
},
{
"name": "TA05-229A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA05-229A.html"
},
{ {
"name": "APPLE-SA-2005-08-15", "name": "APPLE-SA-2005-08-15",
"refsource": "APPLE", "refsource": "APPLE",
@ -61,21 +76,6 @@
"name": "APPLE-SA-2005-08-17", "name": "APPLE-SA-2005-08-17",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
},
{
"name" : "TA05-229A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA05-229A.html"
},
{
"name" : "VU#172948",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/172948"
},
{
"name" : "1014695",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1014695"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://pridels0.blogspot.com/2005/11/agilebill-14x-id-sql-injection.html", "name": "17723",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://pridels0.blogspot.com/2005/11/agilebill-14x-id-sql-injection.html" "url": "http://secunia.com/advisories/17723"
},
{
"name" : "15572",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15572"
}, },
{ {
"name": "ADV-2005-2591", "name": "ADV-2005-2591",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2591" "url": "http://www.vupen.com/english/advisories/2005/2591"
}, },
{
"name" : "21103",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21103"
},
{ {
"name": "1015272", "name": "1015272",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015272" "url": "http://securitytracker.com/id?1015272"
}, },
{ {
"name" : "17723", "name": "http://pridels0.blogspot.com/2005/11/agilebill-14x-id-sql-injection.html",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/17723" "url": "http://pridels0.blogspot.com/2005/11/agilebill-14x-id-sql-injection.html"
},
{
"name": "21103",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21103"
},
{
"name": "15572",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15572"
} }
] ]
} }

View File

@ -52,15 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "21095",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21095"
},
{ {
"name": "http://pridels0.blogspot.com/2005/11/oasys-lite-10-searchasp-xss-vuln.html", "name": "http://pridels0.blogspot.com/2005/11/oasys-lite-10-searchasp-xss-vuln.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://pridels0.blogspot.com/2005/11/oasys-lite-10-searchasp-xss-vuln.html" "url": "http://pridels0.blogspot.com/2005/11/oasys-lite-10-searchasp-xss-vuln.html"
}, },
{ {
"name" : "15605", "name": "17712",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/15605" "url": "http://secunia.com/advisories/17712"
}, },
{ {
"name": "ADV-2005-2583", "name": "ADV-2005-2583",
@ -68,14 +73,9 @@
"url": "http://www.vupen.com/english/advisories/2005/2583" "url": "http://www.vupen.com/english/advisories/2005/2583"
}, },
{ {
"name" : "21095", "name": "15605",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://www.osvdb.org/21095" "url": "http://www.securityfocus.com/bid/15605"
},
{
"name" : "17712",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17712"
} }
] ]
} }

View File

@ -53,104 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348)", "name": "18266",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/420098/100/0/threaded"
},
{
"name" : "20060526 rPSA-2006-0084-1 fetchmail",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/435197/100/0/threaded"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836",
"refsource" : "MISC",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836"
},
{
"name" : "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt",
"refsource" : "CONFIRM",
"url" : "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt"
},
{
"name" : "DSA-939",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-939"
},
{
"name" : "MDKSA-2005:236",
"refsource" : "MANDRIVA",
"url" : "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236"
},
{
"name" : "RHSA-2007:0018",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0018.html"
},
{
"name" : "20070201-01-P",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
},
{
"name" : "SSA:2006-045-01",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499"
},
{
"name" : "SUSE-SR:2007:004",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
},
{
"name" : "2006-0002",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2006/0002/"
},
{
"name" : "USN-233-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/233-1/"
},
{
"name" : "15987",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15987"
},
{
"name" : "19289",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/19289"
},
{
"name" : "oval:org.mitre.oval:def:9659",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659"
},
{
"name" : "ADV-2005-2996",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2996"
},
{
"name" : "ADV-2006-3101",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3101"
},
{
"name" : "21906",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21906"
},
{
"name" : "1015383",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015383"
},
{
"name" : "17891",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/17891" "url": "http://secunia.com/advisories/18266"
}, },
{ {
"name": "18172", "name": "18172",
@ -163,24 +68,14 @@
"url": "http://secunia.com/advisories/18231" "url": "http://secunia.com/advisories/18231"
}, },
{ {
"name" : "18266", "name": "ADV-2006-3101",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/18266" "url": "http://www.vupen.com/english/advisories/2006/3101"
}, },
{ {
"name" : "18433", "name": "20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348)",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/18433" "url": "http://www.securityfocus.com/archive/1/420098/100/0/threaded"
},
{
"name" : "18895",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18895"
},
{
"name" : "18463",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18463"
}, },
{ {
"name": "21253", "name": "21253",
@ -188,19 +83,124 @@
"url": "http://secunia.com/advisories/21253" "url": "http://secunia.com/advisories/21253"
}, },
{ {
"name" : "24007", "name": "1015383",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015383"
},
{
"name": "SSA:2006-045-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499"
},
{
"name": "17891",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/24007" "url": "http://secunia.com/advisories/17891"
},
{
"name": "19289",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19289"
},
{
"name": "2006-0002",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2006/0002/"
},
{
"name": "18463",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18463"
}, },
{ {
"name": "24284", "name": "24284",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24284" "url": "http://secunia.com/advisories/24284"
}, },
{
"name": "24007",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24007"
},
{
"name": "oval:org.mitre.oval:def:9659",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659"
},
{
"name": "15987",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15987"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836"
},
{ {
"name": "fetchmail-null-pointer-dos(23713)", "name": "fetchmail-null-pointer-dos(23713)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23713" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23713"
},
{
"name": "SUSE-SR:2007:004",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
},
{
"name": "USN-233-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/233-1/"
},
{
"name": "21906",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21906"
},
{
"name": "ADV-2005-2996",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2996"
},
{
"name": "MDKSA-2005:236",
"refsource": "MANDRIVA",
"url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236"
},
{
"name": "20060526 rPSA-2006-0084-1 fetchmail",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded"
},
{
"name": "20070201-01-P",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
},
{
"name": "RHSA-2007:0018",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html"
},
{
"name": "18895",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18895"
},
{
"name": "DSA-939",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-939"
},
{
"name": "18433",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18433"
},
{
"name": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt",
"refsource": "CONFIRM",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt"
} }
] ]
} }

View File

@ -52,30 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://sourceforge.net/tracker/index.php?func=detail&aid=1207023&group_id=12694&atid=112694",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/tracker/index.php?func=detail&aid=1207023&group_id=12694&atid=112694"
},
{ {
"name": "https://issues.rpath.com/browse/RPL-1334", "name": "https://issues.rpath.com/browse/RPL-1334",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1334" "url": "https://issues.rpath.com/browse/RPL-1334"
}, },
{ {
"name" : "102929", "name": "25115",
"refsource" : "SUNALERT", "refsource": "SECUNIA",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102929-1" "url": "http://secunia.com/advisories/25115"
},
{
"name" : "USN-456-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-456-1"
},
{
"name" : "23762",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/23762"
}, },
{ {
"name": "oval:org.mitre.oval:def:9442", "name": "oval:org.mitre.oval:def:9442",
@ -93,9 +78,24 @@
"url": "http://secunia.com/advisories/25114" "url": "http://secunia.com/advisories/25114"
}, },
{ {
"name" : "25115", "name": "102929",
"refsource" : "SECUNIA", "refsource": "SUNALERT",
"url" : "http://secunia.com/advisories/25115" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102929-1"
},
{
"name": "http://sourceforge.net/tracker/index.php?func=detail&aid=1207023&group_id=12694&atid=112694",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/tracker/index.php?func=detail&aid=1207023&group_id=12694&atid=112694"
},
{
"name": "23762",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23762"
},
{
"name": "USN-456-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-456-1"
}, },
{ {
"name": "25411", "name": "25411",

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://research.microsoft.com/apps/pubs/default.aspx?id=79323",
"refsource" : "MISC",
"url" : "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
},
{ {
"name": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf", "name": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf",
"refsource": "MISC", "refsource": "MISC",
@ -66,6 +61,11 @@
"name": "googlechrome-https-security-bypass(51192)", "name": "googlechrome-https-security-bypass(51192)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51192" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51192"
},
{
"name": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323",
"refsource": "MISC",
"url": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.org/0907-exploits/tophangman-sqlxss.txt", "name": "hangman-index-sql(51884)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://packetstormsecurity.org/0907-exploits/tophangman-sqlxss.txt" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51884"
}, },
{ {
"name": "56075", "name": "56075",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/56075" "url": "http://www.osvdb.org/56075"
}, },
{
"name": "http://packetstormsecurity.org/0907-exploits/tophangman-sqlxss.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0907-exploits/tophangman-sqlxss.txt"
},
{ {
"name": "35888", "name": "35888",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35888" "url": "http://secunia.com/advisories/35888"
},
{
"name" : "hangman-index-sql(51884)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51884"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://packetstormsecurity.org/0907-exploits/ultimatepoll-xss.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/0907-exploits/ultimatepoll-xss.txt"
},
{ {
"name": "55914", "name": "55914",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/55914" "url": "http://osvdb.org/55914"
}, },
{ {
"name" : "35834", "name": "http://packetstormsecurity.org/0907-exploits/ultimatepoll-xss.txt",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/35834" "url": "http://packetstormsecurity.org/0907-exploits/ultimatepoll-xss.txt"
}, },
{ {
"name": "ultimatepoll-clr-xss(51773)", "name": "ultimatepoll-clr-xss(51773)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51773" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51773"
},
{
"name": "35834",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35834"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/9693" "url": "http://www.exploit-db.com/exploits/9693"
}, },
{
"name" : "http://www.design-joomla.eu/joomla-news/dj-catalog-sql-bsql-injection-multiple-vulnerability-fix.html",
"refsource" : "MISC",
"url" : "http://www.design-joomla.eu/joomla-news/dj-catalog-sql-bsql-injection-multiple-vulnerability-fix.html"
},
{ {
"name": "36412", "name": "36412",
"refsource": "BID", "refsource": "BID",
@ -71,6 +66,11 @@
"name": "36696", "name": "36696",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36696" "url": "http://secunia.com/advisories/36696"
},
{
"name": "http://www.design-joomla.eu/joomla-news/dj-catalog-sql-bsql-injection-multiple-vulnerability-fix.html",
"refsource": "MISC",
"url": "http://www.design-joomla.eu/joomla-news/dj-catalog-sql-bsql-injection-multiple-vulnerability-fix.html"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21405562", "name": "ADV-2009-3132",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21405562" "url": "http://www.vupen.com/english/advisories/2009/3132"
}, },
{ {
"name": "IC54489", "name": "IC54489",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC54489" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC54489"
}, },
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21405562",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21405562"
},
{ {
"name": "32534", "name": "32534",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32534" "url": "http://secunia.com/advisories/32534"
},
{
"name" : "ADV-2009-3132",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/3132"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-4023", "ID": "CVE-2009-4023",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,64 +53,64 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20091123 CVE request: Argument injections in multiple PEAR packages", "name": "37081",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2009/11/23/8" "url": "http://www.securityfocus.com/bid/37081"
},
{
"name" : "http://pear.php.net/bugs/bug.php?id=16200",
"refsource" : "CONFIRM",
"url" : "http://pear.php.net/bugs/bug.php?id=16200"
},
{
"name" : "http://pear.php.net/bugs/bug.php?id=16200&edit=12&patch=quick-fix&revision=1241757412",
"refsource" : "CONFIRM",
"url" : "http://pear.php.net/bugs/bug.php?id=16200&edit=12&patch=quick-fix&revision=1241757412"
},
{
"name" : "http://svn.php.net/viewvc/pear/packages/Mail/trunk/Mail/sendmail.php?r1=243717&r2=280134",
"refsource" : "CONFIRM",
"url" : "http://svn.php.net/viewvc/pear/packages/Mail/trunk/Mail/sendmail.php?r1=243717&r2=280134"
},
{
"name" : "https://bugs.gentoo.org/show_bug.cgi?id=294256",
"refsource" : "CONFIRM",
"url" : "https://bugs.gentoo.org/show_bug.cgi?id=294256"
},
{
"name" : "DSA-1938",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1938"
}, },
{ {
"name": "SUSE-SR:2010:020", "name": "SUSE-SR:2010:020",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html"
}, },
{
"name" : "37081",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37081"
},
{
"name" : "37410",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37410"
},
{ {
"name": "37458", "name": "37458",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37458" "url": "http://secunia.com/advisories/37458"
}, },
{
"name": "[oss-security] 20091123 CVE request: Argument injections in multiple PEAR packages",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/11/23/8"
},
{ {
"name": "ADV-2009-3300", "name": "ADV-2009-3300",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3300" "url": "http://www.vupen.com/english/advisories/2009/3300"
}, },
{
"name": "https://bugs.gentoo.org/show_bug.cgi?id=294256",
"refsource": "CONFIRM",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=294256"
},
{
"name": "http://pear.php.net/bugs/bug.php?id=16200&edit=12&patch=quick-fix&revision=1241757412",
"refsource": "CONFIRM",
"url": "http://pear.php.net/bugs/bug.php?id=16200&edit=12&patch=quick-fix&revision=1241757412"
},
{ {
"name": "pear-from-security-bypass(54362)", "name": "pear-from-security-bypass(54362)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54362" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54362"
},
{
"name": "DSA-1938",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1938"
},
{
"name": "37410",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37410"
},
{
"name": "http://svn.php.net/viewvc/pear/packages/Mail/trunk/Mail/sendmail.php?r1=243717&r2=280134",
"refsource": "CONFIRM",
"url": "http://svn.php.net/viewvc/pear/packages/Mail/trunk/Mail/sendmail.php?r1=243717&r2=280134"
},
{
"name": "http://pear.php.net/bugs/bug.php?id=16200",
"refsource": "CONFIRM",
"url": "http://pear.php.net/bugs/bug.php?id=16200"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/", "name": "typo3-zid-xss(54789)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54789"
}, },
{ {
"name": "ADV-2009-3550", "name": "ADV-2009-3550",
@ -63,9 +63,9 @@
"url": "http://www.vupen.com/english/advisories/2009/3550" "url": "http://www.vupen.com/english/advisories/2009/3550"
}, },
{ {
"name" : "typo3-zid-xss(54789)", "name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54789" "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/"
} }
] ]
} }

View File

@ -57,20 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/508532/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/508532/100/0/threaded"
}, },
{
"name" : "http://www.vupen.com/exploits/Winamp_png_w5s_PNG_Data_Processing_Integer_Overflow_PoC_3576274.php",
"refsource" : "MISC",
"url" : "http://www.vupen.com/exploits/Winamp_png_w5s_PNG_Data_Processing_Integer_Overflow_PoC_3576274.php"
},
{ {
"name": "http://forums.winamp.com/showthread.php?threadid=315355", "name": "http://forums.winamp.com/showthread.php?threadid=315355",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://forums.winamp.com/showthread.php?threadid=315355" "url": "http://forums.winamp.com/showthread.php?threadid=315355"
}, },
{ {
"name" : "37387", "name": "ADV-2009-3576",
"refsource" : "BID", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/bid/37387" "url": "http://www.vupen.com/english/advisories/2009/3576"
}, },
{ {
"name": "oval:org.mitre.oval:def:15743", "name": "oval:org.mitre.oval:def:15743",
@ -78,9 +73,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15743" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15743"
}, },
{ {
"name" : "ADV-2009-3576", "name": "http://www.vupen.com/exploits/Winamp_png_w5s_PNG_Data_Processing_Integer_Overflow_PoC_3576274.php",
"refsource" : "VUPEN", "refsource": "MISC",
"url" : "http://www.vupen.com/english/advisories/2009/3576" "url": "http://www.vupen.com/exploits/Winamp_png_w5s_PNG_Data_Processing_Integer_Overflow_PoC_3576274.php"
},
{
"name": "37387",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37387"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20100110 Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa log escape sequence injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/508830/100/0/threaded"
},
{
"name" : "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt",
"refsource" : "MISC",
"url" : "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt"
},
{
"name" : "FEDORA-2010-7599",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041285.html"
},
{ {
"name": "FEDORA-2010-7640", "name": "FEDORA-2010-7640",
"refsource": "FEDORA", "refsource": "FEDORA",
@ -77,20 +62,35 @@
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041274.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041274.html"
}, },
{
"name" : "37718",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37718"
},
{ {
"name": "39775", "name": "39775",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39775" "url": "http://secunia.com/advisories/39775"
}, },
{
"name": "37718",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37718"
},
{
"name": "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt",
"refsource": "MISC",
"url": "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt"
},
{ {
"name": "ADV-2010-1133", "name": "ADV-2010-1133",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1133" "url": "http://www.vupen.com/english/advisories/2010/1133"
},
{
"name": "FEDORA-2010-7599",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041285.html"
},
{
"name": "20100110 Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa log escape sequence injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/508830/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-0042", "ID": "CVE-2015-0042",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS15-009",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009"
},
{ {
"name": "72412", "name": "72412",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "1031723", "name": "1031723",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031723" "url": "http://www.securitytracker.com/id/1031723"
},
{
"name": "MS15-009",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-0084", "ID": "CVE-2015-0084",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-028" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-028"
}, },
{
"name" : "72913",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/72913"
},
{ {
"name": "1031893", "name": "1031893",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031893" "url": "http://www.securitytracker.com/id/1031893"
},
{
"name": "72913",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72913"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-0119", "ID": "CVE-2015-0119",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-0479", "ID": "CVE-2015-0479",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.wireshark.org/security/wnpa-sec-2015-03.html", "name": "http://advisories.mageia.org/MGASA-2015-0019.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2015-03.html" "url": "http://advisories.mageia.org/MGASA-2015-0019.html"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10724",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10724"
}, },
{ {
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=a559f2a050947f793c00159c0cd4d30f403f217c", "name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=a559f2a050947f793c00159c0cd4d30f403f217c",
@ -68,15 +63,35 @@
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=a559f2a050947f793c00159c0cd4d30f403f217c" "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=a559f2a050947f793c00159c0cd4d30f403f217c"
}, },
{ {
"name" : "http://advisories.mageia.org/MGASA-2015-0019.html", "name": "62612",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://advisories.mageia.org/MGASA-2015-0019.html" "url": "http://secunia.com/advisories/62612"
},
{
"name": "MDVSA-2015:022",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:022"
},
{
"name": "71921",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71921"
}, },
{ {
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
}, },
{
"name": "RHSA-2015:1460",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10724",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10724"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -88,34 +103,19 @@
"url": "http://www.debian.org/security/2015/dsa-3141" "url": "http://www.debian.org/security/2015/dsa-3141"
}, },
{ {
"name" : "MDVSA-2015:022", "name": "62673",
"refsource" : "MANDRIVA", "refsource": "SECUNIA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:022" "url": "http://secunia.com/advisories/62673"
}, },
{ {
"name" : "RHSA-2015:1460", "name": "http://www.wireshark.org/security/wnpa-sec-2015-03.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1460.html" "url": "http://www.wireshark.org/security/wnpa-sec-2015-03.html"
}, },
{ {
"name": "openSUSE-SU-2015:0113", "name": "openSUSE-SU-2015:0113",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html"
},
{
"name" : "71921",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/71921"
},
{
"name" : "62612",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62612"
},
{
"name" : "62673",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62673"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-1061", "ID": "CVE-2015-1061",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,31 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/HT204413",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT204413"
},
{
"name" : "https://support.apple.com/HT204423",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT204423"
},
{
"name" : "https://support.apple.com/HT204426",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT204426"
},
{
"name" : "https://support.apple.com/kb/HT204563",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT204563"
},
{
"name" : "APPLE-SA-2015-03-09-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html"
},
{ {
"name": "APPLE-SA-2015-03-09-2", "name": "APPLE-SA-2015-03-09-2",
"refsource": "APPLE", "refsource": "APPLE",
@ -88,14 +63,39 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html"
}, },
{ {
"name" : "73004", "name": "https://support.apple.com/HT204426",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/73004" "url": "https://support.apple.com/HT204426"
},
{
"name": "https://support.apple.com/HT204413",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT204413"
},
{
"name": "APPLE-SA-2015-03-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html"
}, },
{ {
"name": "1031864", "name": "1031864",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031864" "url": "http://www.securitytracker.com/id/1031864"
},
{
"name": "https://support.apple.com/kb/HT204563",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT204563"
},
{
"name": "https://support.apple.com/HT204423",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT204423"
},
{
"name": "73004",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/73004"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2015-1238", "ID": "CVE-2015-1238",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=445808",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=445808"
},
{
"name" : "DSA-3238",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3238"
},
{
"name" : "GLSA-201506-04",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201506-04"
},
{ {
"name": "RHSA-2015:0816", "name": "RHSA-2015:0816",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html"
}, },
{
"name" : "openSUSE-SU-2015:1887",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
},
{
"name" : "openSUSE-SU-2015:0748",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
},
{ {
"name": "USN-2570-1", "name": "USN-2570-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-2570-1" "url": "http://ubuntu.com/usn/usn-2570-1"
}, },
{
"name": "DSA-3238",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3238"
},
{
"name": "openSUSE-SU-2015:1887",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
},
{
"name": "GLSA-201506-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201506-04"
},
{ {
"name": "1032209", "name": "1032209",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032209" "url": "http://www.securitytracker.com/id/1032209"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=445808",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=445808"
},
{
"name": "openSUSE-SU-2015:0748",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-1882", "ID": "CVE-2015-1882",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21697368",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21697368"
},
{
"name" : "PI33357",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PI33357"
},
{ {
"name": "74222", "name": "74222",
"refsource": "BID", "refsource": "BID",
@ -71,6 +61,16 @@
"name": "1032190", "name": "1032190",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032190" "url": "http://www.securitytracker.com/id/1032190"
},
{
"name": "PI33357",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI33357"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21697368",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697368"
} }
] ]
} }

View File

@ -57,21 +57,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/535734/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/535734/100/0/threaded"
}, },
{
"name" : "37259",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/37259/"
},
{
"name" : "http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html"
},
{
"name" : "https://www.htbridge.com/advisory/HTB23260",
"refsource" : "MISC",
"url" : "https://www.htbridge.com/advisory/HTB23260"
},
{ {
"name": "http://bugtracker.ispconfig.org/index.php?do=details&task_id=3898", "name": "http://bugtracker.ispconfig.org/index.php?do=details&task_id=3898",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -81,6 +66,21 @@
"name": "75126", "name": "75126",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75126" "url": "http://www.securityfocus.com/bid/75126"
},
{
"name": "http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html"
},
{
"name": "37259",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37259/"
},
{
"name": "https://www.htbridge.com/advisory/HTB23260",
"refsource": "MISC",
"url": "https://www.htbridge.com/advisory/HTB23260"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4237", "ID": "CVE-2015-4237",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20150701 Cisco Nexus Operating System Devices Command Line Interface Local Privilege Escalation Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=39583"
},
{ {
"name": "1032775", "name": "1032775",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032775" "url": "http://www.securitytracker.com/id/1032775"
},
{
"name": "20150701 Cisco Nexus Operating System Devices Command Line Interface Local Privilege Escalation Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39583"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-08-18T21:50:59.838728", "DATE_ASSIGNED": "2018-08-18T21:50:59.838728",
"DATE_REQUESTED": "2018-08-15T00:00:00", "DATE_REQUESTED": "2018-08-15T00:00:00",
"ID": "CVE-2018-1999047", "ID": "CVE-2018-1999047",
@ -14,18 +14,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Jenkins", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "2.137 and earlier, 2.121.2 and earlier" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Jenkins project" "vendor_name": "n/a"
} }
] ]
} }
@ -47,7 +47,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-285" "value": "n/a"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2103", "ID": "CVE-2018-2103",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-2342", "ID": "CVE-2018-2342",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,16 +53,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://launchpad.support.sap.com/#/notes/2672919",
"refsource" : "MISC",
"url" : "https://launchpad.support.sap.com/#/notes/2672919"
},
{ {
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993", "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993" "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993"
}, },
{
"name": "https://launchpad.support.sap.com/#/notes/2672919",
"refsource": "MISC",
"url": "https://launchpad.support.sap.com/#/notes/2672919"
},
{ {
"name": "105338", "name": "105338",
"refsource": "BID", "refsource": "BID",

View File

@ -58,9 +58,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://launchpad.support.sap.com/#/notes/2681207", "name": "105324",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://launchpad.support.sap.com/#/notes/2681207" "url": "http://www.securityfocus.com/bid/105324"
}, },
{ {
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993", "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993",
@ -68,9 +68,9 @@
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993" "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993"
}, },
{ {
"name" : "105324", "name": "https://launchpad.support.sap.com/#/notes/2681207",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/105324" "url": "https://launchpad.support.sap.com/#/notes/2681207"
} }
] ]
}, },

View File

@ -57,25 +57,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{ {
"name": "https://security.netapp.com/advisory/ntap-20181018-0001/", "name": "https://security.netapp.com/advisory/ntap-20181018-0001/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181018-0001/" "url": "https://security.netapp.com/advisory/ntap-20181018-0001/"
}, },
{
"name": "RHSA-2018:3003",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3003"
},
{ {
"name": "RHSA-2018:3002", "name": "RHSA-2018:3002",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3002" "url": "https://access.redhat.com/errata/RHSA-2018:3002"
}, },
{ {
"name" : "RHSA-2018:3003", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "https://access.redhat.com/errata/RHSA-2018:3003" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
}, },
{ {
"name": "105591", "name": "105591",

View File

@ -62,15 +62,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/",
"refsource" : "CONFIRM",
"url" : "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/"
},
{ {
"name": "106363", "name": "106363",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106363" "url": "http://www.securityfocus.com/bid/106363"
},
{
"name": "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/",
"refsource": "CONFIRM",
"url": "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-7862", "ID": "CVE-2018-7862",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {