"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:35:54 +00:00
parent 4d78789d60
commit 81235666a4
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
63 changed files with 4021 additions and 4021 deletions

View File

@ -53,84 +53,9 @@
"references": {
"reference_data": [
{
"name" : "CLA-2004:846",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846"
},
{
"name" : "DSA-479",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-479"
},
{
"name" : "DSA-480",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-480"
},
{
"name" : "DSA-481",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-481"
},
{
"name" : "DSA-482",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-482"
},
{
"name" : "DSA-489",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-489"
},
{
"name" : "DSA-491",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-491"
},
{
"name" : "DSA-495",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-495"
},
{
"name" : "ESA-20040428-004",
"refsource" : "ENGARDE",
"url" : "http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html"
},
{
"name" : "FLSA:2336",
"refsource" : "FEDORA",
"url" : "https://bugzilla.fedora.us/show_bug.cgi?id=2336"
},
{
"name" : "GLSA-200407-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200407-02.xml"
},
{
"name" : "MDKSA-2004:029",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:029"
},
{
"name" : "RHSA-2004:166",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2004-166.html"
},
{
"name" : "RHSA-2005:293",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-293.html"
},
{
"name" : "RHSA-2004:504",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-504.html"
},
{
"name" : "RHSA-2004:505",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-505.html"
"name": "O-127",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/o-127.shtml"
},
{
"name": "2004-0020",
@ -138,9 +63,74 @@
"url": "http://marc.info/?l=bugtraq&m=108213675028441&w=2"
},
{
"name" : "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ",
"refsource" : "MISC",
"url" : "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ"
"name": "FLSA:2336",
"refsource": "FEDORA",
"url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336"
},
{
"name": "DSA-482",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-482"
},
{
"name": "DSA-495",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-495"
},
{
"name": "DSA-479",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-479"
},
{
"name": "linux-ext3-info-disclosure(15867)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15867"
},
{
"name": "DSA-480",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-480"
},
{
"name": "10152",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10152"
},
{
"name": "CLA-2004:846",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846"
},
{
"name": "DSA-489",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-489"
},
{
"name": "DSA-481",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-481"
},
{
"name": "oval:org.mitre.oval:def:10556",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10556"
},
{
"name": "RHSA-2005:293",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-293.html"
},
{
"name": "ESA-20040428-004",
"refsource": "ENGARDE",
"url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html"
},
{
"name": "RHSA-2004:505",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-505.html"
},
{
"name": "O-121",
@ -153,24 +143,34 @@
"url": "http://www.ciac.org/ciac/bulletins/o-126.shtml"
},
{
"name" : "O-127",
"refsource" : "CIAC",
"url" : "http://www.ciac.org/ciac/bulletins/o-127.shtml"
"name": "RHSA-2004:504",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-504.html"
},
{
"name" : "10152",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/10152"
"name": "MDKSA-2004:029",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:029"
},
{
"name" : "oval:org.mitre.oval:def:10556",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10556"
"name": "GLSA-200407-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200407-02.xml"
},
{
"name" : "linux-ext3-info-disclosure(15867)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15867"
"name": "RHSA-2004:166",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2004-166.html"
},
{
"name": "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ",
"refsource": "MISC",
"url": "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ"
},
{
"name": "DSA-491",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-491"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20040817 Gallery 1.4.4 save_photos.php PHP Insertion Proof of Concept",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0757.html"
},
{
"name" : "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=134&mode=thread&order=0&thold=0",
"refsource" : "CONFIRM",
"url" : "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=134&mode=thread&order=0&thold=0"
},
{
"name" : "GLSA-200409-05",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200409-05.xml"
},
{
"name": "10968",
"refsource": "BID",
@ -76,6 +61,21 @@
"name": "gallery-savephotos-file-upload(17021)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17021"
},
{
"name": "20040817 Gallery 1.4.4 save_photos.php PHP Insertion Proof of Concept",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0757.html"
},
{
"name": "GLSA-200409-05",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200409-05.xml"
},
{
"name": "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=134&mode=thread&order=0&thold=0",
"refsource": "CONFIRM",
"url": "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=134&mode=thread&order=0&thold=0"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20040322 Vulnerabilities in News Manager Lite 2.5 & News Manager Lite administration",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107999733503496&w=2"
"name": "11180",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11180"
},
{
"name": "9935",
@ -67,15 +67,15 @@
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1009507"
},
{
"name" : "11180",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/11180"
},
{
"name": "news-manager-admin-access(15550)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15550"
},
{
"name": "20040322 Vulnerabilities in News Manager Lite 2.5 & News Manager Lite administration",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107999733503496&w=2"
}
]
}

View File

@ -57,16 +57,16 @@
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108057887008983&w=2"
},
{
"name" : "9997",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/9997"
},
{
"name": "11236",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11236"
},
{
"name": "9997",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9997"
},
{
"name": "acart-deliverasp-billingasp-xss(15660)",
"refsource": "XF",

View File

@ -52,25 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "6066",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6066"
},
{
"name" : "http://www.maianscriptworld.co.uk/free-php-scripts/maian-search/development/index.html",
"refsource" : "CONFIRM",
"url" : "http://www.maianscriptworld.co.uk/free-php-scripts/maian-search/development/index.html"
},
{
"name": "http://www.maianscriptworld.co.uk/news.html",
"refsource": "CONFIRM",
"url": "http://www.maianscriptworld.co.uk/news.html"
},
{
"name" : "30211",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30211"
"name": "6066",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6066"
},
{
"name": "31075",
@ -82,6 +72,16 @@
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4042"
},
{
"name": "http://www.maianscriptworld.co.uk/free-php-scripts/maian-search/development/index.html",
"refsource": "CONFIRM",
"url": "http://www.maianscriptworld.co.uk/free-php-scripts/maian-search/development/index.html"
},
{
"name": "30211",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30211"
},
{
"name": "maiansearch-index-security-bypass(43753)",
"refsource": "XF",

View File

@ -52,36 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT3129",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3129"
},
{
"name" : "http://support.apple.com/kb/HT3026",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3026"
},
{
"name" : "APPLE-SA-2008-09-09",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
},
{
"name" : "APPLE-SA-2008-09-12",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
},
{
"name" : "31092",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31092"
},
{
"name" : "ADV-2008-2558",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2558"
},
{
"name": "ADV-2008-2525",
"refsource": "VUPEN",
@ -93,14 +63,44 @@
"url": "http://www.securitytracker.com/id?1020846"
},
{
"name" : "31900",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31900"
"name": "http://support.apple.com/kb/HT3026",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3026"
},
{
"name": "http://support.apple.com/kb/HT3129",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3129"
},
{
"name": "APPLE-SA-2008-09-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
},
{
"name": "31823",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31823"
},
{
"name": "ADV-2008-2558",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2558"
},
{
"name": "31900",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31900"
},
{
"name": "31092",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31092"
},
{
"name": "APPLE-SA-2008-09-09",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
}
]
}

View File

@ -52,31 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "6293",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6293"
},
{
"name" : "[oss-security] 20080824 Re: CVE id request: vlc",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/08/24/3"
},
{
"name" : "[vlc-devel] 20080824 commit: MMS integers handling fixes, including buffer overflow ( Rémi Denis-Courmont )",
"refsource" : "MLIST",
"url" : "http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048488.html"
},
{
"name": "http://www.orange-bat.com/adv/2008/adv.08.24.txt",
"refsource": "MISC",
"url": "http://www.orange-bat.com/adv/2008/adv.08.24.txt"
},
{
"name" : "GLSA-200809-06",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200809-06.xml"
},
{
"name": "30806",
"refsource": "BID",
@ -87,6 +67,21 @@
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14531"
},
{
"name": "[vlc-devel] 20080824 commit: MMS integers handling fixes, including buffer overflow ( R\u00e9mi Denis-Courmont )",
"refsource": "MLIST",
"url": "http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048488.html"
},
{
"name": "6293",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6293"
},
{
"name": "vlcmediaplayer-memmove-bo(44659)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44659"
},
{
"name": "1020759",
"refsource": "SECTRACK",
@ -98,9 +93,14 @@
"url": "http://securityreason.com/securityalert/4190"
},
{
"name" : "vlcmediaplayer-memmove-bo(44659)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44659"
"name": "[oss-security] 20080824 Re: CVE id request: vlc",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/08/24/3"
},
{
"name": "GLSA-200809-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200809-06.xml"
}
]
}

View File

@ -53,74 +53,44 @@
"references": {
"reference_data": [
{
"name" : "http://blogs.zdnet.com/security/?p=1733",
"refsource" : "MISC",
"url" : "http://blogs.zdnet.com/security/?p=1733"
},
{
"name" : "http://blogs.zdnet.com/security/?p=1759",
"refsource" : "MISC",
"url" : "http://blogs.zdnet.com/security/?p=1759"
},
{
"name" : "http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html",
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=",
"refsource": "CONFIRM",
"url" : "http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html"
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid="
},
{
"name" : "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html"
"name": "33390",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33390"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb08-18.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb08-18.html"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"
},
{
"name" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=",
"name": "32702",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32702"
},
{
"name": "adobe-flash-setclipboard-hijacking(44584)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44584"
},
{
"name": "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html",
"refsource": "CONFIRM",
"url" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid="
"url": "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html"
},
{
"name" : "GLSA-200903-23",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200903-23.xml"
},
{
"name" : "RHSA-2008:0945",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0945.html"
},
{
"name" : "RHSA-2008:0980",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0980.html"
},
{
"name" : "248586",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"
},
{
"name" : "SUSE-SR:2008:025",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
},
{
"name" : "31117",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31117"
"name": "http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html",
"refsource": "CONFIRM",
"url": "http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html"
},
{
"name": "34226",
@ -132,35 +102,65 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2838"
},
{
"name": "http://blogs.zdnet.com/security/?p=1733",
"refsource": "MISC",
"url": "http://blogs.zdnet.com/security/?p=1733"
},
{
"name": "GLSA-200903-23",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200903-23.xml"
},
{
"name": "1020724",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1020724"
},
{
"name" : "32448",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32448"
},
{
"name": "32759",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32759"
},
{
"name" : "32702",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32702"
"name": "RHSA-2008:0945",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0945.html"
},
{
"name" : "33390",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33390"
"name": "RHSA-2008:0980",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html"
},
{
"name" : "adobe-flash-setclipboard-hijacking(44584)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44584"
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"
},
{
"name": "31117",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31117"
},
{
"name": "248586",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"
},
{
"name": "32448",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32448"
},
{
"name": "SUSE-SR:2008:025",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
},
{
"name": "http://blogs.zdnet.com/security/?p=1759",
"refsource": "MISC",
"url": "http://blogs.zdnet.com/security/?p=1759"
}
]
}

View File

@ -52,20 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "6946",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6946"
},
{
"name": "6947",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6947"
},
{
"name" : "6951",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6951"
"name": "ADV-2008-2993",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2993"
},
{
"name": "ADV-2008-2992",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2992"
},
{
"name": "downlinegoldmine-tr-sql-injection(45128)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45128"
},
{
"name": "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt",
"refsource": "MISC",
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt"
},
{
"name": "31169",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31169"
},
{
"name": "6950",
@ -78,49 +93,34 @@
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/categoryaddon-sql.txt"
},
{
"name" : "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt"
},
{
"name" : "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt"
},
{
"name" : "31169",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31169"
},
{
"name" : "ADV-2008-2992",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2992"
},
{
"name" : "ADV-2008-2994",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2994"
"name": "6951",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6951"
},
{
"name": "ADV-2008-2995",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2995"
},
{
"name": "6946",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6946"
},
{
"name": "31812",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31812"
},
{
"name" : "ADV-2008-2993",
"name": "ADV-2008-2994",
"refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2993"
"url": "http://www.vupen.com/english/advisories/2008/2994"
},
{
"name" : "downlinegoldmine-tr-sql-injection(45128)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45128"
"name": "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt"
}
]
}

View File

@ -52,25 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "[dailydave] 20081002 TCP Resource Exhaustion DoS Attack Speculation",
"refsource" : "MLIST",
"url" : "http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html"
},
{
"name": "http://blog.robertlee.name/2008/10/conjecture-speculation.html",
"refsource": "MISC",
"url": "http://blog.robertlee.name/2008/10/conjecture-speculation.html"
},
{
"name": "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html",
"refsource": "MISC",
"url": "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html"
},
{
"name": "HPSBMI02473",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=125856010926699&w=2"
},
{
"name": "[dailydave] 20081002 TCP Resource Exhaustion DoS Attack Speculation",
"refsource": "MLIST",
"url": "http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html"
},
{
"name": "http://insecure.org/stf/tcp-dos-attack-explained.html",
"refsource": "MISC",
"url": "http://insecure.org/stf/tcp-dos-attack-explained.html"
},
{
"name" : "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked",
"name": "http://www.outpost24.com/news/news-2008-10-02.html",
"refsource": "MISC",
"url" : "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked"
"url": "http://www.outpost24.com/news/news-2008-10-02.html"
},
{
"name": "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf",
@ -78,14 +88,14 @@
"url": "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf"
},
{
"name" : "http://www.outpost24.com/news/news-2008-10-02.html",
"refsource" : "MISC",
"url" : "http://www.outpost24.com/news/news-2008-10-02.html"
"name": "20090908 TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml"
},
{
"name" : "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html",
"refsource" : "MISC",
"url" : "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html"
"name": "TA09-251A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-251A.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
@ -98,19 +108,19 @@
"url": "http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html"
},
{
"name" : "20090908 TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml"
"name": "MS09-048",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048"
},
{
"name" : "HPSBMI02473",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=125856010926699&w=2"
"name": "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked",
"refsource": "MISC",
"url": "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked"
},
{
"name" : "SSRT080138",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=125856010926699&w=2"
"name": "oval:org.mitre.oval:def:6340",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340"
},
{
"name": "MDVSA-2013:150",
@ -118,19 +128,9 @@
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name" : "MS09-048",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048"
},
{
"name" : "TA09-251A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-251A.html"
},
{
"name" : "oval:org.mitre.oval:def:6340",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340"
"name": "SSRT080138",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=125856010926699&w=2"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6631"
},
{
"name" : "6634",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6634"
},
{
"name": "31489",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "sgrealestateportal-index-sql-injection(45568)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45568"
},
{
"name": "6634",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6634"
}
]
}

View File

@ -52,25 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20081030 harlandscripts Mypage.php Sql Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/497946"
},
{
"name" : "6874",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6874"
},
{
"name": "31986",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31986"
},
{
"name" : "32467",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32467"
"name": "protrafficone-mypage-sql-injection(46207)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46207"
},
{
"name": "ADV-2008-2964",
@ -78,9 +68,19 @@
"url": "http://www.vupen.com/english/advisories/2008/2964"
},
{
"name" : "protrafficone-mypage-sql-injection(46207)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46207"
"name": "32467",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32467"
},
{
"name": "6874",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6874"
},
{
"name": "20081030 harlandscripts Mypage.php Sql Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497946"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "ezbizpro-track-sql-injection(46280)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46280"
},
{
"name": "6910",
"refsource": "EXPLOIT-DB",
@ -66,11 +71,6 @@
"name": "32552",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32552"
},
{
"name" : "ezbizpro-track-sql-injection(46280)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46280"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.securityfocus.com/bid/30116/exploit",
"refsource" : "MISC",
"url" : "http://www.securityfocus.com/bid/30116/exploit"
},
{
"name": "30116",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30116"
},
{
"name": "http://www.securityfocus.com/bid/30116/exploit",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/30116/exploit"
},
{
"name": "zoph-login-sql-injection(43693)",
"refsource": "XF",

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "7406",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7406"
},
{
"name" : "http://ez.no/developer/security/security_advisories/ez_publish_4_0/ezsa_2008_003_insufficient_form_handling_made_privilege_escalation_possible",
"refsource" : "CONFIRM",
"url" : "http://ez.no/developer/security/security_advisories/ez_publish_4_0/ezsa_2008_003_insufficient_form_handling_made_privilege_escalation_possible"
},
{
"name" : "32762",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32762"
"name": "ezpublish-registration-privilege-escalation(47216)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47216"
},
{
"name": "52708",
@ -73,9 +63,19 @@
"url": "http://www.osvdb.org/52708"
},
{
"name" : "ezpublish-registration-privilege-escalation(47216)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47216"
"name": "32762",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32762"
},
{
"name": "http://ez.no/developer/security/security_advisories/ez_publish_4_0/ezsa_2008_003_insufficient_form_handling_made_privilege_escalation_possible",
"refsource": "CONFIRM",
"url": "http://ez.no/developer/security/security_advisories/ez_publish_4_0/ezsa_2008_003_insufficient_form_handling_made_privilege_escalation_possible"
},
{
"name": "7406",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7406"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2023",
"STATE": "PUBLIC"
},
@ -53,19 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20130421 Vulnerabilities in jPlayer",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2013/Apr/192"
"name": "https://github.com/happyworm/jPlayer/commit/8ccc429598d62eebe9f65a0a4e6fd406a123c8b4",
"refsource": "CONFIRM",
"url": "https://github.com/happyworm/jPlayer/commit/8ccc429598d62eebe9f65a0a4e6fd406a123c8b4"
},
{
"name" : "[oss-security] 20130411 CVE-2013-1942 jPlayer 2.2.19 XSS",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=136570964825921&w=2"
},
{
"name" : "[oss-security] 20130429 Re: CVE-2013-1942 jPlayer 2.2.19 XSS",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=136726705917858&w=2"
"name": "https://github.com/happyworm/jPlayer/commit/c2417972af1295be8dcc07470b0e3d25b0a77e0b",
"refsource": "CONFIRM",
"url": "https://github.com/happyworm/jPlayer/commit/c2417972af1295be8dcc07470b0e3d25b0a77e0b"
},
{
"name": "[oss-security] 20130505 Re: CVE-2013-1942 jPlayer 2.2.19 XSS",
@ -78,9 +73,14 @@
"url": "http://www.openwall.com/lists/oss-security/2013/06/27/7"
},
{
"name" : "[oss-security] 20130704 Re: Re: CVE-2013-1942 jPlayer 2.2.19 XSS",
"name": "https://github.com/happyworm/jPlayer/issues/162",
"refsource": "CONFIRM",
"url": "https://github.com/happyworm/jPlayer/issues/162"
},
{
"name": "[oss-security] 20130411 CVE-2013-1942 jPlayer 2.2.19 XSS",
"refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/07/04/5"
"url": "http://marc.info/?l=oss-security&m=136570964825921&w=2"
},
{
"name": "http://www.jplayer.org/latest/release-notes/",
@ -88,19 +88,19 @@
"url": "http://www.jplayer.org/latest/release-notes/"
},
{
"name" : "https://github.com/happyworm/jPlayer/commit/8ccc429598d62eebe9f65a0a4e6fd406a123c8b4",
"refsource" : "CONFIRM",
"url" : "https://github.com/happyworm/jPlayer/commit/8ccc429598d62eebe9f65a0a4e6fd406a123c8b4"
"name": "[oss-security] 20130704 Re: Re: CVE-2013-1942 jPlayer 2.2.19 XSS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/07/04/5"
},
{
"name" : "https://github.com/happyworm/jPlayer/commit/c2417972af1295be8dcc07470b0e3d25b0a77e0b",
"refsource" : "CONFIRM",
"url" : "https://github.com/happyworm/jPlayer/commit/c2417972af1295be8dcc07470b0e3d25b0a77e0b"
"name": "20130421 Vulnerabilities in jPlayer",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Apr/192"
},
{
"name" : "https://github.com/happyworm/jPlayer/issues/162",
"refsource" : "CONFIRM",
"url" : "https://github.com/happyworm/jPlayer/issues/162"
"name": "[oss-security] 20130429 Re: CVE-2013-1942 jPlayer 2.2.19 XSS",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=136726705917858&w=2"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2013-2696",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6508",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -58,9 +58,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
"name": "1038947",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038947"
},
{
"name": "99677",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/99677"
},
{
"name" : "1038947",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038947"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://core.trac.wordpress.org/changeset/41393",
"refsource" : "MISC",
"url" : "https://core.trac.wordpress.org/changeset/41393"
},
{
"name" : "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/",
"refsource" : "MISC",
"url" : "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/"
},
{
"name": "DSA-3997",
"refsource": "DEBIAN",
@ -72,10 +62,20 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100912"
},
{
"name": "https://core.trac.wordpress.org/changeset/41393",
"refsource": "MISC",
"url": "https://core.trac.wordpress.org/changeset/41393"
},
{
"name": "1039553",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039553"
},
{
"name": "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/",
"refsource": "MISC",
"url": "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://core.trac.wordpress.org/changeset/41457",
"refsource" : "MISC",
"url" : "https://core.trac.wordpress.org/changeset/41457"
},
{
"name" : "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/",
"refsource" : "MISC",
"url" : "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/"
},
{
"name" : "https://wpvulndb.com/vulnerabilities/8911",
"refsource" : "MISC",
"url" : "https://wpvulndb.com/vulnerabilities/8911"
},
{
"name": "DSA-3997",
"refsource": "DEBIAN",
@ -81,6 +66,21 @@
"name": "1039553",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039553"
},
{
"name": "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/",
"refsource": "MISC",
"url": "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/"
},
{
"name": "https://wpvulndb.com/vulnerabilities/8911",
"refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/8911"
},
{
"name": "https://core.trac.wordpress.org/changeset/41457",
"refsource": "MISC",
"url": "https://core.trac.wordpress.org/changeset/41457"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://openwall.com/lists/oss-security/2017/10/04/9",
"refsource" : "MISC",
"url" : "http://openwall.com/lists/oss-security/2017/10/04/9"
},
{
"name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0",
"refsource": "MISC",
"url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0"
},
{
"name" : "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524",
"name": "http://openwall.com/lists/oss-security/2017/10/04/9",
"refsource": "MISC",
"url" : "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524"
"url": "http://openwall.com/lists/oss-security/2017/10/04/9"
},
{
"name": "https://kanboard.net/news/version-1.0.47",
"refsource": "MISC",
"url": "https://kanboard.net/news/version-1.0.47"
},
{
"name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524",
"refsource": "MISC",
"url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://openwall.com/lists/oss-security/2017/10/04/9",
"refsource" : "MISC",
"url" : "http://openwall.com/lists/oss-security/2017/10/04/9"
},
{
"name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0",
"refsource": "MISC",
"url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0"
},
{
"name" : "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524",
"name": "http://openwall.com/lists/oss-security/2017/10/04/9",
"refsource": "MISC",
"url" : "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524"
"url": "http://openwall.com/lists/oss-security/2017/10/04/9"
},
{
"name": "https://kanboard.net/news/version-1.0.47",
"refsource": "MISC",
"url": "https://kanboard.net/news/version-1.0.47"
},
{
"name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524",
"refsource": "MISC",
"url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20171110 Advisory X41-2017-006: Multiple Vulnerabilities in PSFTPd Windows FTP Server",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/541518/100/0/threaded"
},
{
"name": "http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html"
},
{
"name": "20171110 Advisory X41-2017-006: Multiple Vulnerabilities in PSFTPd Windows FTP Server",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/541518/100/0/threaded"
},
{
"name": "https://www.x41-dsec.de/lab/advisories/x41-2017-006-psftpd/",
"refsource": "MISC",

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171113_00",
"refsource" : "CONFIRM",
"url" : "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171113_00"
},
{
"name": "101697",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101697"
},
{
"name": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171113_00",
"refsource": "CONFIRM",
"url": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171113_00"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a",
"refsource" : "CONFIRM",
"url" : "https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a"
},
{
"name" : "https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6",
"refsource" : "CONFIRM",
"url" : "https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6"
},
{
"name": "https://github.com/kkos/oniguruma/issues/55",
"refsource": "CONFIRM",
@ -72,6 +62,16 @@
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1296"
},
{
"name": "https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6",
"refsource": "CONFIRM",
"url": "https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6"
},
{
"name": "https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a",
"refsource": "CONFIRM",
"url": "https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a"
},
{
"name": "101244",
"refsource": "BID",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2017-114/",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2017-114/"
},
{
"name": "98775",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98775"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2017-114/",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2017-114/"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323",
"refsource" : "CONFIRM",
"url" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323"
},
{
"name" : "https://bugs.ghostscript.com/show_bug.cgi?id=698042",
"refsource" : "CONFIRM",
"url" : "https://bugs.ghostscript.com/show_bug.cgi?id=698042"
},
{
"name": "GLSA-201811-12",
"refsource": "GENTOO",
@ -71,6 +61,16 @@
"name": "99988",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99988"
},
{
"name": "https://bugs.ghostscript.com/show_bug.cgi?id=698042",
"refsource": "CONFIRM",
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=698042"
},
{
"name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323",
"refsource": "CONFIRM",
"url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323"
}
]
}

View File

@ -53,11 +53,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0879",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0879"
},
{
"name": "103303",
"refsource": "BID",
@ -67,6 +62,11 @@
"name": "1040507",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040507"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0879",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0879"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-02-26",
"ID": "CVE-2018-1000108",
"REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Jenkins CppNCSS Plugin",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "1.1 and older"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Jenkins project"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-79"
"value": "n/a"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-1000612",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-12-05T14:18:48.097031",
"DATE_REQUESTED": "2018-11-29T17:16:48",
"ID": "CVE-2018-1000860",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "phpipam",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "1.3.2 and earlier"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "phpipam"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "Cross Site Scripting (XSS)"
"value": "n/a"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.com/files/148383/Core-FTP-LE-2.2-Buffer-Overflow.html",
"name": "https://gist.github.com/berkgoksel/e97b3f3b15e2f8293f649d4ebe6a6fc9",
"refsource": "MISC",
"url" : "http://packetstormsecurity.com/files/148383/Core-FTP-LE-2.2-Buffer-Overflow.html"
"url": "https://gist.github.com/berkgoksel/e97b3f3b15e2f8293f649d4ebe6a6fc9"
},
{
"name": "https://gist.github.com/berkgoksel/a654c8cb661c7a27a3f763dee92016aa",
@ -63,9 +63,9 @@
"url": "https://gist.github.com/berkgoksel/a654c8cb661c7a27a3f763dee92016aa"
},
{
"name" : "https://gist.github.com/berkgoksel/e97b3f3b15e2f8293f649d4ebe6a6fc9",
"name": "http://packetstormsecurity.com/files/148383/Core-FTP-LE-2.2-Buffer-Overflow.html",
"refsource": "MISC",
"url" : "https://gist.github.com/berkgoksel/e97b3f3b15e2f8293f649d4ebe6a6fc9"
"url": "http://packetstormsecurity.com/files/148383/Core-FTP-LE-2.2-Buffer-Overflow.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@suse.de",
"ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2018-09-26T00:00:00.000Z",
"ID": "CVE-2018-12474",
"STATE": "PUBLIC",
@ -77,15 +77,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=1107507",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=1107507"
},
{
"name": "https://github.com/openSUSE/obs-service-tar_scm/pull/254",
"refsource": "CONFIRM",
"url": "https://github.com/openSUSE/obs-service-tar_scm/pull/254"
},
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1107507",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1107507"
}
]
},

View File

@ -53,15 +53,30 @@
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html"
"name": "GLSA-201811-12",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-12"
},
{
"name": "USN-3768-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3768-1/"
},
{
"name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=1497d65039885a52b598b137dd8622bd4672f9be",
"refsource": "MISC",
"url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=1497d65039885a52b598b137dd8622bd4672f9be"
},
{
"name": "DSA-4288",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4288"
},
{
"name": "[debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html"
},
{
"name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=971472c83a345a16dac9f90f91258bb22dd77f22",
"refsource": "MISC",
@ -71,21 +86,6 @@
"name": "https://seclists.org/oss-sec/2018/q3/182",
"refsource": "MISC",
"url": "https://seclists.org/oss-sec/2018/q3/182"
},
{
"name" : "DSA-4288",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4288"
},
{
"name" : "GLSA-201811-12",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201811-12"
},
{
"name" : "USN-3768-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3768-1/"
}
]
}