mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
c71d5e5266
commit
6926126507
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20050706 Advisory 07/2005: Jaws Multiple Remote Code Execution Vulnerabilities",
|
"name": "1014395",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=112067013827970&w=2"
|
"url": "http://securitytracker.com/id?1014395"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.hardened-php.net/advisory-072005.php",
|
"name": "http://www.hardened-php.net/advisory-072005.php",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.hardened-php.net/advisory-072005.php"
|
"url": "http://www.hardened-php.net/advisory-072005.php"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1014395",
|
"name": "20050706 Advisory 07/2005: Jaws Multiple Remote Code Execution Vulnerabilities",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://securitytracker.com/id?1014395"
|
"url": "http://marc.info/?l=bugtraq&m=112067013827970&w=2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "1014695",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1014695"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#172948",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/172948"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA05-229A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/cas/techalerts/TA05-229A.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2005-08-15",
|
"name": "APPLE-SA-2005-08-15",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
@ -61,21 +76,6 @@
|
|||||||
"name": "APPLE-SA-2005-08-17",
|
"name": "APPLE-SA-2005-08-17",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
"url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
|
"url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA05-229A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA05-229A.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "VU#172948",
|
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/172948"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1014695",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1014695"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,34 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://pridels0.blogspot.com/2005/11/agilebill-14x-id-sql-injection.html",
|
"name": "17723",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://pridels0.blogspot.com/2005/11/agilebill-14x-id-sql-injection.html"
|
"url": "http://secunia.com/advisories/17723"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "15572",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/15572"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2005-2591",
|
"name": "ADV-2005-2591",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2005/2591"
|
"url": "http://www.vupen.com/english/advisories/2005/2591"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "21103",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/21103"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1015272",
|
"name": "1015272",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://securitytracker.com/id?1015272"
|
"url": "http://securitytracker.com/id?1015272"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "17723",
|
"name": "http://pridels0.blogspot.com/2005/11/agilebill-14x-id-sql-injection.html",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url" : "http://secunia.com/advisories/17723"
|
"url": "http://pridels0.blogspot.com/2005/11/agilebill-14x-id-sql-injection.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21103",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/21103"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "15572",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/15572"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "21095",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/21095"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://pridels0.blogspot.com/2005/11/oasys-lite-10-searchasp-xss-vuln.html",
|
"name": "http://pridels0.blogspot.com/2005/11/oasys-lite-10-searchasp-xss-vuln.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://pridels0.blogspot.com/2005/11/oasys-lite-10-searchasp-xss-vuln.html"
|
"url": "http://pridels0.blogspot.com/2005/11/oasys-lite-10-searchasp-xss-vuln.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "15605",
|
"name": "17712",
|
||||||
"refsource" : "BID",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/bid/15605"
|
"url": "http://secunia.com/advisories/17712"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2005-2583",
|
"name": "ADV-2005-2583",
|
||||||
@ -68,14 +73,9 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2005/2583"
|
"url": "http://www.vupen.com/english/advisories/2005/2583"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "21095",
|
"name": "15605",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "BID",
|
||||||
"url" : "http://www.osvdb.org/21095"
|
"url": "http://www.securityfocus.com/bid/15605"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17712",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/17712"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,104 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348)",
|
"name": "18266",
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/420098/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20060526 rPSA-2006-0084-1 fetchmail",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/435197/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-939",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2005/dsa-939"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MDKSA-2005:236",
|
|
||||||
"refsource" : "MANDRIVA",
|
|
||||||
"url" : "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2007:0018",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0018.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20070201-01-P",
|
|
||||||
"refsource" : "SGI",
|
|
||||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSA:2006-045-01",
|
|
||||||
"refsource" : "SLACKWARE",
|
|
||||||
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SR:2007:004",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "2006-0002",
|
|
||||||
"refsource" : "TRUSTIX",
|
|
||||||
"url" : "http://www.trustix.org/errata/2006/0002/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-233-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "https://usn.ubuntu.com/233-1/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "15987",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/15987"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "19289",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/19289"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:9659",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2005-2996",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2005/2996"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2006-3101",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2006/3101"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "21906",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/21906"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1015383",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1015383"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "17891",
|
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/17891"
|
"url": "http://secunia.com/advisories/18266"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "18172",
|
"name": "18172",
|
||||||
@ -163,24 +68,14 @@
|
|||||||
"url": "http://secunia.com/advisories/18231"
|
"url": "http://secunia.com/advisories/18231"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "18266",
|
"name": "ADV-2006-3101",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://secunia.com/advisories/18266"
|
"url": "http://www.vupen.com/english/advisories/2006/3101"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "18433",
|
"name": "20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348)",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://secunia.com/advisories/18433"
|
"url": "http://www.securityfocus.com/archive/1/420098/100/0/threaded"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18895",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/18895"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "18463",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/18463"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "21253",
|
"name": "21253",
|
||||||
@ -188,19 +83,124 @@
|
|||||||
"url": "http://secunia.com/advisories/21253"
|
"url": "http://secunia.com/advisories/21253"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "24007",
|
"name": "1015383",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1015383"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSA:2006-045-01",
|
||||||
|
"refsource": "SLACKWARE",
|
||||||
|
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "17891",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/24007"
|
"url": "http://secunia.com/advisories/17891"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "19289",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/19289"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "2006-0002",
|
||||||
|
"refsource": "TRUSTIX",
|
||||||
|
"url": "http://www.trustix.org/errata/2006/0002/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18463",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/18463"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "24284",
|
"name": "24284",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/24284"
|
"url": "http://secunia.com/advisories/24284"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "24007",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/24007"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:9659",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9659"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "15987",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/15987"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "fetchmail-null-pointer-dos(23713)",
|
"name": "fetchmail-null-pointer-dos(23713)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23713"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23713"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SR:2007:004",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://www.novell.com/linux/security/advisories/2007_4_sr.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-233-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "https://usn.ubuntu.com/233-1/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "21906",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/21906"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2005-2996",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2005/2996"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDKSA-2005:236",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20060526 rPSA-2006-0084-1 fetchmail",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/435197/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20070201-01-P",
|
||||||
|
"refsource": "SGI",
|
||||||
|
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2007:0018",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://www.redhat.com/support/errata/RHSA-2007-0018.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18895",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/18895"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-939",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2005/dsa-939"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "18433",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/18433"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://fetchmail.berlios.de/fetchmail-SA-2005-03.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://sourceforge.net/tracker/index.php?func=detail&aid=1207023&group_id=12694&atid=112694",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://sourceforge.net/tracker/index.php?func=detail&aid=1207023&group_id=12694&atid=112694"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://issues.rpath.com/browse/RPL-1334",
|
"name": "https://issues.rpath.com/browse/RPL-1334",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://issues.rpath.com/browse/RPL-1334"
|
"url": "https://issues.rpath.com/browse/RPL-1334"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "102929",
|
"name": "25115",
|
||||||
"refsource" : "SUNALERT",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102929-1"
|
"url": "http://secunia.com/advisories/25115"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-456-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-456-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "23762",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/23762"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:9442",
|
"name": "oval:org.mitre.oval:def:9442",
|
||||||
@ -93,9 +78,24 @@
|
|||||||
"url": "http://secunia.com/advisories/25114"
|
"url": "http://secunia.com/advisories/25114"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "25115",
|
"name": "102929",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "SUNALERT",
|
||||||
"url" : "http://secunia.com/advisories/25115"
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102929-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://sourceforge.net/tracker/index.php?func=detail&aid=1207023&group_id=12694&atid=112694",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://sourceforge.net/tracker/index.php?func=detail&aid=1207023&group_id=12694&atid=112694"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "23762",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/23762"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-456-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-456-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "25411",
|
"name": "25411",
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://research.microsoft.com/apps/pubs/default.aspx?id=79323",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf",
|
"name": "http://research.microsoft.com/pubs/79323/pbp-final-with-update.pdf",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "googlechrome-https-security-bypass(51192)",
|
"name": "googlechrome-https-security-bypass(51192)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51192"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51192"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://research.microsoft.com/apps/pubs/default.aspx?id=79323"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://packetstormsecurity.org/0907-exploits/tophangman-sqlxss.txt",
|
"name": "hangman-index-sql(51884)",
|
||||||
"refsource" : "MISC",
|
"refsource": "XF",
|
||||||
"url" : "http://packetstormsecurity.org/0907-exploits/tophangman-sqlxss.txt"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51884"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "56075",
|
"name": "56075",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://www.osvdb.org/56075"
|
"url": "http://www.osvdb.org/56075"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.org/0907-exploits/tophangman-sqlxss.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.org/0907-exploits/tophangman-sqlxss.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "35888",
|
"name": "35888",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/35888"
|
"url": "http://secunia.com/advisories/35888"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "hangman-index-sql(51884)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51884"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.org/0907-exploits/ultimatepoll-xss.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.org/0907-exploits/ultimatepoll-xss.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "55914",
|
"name": "55914",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/55914"
|
"url": "http://osvdb.org/55914"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "35834",
|
"name": "http://packetstormsecurity.org/0907-exploits/ultimatepoll-xss.txt",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "MISC",
|
||||||
"url" : "http://secunia.com/advisories/35834"
|
"url": "http://packetstormsecurity.org/0907-exploits/ultimatepoll-xss.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ultimatepoll-clr-xss(51773)",
|
"name": "ultimatepoll-clr-xss(51773)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51773"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51773"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "35834",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/35834"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,11 +57,6 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "http://www.exploit-db.com/exploits/9693"
|
"url": "http://www.exploit-db.com/exploits/9693"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.design-joomla.eu/joomla-news/dj-catalog-sql-bsql-injection-multiple-vulnerability-fix.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.design-joomla.eu/joomla-news/dj-catalog-sql-bsql-injection-multiple-vulnerability-fix.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "36412",
|
"name": "36412",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -71,6 +66,11 @@
|
|||||||
"name": "36696",
|
"name": "36696",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/36696"
|
"url": "http://secunia.com/advisories/36696"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.design-joomla.eu/joomla-news/dj-catalog-sql-bsql-injection-multiple-vulnerability-fix.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.design-joomla.eu/joomla-news/dj-catalog-sql-bsql-injection-multiple-vulnerability-fix.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21405562",
|
"name": "ADV-2009-3132",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21405562"
|
"url": "http://www.vupen.com/english/advisories/2009/3132"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "IC54489",
|
"name": "IC54489",
|
||||||
"refsource": "AIXAPAR",
|
"refsource": "AIXAPAR",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC54489"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC54489"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21405562",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21405562"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "32534",
|
"name": "32534",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/32534"
|
"url": "http://secunia.com/advisories/32534"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2009-3132",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/3132"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2009-4023",
|
"ID": "CVE-2009-4023",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,64 +53,64 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20091123 CVE request: Argument injections in multiple PEAR packages",
|
"name": "37081",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2009/11/23/8"
|
"url": "http://www.securityfocus.com/bid/37081"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://pear.php.net/bugs/bug.php?id=16200",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://pear.php.net/bugs/bug.php?id=16200"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://pear.php.net/bugs/bug.php?id=16200&edit=12&patch=quick-fix&revision=1241757412",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://pear.php.net/bugs/bug.php?id=16200&edit=12&patch=quick-fix&revision=1241757412"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://svn.php.net/viewvc/pear/packages/Mail/trunk/Mail/sendmail.php?r1=243717&r2=280134",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://svn.php.net/viewvc/pear/packages/Mail/trunk/Mail/sendmail.php?r1=243717&r2=280134"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugs.gentoo.org/show_bug.cgi?id=294256",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugs.gentoo.org/show_bug.cgi?id=294256"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1938",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2009/dsa-1938"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "SUSE-SR:2010:020",
|
"name": "SUSE-SR:2010:020",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "37081",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/37081"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "37410",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/37410"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "37458",
|
"name": "37458",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/37458"
|
"url": "http://secunia.com/advisories/37458"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20091123 CVE request: Argument injections in multiple PEAR packages",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2009/11/23/8"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-3300",
|
"name": "ADV-2009-3300",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2009/3300"
|
"url": "http://www.vupen.com/english/advisories/2009/3300"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.gentoo.org/show_bug.cgi?id=294256",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugs.gentoo.org/show_bug.cgi?id=294256"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://pear.php.net/bugs/bug.php?id=16200&edit=12&patch=quick-fix&revision=1241757412",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://pear.php.net/bugs/bug.php?id=16200&edit=12&patch=quick-fix&revision=1241757412"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "pear-from-security-bypass(54362)",
|
"name": "pear-from-security-bypass(54362)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54362"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54362"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1938",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2009/dsa-1938"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "37410",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/37410"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://svn.php.net/viewvc/pear/packages/Mail/trunk/Mail/sendmail.php?r1=243717&r2=280134",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://svn.php.net/viewvc/pear/packages/Mail/trunk/Mail/sendmail.php?r1=243717&r2=280134"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://pear.php.net/bugs/bug.php?id=16200",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://pear.php.net/bugs/bug.php?id=16200"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/",
|
"name": "typo3-zid-xss(54789)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54789"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2009-3550",
|
"name": "ADV-2009-3550",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.vupen.com/english/advisories/2009/3550"
|
"url": "http://www.vupen.com/english/advisories/2009/3550"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "typo3-zid-xss(54789)",
|
"name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/",
|
||||||
"refsource" : "XF",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54789"
|
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,20 +57,15 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/508532/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/508532/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.vupen.com/exploits/Winamp_png_w5s_PNG_Data_Processing_Integer_Overflow_PoC_3576274.php",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.vupen.com/exploits/Winamp_png_w5s_PNG_Data_Processing_Integer_Overflow_PoC_3576274.php"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://forums.winamp.com/showthread.php?threadid=315355",
|
"name": "http://forums.winamp.com/showthread.php?threadid=315355",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://forums.winamp.com/showthread.php?threadid=315355"
|
"url": "http://forums.winamp.com/showthread.php?threadid=315355"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "37387",
|
"name": "ADV-2009-3576",
|
||||||
"refsource" : "BID",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://www.securityfocus.com/bid/37387"
|
"url": "http://www.vupen.com/english/advisories/2009/3576"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:15743",
|
"name": "oval:org.mitre.oval:def:15743",
|
||||||
@ -78,9 +73,14 @@
|
|||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15743"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15743"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2009-3576",
|
"name": "http://www.vupen.com/exploits/Winamp_png_w5s_PNG_Data_Processing_Integer_Overflow_PoC_3576274.php",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2009/3576"
|
"url": "http://www.vupen.com/exploits/Winamp_png_w5s_PNG_Data_Processing_Integer_Overflow_PoC_3576274.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "37387",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/37387"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,21 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20100110 Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa log escape sequence injection",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/508830/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2010-7599",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041285.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2010-7640",
|
"name": "FEDORA-2010-7640",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
@ -77,20 +62,35 @@
|
|||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041274.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041274.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "37718",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/37718"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "39775",
|
"name": "39775",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/39775"
|
"url": "http://secunia.com/advisories/39775"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "37718",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/37718"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2010-1133",
|
"name": "ADV-2010-1133",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2010/1133"
|
"url": "http://www.vupen.com/english/advisories/2010/1133"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2010-7599",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041285.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20100110 Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa log escape sequence injection",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/508830/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2015-0042",
|
"ID": "CVE-2015-0042",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "MS15-009",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "72412",
|
"name": "72412",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "1031723",
|
"name": "1031723",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1031723"
|
"url": "http://www.securitytracker.com/id/1031723"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MS15-009",
|
||||||
|
"refsource": "MS",
|
||||||
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2015-0084",
|
"ID": "CVE-2015-0084",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-028"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-028"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "72913",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/72913"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1031893",
|
"name": "1031893",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1031893"
|
"url": "http://www.securitytracker.com/id/1031893"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "72913",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/72913"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2015-0119",
|
"ID": "CVE-2015-0119",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert_us@oracle.com",
|
||||||
"ID": "CVE-2015-0479",
|
"ID": "CVE-2015-0479",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2015-03.html",
|
"name": "http://advisories.mageia.org/MGASA-2015-0019.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2015-03.html"
|
"url": "http://advisories.mageia.org/MGASA-2015-0019.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10724",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10724"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=a559f2a050947f793c00159c0cd4d30f403f217c",
|
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=a559f2a050947f793c00159c0cd4d30f403f217c",
|
||||||
@ -68,15 +63,35 @@
|
|||||||
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=a559f2a050947f793c00159c0cd4d30f403f217c"
|
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=a559f2a050947f793c00159c0cd4d30f403f217c"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://advisories.mageia.org/MGASA-2015-0019.html",
|
"name": "62612",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://advisories.mageia.org/MGASA-2015-0019.html"
|
"url": "http://secunia.com/advisories/62612"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "MDVSA-2015:022",
|
||||||
|
"refsource": "MANDRIVA",
|
||||||
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:022"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "71921",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/71921"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2015:1460",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10724",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10724"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
|
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -88,34 +103,19 @@
|
|||||||
"url": "http://www.debian.org/security/2015/dsa-3141"
|
"url": "http://www.debian.org/security/2015/dsa-3141"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "MDVSA-2015:022",
|
"name": "62673",
|
||||||
"refsource" : "MANDRIVA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:022"
|
"url": "http://secunia.com/advisories/62673"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2015:1460",
|
"name": "http://www.wireshark.org/security/wnpa-sec-2015-03.html",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1460.html"
|
"url": "http://www.wireshark.org/security/wnpa-sec-2015-03.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2015:0113",
|
"name": "openSUSE-SU-2015:0113",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "71921",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/71921"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "62612",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/62612"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "62673",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/62673"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "product-security@apple.com",
|
||||||
"ID": "CVE-2015-1061",
|
"ID": "CVE-2015-1061",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,31 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT204413",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT204413"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT204423",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT204423"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/HT204426",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/HT204426"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://support.apple.com/kb/HT204563",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.apple.com/kb/HT204563"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2015-03-09-1",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "APPLE-SA-2015-03-09-2",
|
"name": "APPLE-SA-2015-03-09-2",
|
||||||
"refsource": "APPLE",
|
"refsource": "APPLE",
|
||||||
@ -88,14 +63,39 @@
|
|||||||
"url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html"
|
"url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "73004",
|
"name": "https://support.apple.com/HT204426",
|
||||||
"refsource" : "BID",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securityfocus.com/bid/73004"
|
"url": "https://support.apple.com/HT204426"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT204413",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT204413"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2015-03-09-1",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1031864",
|
"name": "1031864",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1031864"
|
"url": "http://www.securitytracker.com/id/1031864"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/kb/HT204563",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/kb/HT204563"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://support.apple.com/HT204423",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://support.apple.com/HT204423"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "73004",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/73004"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security@google.com",
|
||||||
"ID": "CVE-2015-1238",
|
"ID": "CVE-2015-1238",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,50 +52,50 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=445808",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=445808"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-3238",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2015/dsa-3238"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-201506-04",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201506-04"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "RHSA-2015:0816",
|
"name": "RHSA-2015:0816",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html"
|
"url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:1887",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2015:0748",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-2570-1",
|
"name": "USN-2570-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://ubuntu.com/usn/usn-2570-1"
|
"url": "http://ubuntu.com/usn/usn-2570-1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-3238",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2015/dsa-3238"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:1887",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-201506-04",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "https://security.gentoo.org/glsa/201506-04"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "1032209",
|
"name": "1032209",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1032209"
|
"url": "http://www.securitytracker.com/id/1032209"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://code.google.com/p/chromium/issues/detail?id=445808",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://code.google.com/p/chromium/issues/detail?id=445808"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2015:0748",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2015-1882",
|
"ID": "CVE-2015-1882",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21697368",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21697368"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "PI33357",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PI33357"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "74222",
|
"name": "74222",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
@ -71,6 +61,16 @@
|
|||||||
"name": "1032190",
|
"name": "1032190",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1032190"
|
"url": "http://www.securitytracker.com/id/1032190"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "PI33357",
|
||||||
|
"refsource": "AIXAPAR",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI33357"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21697368",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697368"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,21 +57,6 @@
|
|||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/535734/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/535734/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "37259",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/37259/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://www.htbridge.com/advisory/HTB23260",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://www.htbridge.com/advisory/HTB23260"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://bugtracker.ispconfig.org/index.php?do=details&task_id=3898",
|
"name": "http://bugtracker.ispconfig.org/index.php?do=details&task_id=3898",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -81,6 +66,21 @@
|
|||||||
"name": "75126",
|
"name": "75126",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/75126"
|
"url": "http://www.securityfocus.com/bid/75126"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/132238/ISPConfig-3.0.5.4p6-SQL-Injection-Cross-Site-Request-Forgery.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "37259",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/37259/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.htbridge.com/advisory/HTB23260",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://www.htbridge.com/advisory/HTB23260"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@cisco.com",
|
||||||
"ID": "CVE-2015-4237",
|
"ID": "CVE-2015-4237",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20150701 Cisco Nexus Operating System Devices Command Line Interface Local Privilege Escalation Vulnerability",
|
|
||||||
"refsource" : "CISCO",
|
|
||||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=39583"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1032775",
|
"name": "1032775",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1032775"
|
"url": "http://www.securitytracker.com/id/1032775"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20150701 Cisco Nexus Operating System Devices Command Line Interface Local Privilege Escalation Vulnerability",
|
||||||
|
"refsource": "CISCO",
|
||||||
|
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39583"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "kurt@seifried.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"DATE_ASSIGNED": "2018-08-18T21:50:59.838728",
|
"DATE_ASSIGNED": "2018-08-18T21:50:59.838728",
|
||||||
"DATE_REQUESTED": "2018-08-15T00:00:00",
|
"DATE_REQUESTED": "2018-08-15T00:00:00",
|
||||||
"ID": "CVE-2018-1999047",
|
"ID": "CVE-2018-1999047",
|
||||||
@ -14,18 +14,18 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name" : "Jenkins",
|
"product_name": "n/a",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value" : "2.137 and earlier, 2.121.2 and earlier"
|
"version_value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name" : "Jenkins project"
|
"vendor_name": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -47,7 +47,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value" : "CWE-285"
|
"value": "n/a"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2018-2103",
|
"ID": "CVE-2018-2103",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2018-2342",
|
"ID": "CVE-2018-2342",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -53,16 +53,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://launchpad.support.sap.com/#/notes/2672919",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://launchpad.support.sap.com/#/notes/2672919"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993",
|
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993"
|
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://launchpad.support.sap.com/#/notes/2672919",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://launchpad.support.sap.com/#/notes/2672919"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "105338",
|
"name": "105338",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://launchpad.support.sap.com/#/notes/2681207",
|
"name": "105324",
|
||||||
"refsource" : "MISC",
|
"refsource": "BID",
|
||||||
"url" : "https://launchpad.support.sap.com/#/notes/2681207"
|
"url": "http://www.securityfocus.com/bid/105324"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993",
|
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993"
|
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "105324",
|
"name": "https://launchpad.support.sap.com/#/notes/2681207",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/105324"
|
"url": "https://launchpad.support.sap.com/#/notes/2681207"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -57,25 +57,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20181018-0001/",
|
"name": "https://security.netapp.com/advisory/ntap-20181018-0001/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20181018-0001/"
|
"url": "https://security.netapp.com/advisory/ntap-20181018-0001/"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2018:3003",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2018:3003"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:3002",
|
"name": "RHSA-2018:3002",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:3002"
|
"url": "https://access.redhat.com/errata/RHSA-2018:3002"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2018:3003",
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
||||||
"refsource" : "REDHAT",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:3003"
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "105591",
|
"name": "105591",
|
||||||
|
@ -62,15 +62,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "106363",
|
"name": "106363",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/106363"
|
"url": "http://www.securityfocus.com/bid/106363"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2018-7862",
|
"ID": "CVE-2018-7862",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user