mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
9234bc0e10
commit
7945064b75
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020209 InstantServers MiniPortal Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=101329397901071&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.instantservers.com/releases.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,6 +62,11 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/4073"
|
||||
},
|
||||
{
|
||||
"name": "20020209 InstantServers MiniPortal Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=101329397901071&w=2"
|
||||
},
|
||||
{
|
||||
"name": "miniportal-ftp-login-bo(8172)",
|
||||
"refsource": "XF",
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://freshmeat.net/releases/97910/"
|
||||
},
|
||||
{
|
||||
"name" : "5603",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/5603"
|
||||
},
|
||||
{
|
||||
"name": "null-httpd-xss(10004)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10004"
|
||||
},
|
||||
{
|
||||
"name": "5603",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5603"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.netric.org/advisories/netric-adv007.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.securiteam.com/exploits/5CP0Y0080G.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.securiteam.com/exploits/5CP0Y0080G.html"
|
||||
},
|
||||
{
|
||||
"name": "5578",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5578"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securiteam.com/exploits/5CP0Y0080G.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securiteam.com/exploits/5CP0Y0080G.html"
|
||||
},
|
||||
{
|
||||
"name": "gdam123-mp3-filename-bo(9991)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "webshots-desktop-screenlock-bypass(10863)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10863"
|
||||
},
|
||||
{
|
||||
"name": "20021212 Password Hole Found In Webshots",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "6385",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/6385"
|
||||
},
|
||||
{
|
||||
"name" : "webshots-desktop-screenlock-bypass(10863)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/10863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "RHSA-2003:084",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2003-084.html"
|
||||
},
|
||||
{
|
||||
"name": "7253",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "oval:org.mitre.oval:def:634",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A634"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2003:084",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2003-084.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,31 +57,11 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=105249399103214&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20030513 Flooding Internet Explorer 6.0.2800 (6.x?) security zones ! - UPDATED",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=105294081325040&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20030513 Flooding Internet Explorer 6.0.2800 (6.x?) security zones ! - UPDATED",
|
||||
"refsource" : "NTBUGTRAQ",
|
||||
"url" : "http://marc.info/?l=ntbugtraq&m=105294162726096&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "MS03-020",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-020"
|
||||
},
|
||||
{
|
||||
"name": "VU#251788",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/251788"
|
||||
},
|
||||
{
|
||||
"name" : "7539",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/7539"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:948",
|
||||
"refsource": "OVAL",
|
||||
@ -92,6 +72,26 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/8807"
|
||||
},
|
||||
{
|
||||
"name": "20030513 Flooding Internet Explorer 6.0.2800 (6.x?) security zones ! - UPDATED",
|
||||
"refsource": "NTBUGTRAQ",
|
||||
"url": "http://marc.info/?l=ntbugtraq&m=105294162726096&w=2"
|
||||
},
|
||||
{
|
||||
"name": "7539",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/7539"
|
||||
},
|
||||
{
|
||||
"name": "20030513 Flooding Internet Explorer 6.0.2800 (6.x?) security zones ! - UPDATED",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=105294081325040&w=2"
|
||||
},
|
||||
{
|
||||
"name": "MS03-020",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-020"
|
||||
},
|
||||
{
|
||||
"name": "ie-frame-restrictions-bypass(12019)",
|
||||
"refsource": "XF",
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=105405708923565&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "fastrack-packet-0-bo(12086)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/12086.php"
|
||||
},
|
||||
{
|
||||
"name": "7680",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/7680"
|
||||
},
|
||||
{
|
||||
"name": "fastrack-packet-0-bo(12086)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/12086.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20030812 Netris client Buffer Overflow Vulnerability.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=106071059430211&w=2"
|
||||
},
|
||||
{
|
||||
"name": "DSA-372",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2003/dsa-372"
|
||||
},
|
||||
{
|
||||
"name": "20030812 Netris client Buffer Overflow Vulnerability.",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=106071059430211&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2009-1966",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
|
||||
},
|
||||
{
|
||||
"name" : "35676",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/35676"
|
||||
},
|
||||
{
|
||||
"name" : "55887",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/55887"
|
||||
},
|
||||
{
|
||||
"name" : "1022560",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1022560"
|
||||
},
|
||||
{
|
||||
"name": "35776",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35776"
|
||||
},
|
||||
{
|
||||
"name": "oracle-db-em-config-unspecified(51752)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51752"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1900",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1900"
|
||||
},
|
||||
{
|
||||
"name" : "oracle-db-em-config-unspecified(51752)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51752"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
|
||||
},
|
||||
{
|
||||
"name": "1022560",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1022560"
|
||||
},
|
||||
{
|
||||
"name": "55887",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/55887"
|
||||
},
|
||||
{
|
||||
"name": "35676",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/35676"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-0041",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20120111 Re: CVE request: Wireshark multiple vulnerabilities",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/01/11/7"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20120119 Re: CVE request: Wireshark multiple vulnerabilities",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/01/20/4"
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6663",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6663"
|
||||
},
|
||||
{
|
||||
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=40164",
|
||||
@ -68,19 +63,14 @@
|
||||
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=40164"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.wireshark.org/security/wnpa-sec-2012-01.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/security/wnpa-sec-2012-01.html"
|
||||
"name": "[oss-security] 20120119 Re: CVE request: Wireshark multiple vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/01/20/4"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6663",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6663"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201308-05",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
|
||||
"name": "54425",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/54425"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0125",
|
||||
@ -88,24 +78,34 @@
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0125.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:15297",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15297"
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2012-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/security/wnpa-sec-2012-01.html"
|
||||
},
|
||||
{
|
||||
"name": "48947",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48947"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120111 Re: CVE request: Wireshark multiple vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/01/11/7"
|
||||
},
|
||||
{
|
||||
"name": "47494",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/47494"
|
||||
},
|
||||
{
|
||||
"name" : "54425",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/54425"
|
||||
"name": "GLSA-201308-05",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:15297",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15297"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2012/mfsa2012-33.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2012/mfsa2012-33.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=714631",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=714631"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2457",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2457"
|
||||
"name": "48922",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48922"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2458",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2458"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2464",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2464"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2012:066",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2012:081",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
|
||||
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-33.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-33.html"
|
||||
},
|
||||
{
|
||||
"name": "53224",
|
||||
@ -97,30 +77,50 @@
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17011"
|
||||
},
|
||||
{
|
||||
"name" : "48972",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48972"
|
||||
},
|
||||
{
|
||||
"name" : "49047",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/49047"
|
||||
},
|
||||
{
|
||||
"name": "49055",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/49055"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2458",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2458"
|
||||
},
|
||||
{
|
||||
"name": "48920",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48920"
|
||||
},
|
||||
{
|
||||
"name" : "48922",
|
||||
"name": "DSA-2457",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2457"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2464",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2464"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:081",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:081"
|
||||
},
|
||||
{
|
||||
"name": "48972",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48922"
|
||||
"url": "http://secunia.com/advisories/48972"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:066",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:066"
|
||||
},
|
||||
{
|
||||
"name": "49047",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/49047"
|
||||
},
|
||||
{
|
||||
"name": "firefox-rss-spoofing(75156)",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/files/109663/BASE-1.4.5-Remote-File-Inclusion-Shell-Creation.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/files/109663/BASE-1.4.5-Remote-File-Inclusion-Shell-Creation.html"
|
||||
"name": "base-baseagmain-security-bypass(73201)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73201"
|
||||
},
|
||||
{
|
||||
"name": "51979",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/51979"
|
||||
},
|
||||
{
|
||||
"name" : "base-baseagmain-security-bypass(73201)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73201"
|
||||
"name": "http://packetstormsecurity.org/files/109663/BASE-1.4.5-Remote-File-Inclusion-Shell-Creation.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/files/109663/BASE-1.4.5-Remote-File-Inclusion-Shell-Creation.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-1639",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "78528",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/78528"
|
||||
},
|
||||
{
|
||||
"name": "47730",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/47730"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)",
|
||||
"refsource": "MLIST",
|
||||
@ -67,25 +77,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupalcode.org/project/commerce.git/blobdiff/45bc53875f1675750afe60e709a34c95e3008366..b74cdcd:/modules/product/commerce_product.module"
|
||||
},
|
||||
{
|
||||
"name" : "51668",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/51668"
|
||||
},
|
||||
{
|
||||
"name" : "78528",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/78528"
|
||||
},
|
||||
{
|
||||
"name" : "47730",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/47730"
|
||||
},
|
||||
{
|
||||
"name": "drupal-commerce-multiple-xss(72743)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72743"
|
||||
},
|
||||
{
|
||||
"name": "51668",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/51668"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2012-3279",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,12 +53,12 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBMU02842",
|
||||
"name": "SSRT100909",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03652323"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT100909",
|
||||
"name": "HPSBMU02842",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03652323"
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-3448",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,31 +52,36 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "54699",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/54699"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2012-10727",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084196.html"
|
||||
},
|
||||
{
|
||||
"name": "38030",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/38030/"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2012-10699",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084202.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120801 Re: CVE request: Ganglia Web 3.5.1",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/08/02/1"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.gentoo.org/show_bug.cgi?id=428776",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.gentoo.org/show_bug.cgi?id=428776"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=845124",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=845124"
|
||||
},
|
||||
{
|
||||
"name" : "http://ganglia.info/?p=549",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://ganglia.info/?p=549"
|
||||
},
|
||||
{
|
||||
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -87,25 +92,20 @@
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2610"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2012-10699",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084202.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2012-10727",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084196.html"
|
||||
},
|
||||
{
|
||||
"name" : "54699",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/54699"
|
||||
},
|
||||
{
|
||||
"name": "50047",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/50047"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.gentoo.org/show_bug.cgi?id=428776",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.gentoo.org/show_bug.cgi?id=428776"
|
||||
},
|
||||
{
|
||||
"name": "http://ganglia.info/?p=549",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://ganglia.info/?p=549"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-3482",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20120813 CVE ID request for fetchmail segfault in NTLM protocol exchange",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2012/q3/230"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120813 Re: CVE ID request for fetchmail segfault in NTLM protocol exchange",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2012/q3/232"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.fetchmail.info/fetchmail-SA-2012-02.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.fetchmail.info/fetchmail-SA-2012-02.txt"
|
||||
"name": "[oss-security] 20120813 CVE ID request for fetchmail segfault in NTLM protocol exchange",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2012/q3/230"
|
||||
},
|
||||
{
|
||||
"name": "54987",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/54987"
|
||||
},
|
||||
{
|
||||
"name": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2012-14462",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2012-14451",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html"
|
||||
},
|
||||
{
|
||||
"name" : "54987",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/54987"
|
||||
"name": "FEDORA-2012-14462",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.fetchmail.info/fetchmail-SA-2012-02.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2012-3646",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5400",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5400"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5485",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5485"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2012-09-19-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5503",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5503"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2012-07-25-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2012-09-12-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2012-09-19-1",
|
||||
"name": "APPLE-SA-2012-07-25-1",
|
||||
"refsource": "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5400",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5400"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,20 +53,15 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20121017 Multiple vulnerabilities in jCore",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-10/0097.html"
|
||||
"name": "http://jcore.net/news/jcore-ver-10pre2-available-for-testing",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://jcore.net/news/jcore-ver-10pre2-available-for-testing"
|
||||
},
|
||||
{
|
||||
"name": "https://www.htbridge.com/advisory/HTB23107",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.htbridge.com/advisory/HTB23107"
|
||||
},
|
||||
{
|
||||
"name" : "http://jcore.net/news/jcore-ver-10pre2-available-for-testing",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://jcore.net/news/jcore-ver-10pre2-available-for-testing"
|
||||
},
|
||||
{
|
||||
"name": "56102",
|
||||
"refsource": "BID",
|
||||
@ -76,6 +71,11 @@
|
||||
"name": "jcore-index-sql-injection(79442)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79442"
|
||||
},
|
||||
{
|
||||
"name": "20121017 Multiple vulnerabilities in jCore",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0097.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20120329 NGS00155 Patch Notification: McAfee Email and Web Security Appliance v5.6 - Any logged-in user can bypass controls to reset passwords of other administrators",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-03/0160.html"
|
||||
},
|
||||
{
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10020",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10020"
|
||||
},
|
||||
{
|
||||
"name": "20120329 NGS00155 Patch Notification: McAfee Email and Web Security Appliance v5.6 - Any logged-in user can bypass controls to reset passwords of other administrators",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0160.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20120823 foxit reader 5.3.1(dwmapi.dll) DLL Hijacking Exploit",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0293.html"
|
||||
},
|
||||
{
|
||||
"name": "50348",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/50348"
|
||||
},
|
||||
{
|
||||
"name": "20120823 foxit reader 5.3.1(dwmapi.dll) DLL Hijacking Exploit",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0293.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.justsystems.com/jp/info/js17002.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.justsystems.com/jp/info/js17002.html"
|
||||
},
|
||||
{
|
||||
"name": "JVN#54268888",
|
||||
"refsource": "JVN",
|
||||
"url": "https://jvn.jp/en/jp/JVN54268888/index.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.justsystems.com/jp/info/js17002.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.justsystems.com/jp/info/js17002.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://jvn.jp/en/vu/JVNVU93377948/index.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://jvn.jp/en/vu/JVNVU93377948/index.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.hammock.jp/assetview/info/170714.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.hammock.jp/assetview/info/170714.html"
|
||||
},
|
||||
{
|
||||
"name": "http://jvn.jp/en/vu/JVNVU93377948/index.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://jvn.jp/en/vu/JVNVU93377948/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "psampaio@redhat.com",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2017-2635",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -58,15 +58,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
|
||||
},
|
||||
{
|
||||
"name" : "97902",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/97902"
|
||||
},
|
||||
{
|
||||
"name": "1038301",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038301"
|
||||
},
|
||||
{
|
||||
"name": "97902",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97902"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/02/21/4"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20170226 Re: CVE Request - Multiple vulnerabilities in gdk-pixbuf",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2017/02/26/1"
|
||||
"name": "96779",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96779"
|
||||
},
|
||||
{
|
||||
"name": "http://mov.sx/2017/02/21/bug-hunting-gdk-pixbuf.html",
|
||||
@ -72,15 +72,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=778204"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20170226 Re: CVE Request - Multiple vulnerabilities in gdk-pixbuf",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/02/26/1"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201709-08",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201709-08"
|
||||
},
|
||||
{
|
||||
"name" : "96779",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/96779"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1038626",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038626"
|
||||
},
|
||||
{
|
||||
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm1"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesb3p03762en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesb3p03762en_us"
|
||||
},
|
||||
{
|
||||
"name": "98935",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/98935"
|
||||
},
|
||||
{
|
||||
"name" : "1038626",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038626"
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesb3p03762en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesb3p03762en_us"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-7874",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://dasp.co/#item-3",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://dasp.co/#item-3"
|
||||
},
|
||||
{
|
||||
"name": "https://peckshield.com/2018/04/25/proxyOverflow/",
|
||||
"refsource": "MISC",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "https://www.reddit.com/r/ethereum/comments/8esyg9/okex_erc20_bug/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.reddit.com/r/ethereum/comments/8esyg9/okex_erc20_bug/"
|
||||
},
|
||||
{
|
||||
"name": "https://dasp.co/#item-3",
|
||||
"refsource": "MISC",
|
||||
"url": "https://dasp.co/#item-3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,16 +56,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "44501",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/44501/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vapidlabs.com/advisory.php?v=202",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.vapidlabs.com/advisory.php?v=202"
|
||||
},
|
||||
{
|
||||
"name": "44501",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/44501/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.drupal.org/project/avatar_uploader",
|
||||
"refsource": "MISC",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2018-9572",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user