mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
4d78789d60
commit
81235666a4
@ -53,84 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "CLA-2004:846",
|
||||
"refsource" : "CONECTIVA",
|
||||
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-479",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2004/dsa-479"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-480",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2004/dsa-480"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-481",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2004/dsa-481"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-482",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2004/dsa-482"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-489",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2004/dsa-489"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-491",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2004/dsa-491"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-495",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2004/dsa-495"
|
||||
},
|
||||
{
|
||||
"name" : "ESA-20040428-004",
|
||||
"refsource" : "ENGARDE",
|
||||
"url" : "http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html"
|
||||
},
|
||||
{
|
||||
"name" : "FLSA:2336",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://bugzilla.fedora.us/show_bug.cgi?id=2336"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200407-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200407-02.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2004:029",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:029"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:166",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2004-166.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2005:293",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-293.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:504",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2004-504.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:505",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2004-505.html"
|
||||
"name": "O-127",
|
||||
"refsource": "CIAC",
|
||||
"url": "http://www.ciac.org/ciac/bulletins/o-127.shtml"
|
||||
},
|
||||
{
|
||||
"name": "2004-0020",
|
||||
@ -138,9 +63,74 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=108213675028441&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ"
|
||||
"name": "FLSA:2336",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336"
|
||||
},
|
||||
{
|
||||
"name": "DSA-482",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-482"
|
||||
},
|
||||
{
|
||||
"name": "DSA-495",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-495"
|
||||
},
|
||||
{
|
||||
"name": "DSA-479",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-479"
|
||||
},
|
||||
{
|
||||
"name": "linux-ext3-info-disclosure(15867)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15867"
|
||||
},
|
||||
{
|
||||
"name": "DSA-480",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-480"
|
||||
},
|
||||
{
|
||||
"name": "10152",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/10152"
|
||||
},
|
||||
{
|
||||
"name": "CLA-2004:846",
|
||||
"refsource": "CONECTIVA",
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846"
|
||||
},
|
||||
{
|
||||
"name": "DSA-489",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-489"
|
||||
},
|
||||
{
|
||||
"name": "DSA-481",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-481"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10556",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10556"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2005:293",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-293.html"
|
||||
},
|
||||
{
|
||||
"name": "ESA-20040428-004",
|
||||
"refsource": "ENGARDE",
|
||||
"url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2004:505",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-505.html"
|
||||
},
|
||||
{
|
||||
"name": "O-121",
|
||||
@ -153,24 +143,34 @@
|
||||
"url": "http://www.ciac.org/ciac/bulletins/o-126.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "O-127",
|
||||
"refsource" : "CIAC",
|
||||
"url" : "http://www.ciac.org/ciac/bulletins/o-127.shtml"
|
||||
"name": "RHSA-2004:504",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-504.html"
|
||||
},
|
||||
{
|
||||
"name" : "10152",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/10152"
|
||||
"name": "MDKSA-2004:029",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:029"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10556",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10556"
|
||||
"name": "GLSA-200407-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200407-02.xml"
|
||||
},
|
||||
{
|
||||
"name" : "linux-ext3-info-disclosure(15867)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15867"
|
||||
"name": "RHSA-2004:166",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2004-166.html"
|
||||
},
|
||||
{
|
||||
"name": "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ",
|
||||
"refsource": "MISC",
|
||||
"url": "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ"
|
||||
},
|
||||
{
|
||||
"name": "DSA-491",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-491"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040817 Gallery 1.4.4 save_photos.php PHP Insertion Proof of Concept",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0757.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=134&mode=thread&order=0&thold=0",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=134&mode=thread&order=0&thold=0"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200409-05",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200409-05.xml"
|
||||
},
|
||||
{
|
||||
"name": "10968",
|
||||
"refsource": "BID",
|
||||
@ -76,6 +61,21 @@
|
||||
"name": "gallery-savephotos-file-upload(17021)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17021"
|
||||
},
|
||||
{
|
||||
"name": "20040817 Gallery 1.4.4 save_photos.php PHP Insertion Proof of Concept",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0757.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200409-05",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200409-05.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=134&mode=thread&order=0&thold=0",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=134&mode=thread&order=0&thold=0"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040322 Vulnerabilities in News Manager Lite 2.5 & News Manager Lite administration",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=107999733503496&w=2"
|
||||
"name": "11180",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/11180"
|
||||
},
|
||||
{
|
||||
"name": "9935",
|
||||
@ -67,15 +67,15 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1009507"
|
||||
},
|
||||
{
|
||||
"name" : "11180",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/11180"
|
||||
},
|
||||
{
|
||||
"name": "news-manager-admin-access(15550)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15550"
|
||||
},
|
||||
{
|
||||
"name": "20040322 Vulnerabilities in News Manager Lite 2.5 & News Manager Lite administration",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=107999733503496&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=108057887008983&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "9997",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/9997"
|
||||
},
|
||||
{
|
||||
"name": "11236",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/11236"
|
||||
},
|
||||
{
|
||||
"name": "9997",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/9997"
|
||||
},
|
||||
{
|
||||
"name": "acart-deliverasp-billingasp-xss(15660)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,25 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6066",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6066"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.maianscriptworld.co.uk/free-php-scripts/maian-search/development/index.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.maianscriptworld.co.uk/free-php-scripts/maian-search/development/index.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.maianscriptworld.co.uk/news.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.maianscriptworld.co.uk/news.html"
|
||||
},
|
||||
{
|
||||
"name" : "30211",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30211"
|
||||
"name": "6066",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6066"
|
||||
},
|
||||
{
|
||||
"name": "31075",
|
||||
@ -82,6 +72,16 @@
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4042"
|
||||
},
|
||||
{
|
||||
"name": "http://www.maianscriptworld.co.uk/free-php-scripts/maian-search/development/index.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.maianscriptworld.co.uk/free-php-scripts/maian-search/development/index.html"
|
||||
},
|
||||
{
|
||||
"name": "30211",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30211"
|
||||
},
|
||||
{
|
||||
"name": "maiansearch-index-security-bypass(43753)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,36 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3129",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3129"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3026",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3026"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2008-09-09",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2008-09-12",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "31092",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31092"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2558",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2558"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2525",
|
||||
"refsource": "VUPEN",
|
||||
@ -93,14 +63,44 @@
|
||||
"url": "http://www.securitytracker.com/id?1020846"
|
||||
},
|
||||
{
|
||||
"name" : "31900",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31900"
|
||||
"name": "http://support.apple.com/kb/HT3026",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3026"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3129",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3129"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2008-09-12",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "31823",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31823"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2558",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2558"
|
||||
},
|
||||
{
|
||||
"name": "31900",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31900"
|
||||
},
|
||||
{
|
||||
"name": "31092",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31092"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2008-09-09",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,31 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6293",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6293"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20080824 Re: CVE id request: vlc",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/08/24/3"
|
||||
},
|
||||
{
|
||||
"name" : "[vlc-devel] 20080824 commit: MMS integers handling fixes, including buffer overflow ( Rémi Denis-Courmont )",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048488.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.orange-bat.com/adv/2008/adv.08.24.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.orange-bat.com/adv/2008/adv.08.24.txt"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200809-06",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200809-06.xml"
|
||||
},
|
||||
{
|
||||
"name": "30806",
|
||||
"refsource": "BID",
|
||||
@ -87,6 +67,21 @@
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14531"
|
||||
},
|
||||
{
|
||||
"name": "[vlc-devel] 20080824 commit: MMS integers handling fixes, including buffer overflow ( R\u00e9mi Denis-Courmont )",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048488.html"
|
||||
},
|
||||
{
|
||||
"name": "6293",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6293"
|
||||
},
|
||||
{
|
||||
"name": "vlcmediaplayer-memmove-bo(44659)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44659"
|
||||
},
|
||||
{
|
||||
"name": "1020759",
|
||||
"refsource": "SECTRACK",
|
||||
@ -98,9 +93,14 @@
|
||||
"url": "http://securityreason.com/securityalert/4190"
|
||||
},
|
||||
{
|
||||
"name" : "vlcmediaplayer-memmove-bo(44659)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44659"
|
||||
"name": "[oss-security] 20080824 Re: CVE id request: vlc",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/08/24/3"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200809-06",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200809-06.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,74 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://blogs.zdnet.com/security/?p=1733",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blogs.zdnet.com/security/?p=1733"
|
||||
},
|
||||
{
|
||||
"name" : "http://blogs.zdnet.com/security/?p=1759",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blogs.zdnet.com/security/?p=1759"
|
||||
},
|
||||
{
|
||||
"name" : "http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html",
|
||||
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html"
|
||||
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid="
|
||||
},
|
||||
{
|
||||
"name" : "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html"
|
||||
"name": "33390",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33390"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb08-18.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb08-18.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=",
|
||||
"name": "32702",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32702"
|
||||
},
|
||||
{
|
||||
"name": "adobe-flash-setclipboard-hijacking(44584)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44584"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid="
|
||||
"url": "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200903-23",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200903-23.xml"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0945",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0945.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0980",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0980.html"
|
||||
},
|
||||
{
|
||||
"name" : "248586",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2008:025",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "31117",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31117"
|
||||
"name": "http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blogs.adobe.com/psirt/2008/08/clipboard_attack.html"
|
||||
},
|
||||
{
|
||||
"name": "34226",
|
||||
@ -132,35 +102,65 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2838"
|
||||
},
|
||||
{
|
||||
"name": "http://blogs.zdnet.com/security/?p=1733",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blogs.zdnet.com/security/?p=1733"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200903-23",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200903-23.xml"
|
||||
},
|
||||
{
|
||||
"name": "1020724",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1020724"
|
||||
},
|
||||
{
|
||||
"name" : "32448",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32448"
|
||||
},
|
||||
{
|
||||
"name": "32759",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32759"
|
||||
},
|
||||
{
|
||||
"name" : "32702",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32702"
|
||||
"name": "RHSA-2008:0945",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0945.html"
|
||||
},
|
||||
{
|
||||
"name" : "33390",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33390"
|
||||
"name": "RHSA-2008:0980",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html"
|
||||
},
|
||||
{
|
||||
"name" : "adobe-flash-setclipboard-hijacking(44584)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44584"
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"
|
||||
},
|
||||
{
|
||||
"name": "31117",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31117"
|
||||
},
|
||||
{
|
||||
"name": "248586",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"
|
||||
},
|
||||
{
|
||||
"name": "32448",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32448"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2008:025",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "http://blogs.zdnet.com/security/?p=1759",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blogs.zdnet.com/security/?p=1759"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6946",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6946"
|
||||
},
|
||||
{
|
||||
"name": "6947",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6947"
|
||||
},
|
||||
{
|
||||
"name" : "6951",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6951"
|
||||
"name": "ADV-2008-2993",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2993"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2992",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2992"
|
||||
},
|
||||
{
|
||||
"name": "downlinegoldmine-tr-sql-injection(45128)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45128"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt"
|
||||
},
|
||||
{
|
||||
"name": "31169",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31169"
|
||||
},
|
||||
{
|
||||
"name": "6950",
|
||||
@ -78,49 +93,34 @@
|
||||
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/categoryaddon-sql.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt"
|
||||
},
|
||||
{
|
||||
"name" : "31169",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31169"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2992",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2992"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2994",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2994"
|
||||
"name": "6951",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6951"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2995",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2995"
|
||||
},
|
||||
{
|
||||
"name": "6946",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6946"
|
||||
},
|
||||
{
|
||||
"name": "31812",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31812"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2993",
|
||||
"name": "ADV-2008-2994",
|
||||
"refsource": "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2993"
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2994"
|
||||
},
|
||||
{
|
||||
"name" : "downlinegoldmine-tr-sql-injection(45128)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45128"
|
||||
"name": "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[dailydave] 20081002 TCP Resource Exhaustion DoS Attack Speculation",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.robertlee.name/2008/10/conjecture-speculation.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.robertlee.name/2008/10/conjecture-speculation.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMI02473",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=125856010926699&w=2"
|
||||
},
|
||||
{
|
||||
"name": "[dailydave] 20081002 TCP Resource Exhaustion DoS Attack Speculation",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html"
|
||||
},
|
||||
{
|
||||
"name": "http://insecure.org/stf/tcp-dos-attack-explained.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://insecure.org/stf/tcp-dos-attack-explained.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked",
|
||||
"name": "http://www.outpost24.com/news/news-2008-10-02.html",
|
||||
"refsource": "MISC",
|
||||
"url" : "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked"
|
||||
"url": "http://www.outpost24.com/news/news-2008-10-02.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf",
|
||||
@ -78,14 +88,14 @@
|
||||
"url": "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.outpost24.com/news/news-2008-10-02.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.outpost24.com/news/news-2008-10-02.html"
|
||||
"name": "20090908 TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html"
|
||||
"name": "TA09-251A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-251A.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
|
||||
@ -98,19 +108,19 @@
|
||||
"url": "http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html"
|
||||
},
|
||||
{
|
||||
"name" : "20090908 TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml"
|
||||
"name": "MS09-048",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMI02473",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=125856010926699&w=2"
|
||||
"name": "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked",
|
||||
"refsource": "MISC",
|
||||
"url": "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT080138",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=125856010926699&w=2"
|
||||
"name": "oval:org.mitre.oval:def:6340",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:150",
|
||||
@ -118,19 +128,9 @@
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||
},
|
||||
{
|
||||
"name" : "MS09-048",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048"
|
||||
},
|
||||
{
|
||||
"name" : "TA09-251A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-251A.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:6340",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340"
|
||||
"name": "SSRT080138",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=125856010926699&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6631"
|
||||
},
|
||||
{
|
||||
"name" : "6634",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6634"
|
||||
},
|
||||
{
|
||||
"name": "31489",
|
||||
"refsource": "BID",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "sgrealestateportal-index-sql-injection(45568)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45568"
|
||||
},
|
||||
{
|
||||
"name": "6634",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6634"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081030 harlandscripts Mypage.php Sql Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/497946"
|
||||
},
|
||||
{
|
||||
"name" : "6874",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6874"
|
||||
},
|
||||
{
|
||||
"name": "31986",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31986"
|
||||
},
|
||||
{
|
||||
"name" : "32467",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32467"
|
||||
"name": "protrafficone-mypage-sql-injection(46207)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46207"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2964",
|
||||
@ -78,9 +68,19 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2964"
|
||||
},
|
||||
{
|
||||
"name" : "protrafficone-mypage-sql-injection(46207)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46207"
|
||||
"name": "32467",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32467"
|
||||
},
|
||||
{
|
||||
"name": "6874",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6874"
|
||||
},
|
||||
{
|
||||
"name": "20081030 harlandscripts Mypage.php Sql Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/497946"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ezbizpro-track-sql-injection(46280)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46280"
|
||||
},
|
||||
{
|
||||
"name": "6910",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "32552",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32552"
|
||||
},
|
||||
{
|
||||
"name" : "ezbizpro-track-sql-injection(46280)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46280"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.securityfocus.com/bid/30116/exploit",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.securityfocus.com/bid/30116/exploit"
|
||||
},
|
||||
{
|
||||
"name": "30116",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30116"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securityfocus.com/bid/30116/exploit",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securityfocus.com/bid/30116/exploit"
|
||||
},
|
||||
{
|
||||
"name": "zoph-login-sql-injection(43693)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7406",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7406"
|
||||
},
|
||||
{
|
||||
"name" : "http://ez.no/developer/security/security_advisories/ez_publish_4_0/ezsa_2008_003_insufficient_form_handling_made_privilege_escalation_possible",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://ez.no/developer/security/security_advisories/ez_publish_4_0/ezsa_2008_003_insufficient_form_handling_made_privilege_escalation_possible"
|
||||
},
|
||||
{
|
||||
"name" : "32762",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/32762"
|
||||
"name": "ezpublish-registration-privilege-escalation(47216)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47216"
|
||||
},
|
||||
{
|
||||
"name": "52708",
|
||||
@ -73,9 +63,19 @@
|
||||
"url": "http://www.osvdb.org/52708"
|
||||
},
|
||||
{
|
||||
"name" : "ezpublish-registration-privilege-escalation(47216)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47216"
|
||||
"name": "32762",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32762"
|
||||
},
|
||||
{
|
||||
"name": "http://ez.no/developer/security/security_advisories/ez_publish_4_0/ezsa_2008_003_insufficient_form_handling_made_privilege_escalation_possible",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://ez.no/developer/security/security_advisories/ez_publish_4_0/ezsa_2008_003_insufficient_form_handling_made_privilege_escalation_possible"
|
||||
},
|
||||
{
|
||||
"name": "7406",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7406"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-2023",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,19 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20130421 Vulnerabilities in jPlayer",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2013/Apr/192"
|
||||
"name": "https://github.com/happyworm/jPlayer/commit/8ccc429598d62eebe9f65a0a4e6fd406a123c8b4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/happyworm/jPlayer/commit/8ccc429598d62eebe9f65a0a4e6fd406a123c8b4"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20130411 CVE-2013-1942 jPlayer 2.2.19 XSS",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=136570964825921&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20130429 Re: CVE-2013-1942 jPlayer 2.2.19 XSS",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://marc.info/?l=oss-security&m=136726705917858&w=2"
|
||||
"name": "https://github.com/happyworm/jPlayer/commit/c2417972af1295be8dcc07470b0e3d25b0a77e0b",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/happyworm/jPlayer/commit/c2417972af1295be8dcc07470b0e3d25b0a77e0b"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130505 Re: CVE-2013-1942 jPlayer 2.2.19 XSS",
|
||||
@ -78,9 +73,14 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/06/27/7"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20130704 Re: Re: CVE-2013-1942 jPlayer 2.2.19 XSS",
|
||||
"name": "https://github.com/happyworm/jPlayer/issues/162",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/happyworm/jPlayer/issues/162"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130411 CVE-2013-1942 jPlayer 2.2.19 XSS",
|
||||
"refsource": "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/07/04/5"
|
||||
"url": "http://marc.info/?l=oss-security&m=136570964825921&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.jplayer.org/latest/release-notes/",
|
||||
@ -88,19 +88,19 @@
|
||||
"url": "http://www.jplayer.org/latest/release-notes/"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/happyworm/jPlayer/commit/8ccc429598d62eebe9f65a0a4e6fd406a123c8b4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/happyworm/jPlayer/commit/8ccc429598d62eebe9f65a0a4e6fd406a123c8b4"
|
||||
"name": "[oss-security] 20130704 Re: Re: CVE-2013-1942 jPlayer 2.2.19 XSS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/07/04/5"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/happyworm/jPlayer/commit/c2417972af1295be8dcc07470b0e3d25b0a77e0b",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/happyworm/jPlayer/commit/c2417972af1295be8dcc07470b0e3d25b0a77e0b"
|
||||
"name": "20130421 Vulnerabilities in jPlayer",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2013/Apr/192"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/happyworm/jPlayer/issues/162",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/happyworm/jPlayer/issues/162"
|
||||
"name": "[oss-security] 20130429 Re: CVE-2013-1942 jPlayer 2.2.19 XSS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://marc.info/?l=oss-security&m=136726705917858&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2013-2696",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6508",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -58,9 +58,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
"name": "1038947",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038947"
|
||||
},
|
||||
{
|
||||
"name": "99677",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/99677"
|
||||
},
|
||||
{
|
||||
"name" : "1038947",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038947"
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://core.trac.wordpress.org/changeset/41393",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://core.trac.wordpress.org/changeset/41393"
|
||||
},
|
||||
{
|
||||
"name" : "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3997",
|
||||
"refsource": "DEBIAN",
|
||||
@ -72,10 +62,20 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/100912"
|
||||
},
|
||||
{
|
||||
"name": "https://core.trac.wordpress.org/changeset/41393",
|
||||
"refsource": "MISC",
|
||||
"url": "https://core.trac.wordpress.org/changeset/41393"
|
||||
},
|
||||
{
|
||||
"name": "1039553",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039553"
|
||||
},
|
||||
{
|
||||
"name": "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://core.trac.wordpress.org/changeset/41457",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://core.trac.wordpress.org/changeset/41457"
|
||||
},
|
||||
{
|
||||
"name" : "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/"
|
||||
},
|
||||
{
|
||||
"name" : "https://wpvulndb.com/vulnerabilities/8911",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://wpvulndb.com/vulnerabilities/8911"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3997",
|
||||
"refsource": "DEBIAN",
|
||||
@ -81,6 +66,21 @@
|
||||
"name": "1039553",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039553"
|
||||
},
|
||||
{
|
||||
"name": "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/"
|
||||
},
|
||||
{
|
||||
"name": "https://wpvulndb.com/vulnerabilities/8911",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpvulndb.com/vulnerabilities/8911"
|
||||
},
|
||||
{
|
||||
"name": "https://core.trac.wordpress.org/changeset/41457",
|
||||
"refsource": "MISC",
|
||||
"url": "https://core.trac.wordpress.org/changeset/41457"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://openwall.com/lists/oss-security/2017/10/04/9",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://openwall.com/lists/oss-security/2017/10/04/9"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524",
|
||||
"name": "http://openwall.com/lists/oss-security/2017/10/04/9",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524"
|
||||
"url": "http://openwall.com/lists/oss-security/2017/10/04/9"
|
||||
},
|
||||
{
|
||||
"name": "https://kanboard.net/news/version-1.0.47",
|
||||
"refsource": "MISC",
|
||||
"url": "https://kanboard.net/news/version-1.0.47"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://openwall.com/lists/oss-security/2017/10/04/9",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://openwall.com/lists/oss-security/2017/10/04/9"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524",
|
||||
"name": "http://openwall.com/lists/oss-security/2017/10/04/9",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524"
|
||||
"url": "http://openwall.com/lists/oss-security/2017/10/04/9"
|
||||
},
|
||||
{
|
||||
"name": "https://kanboard.net/news/version-1.0.47",
|
||||
"refsource": "MISC",
|
||||
"url": "https://kanboard.net/news/version-1.0.47"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20171110 Advisory X41-2017-006: Multiple Vulnerabilities in PSFTPd Windows FTP Server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/541518/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html"
|
||||
},
|
||||
{
|
||||
"name": "20171110 Advisory X41-2017-006: Multiple Vulnerabilities in PSFTPd Windows FTP Server",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/541518/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://www.x41-dsec.de/lab/advisories/x41-2017-006-psftpd/",
|
||||
"refsource": "MISC",
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171113_00",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171113_00"
|
||||
},
|
||||
{
|
||||
"name": "101697",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101697"
|
||||
},
|
||||
{
|
||||
"name": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171113_00",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171113_00"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/kkos/oniguruma/issues/55",
|
||||
"refsource": "CONFIRM",
|
||||
@ -72,6 +62,16 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:1296"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a"
|
||||
},
|
||||
{
|
||||
"name": "101244",
|
||||
"refsource": "BID",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2017-114/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2017-114/"
|
||||
},
|
||||
{
|
||||
"name": "98775",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/98775"
|
||||
},
|
||||
{
|
||||
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2017-114/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2017-114/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.ghostscript.com/show_bug.cgi?id=698042",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.ghostscript.com/show_bug.cgi?id=698042"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201811-12",
|
||||
"refsource": "GENTOO",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "99988",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99988"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.ghostscript.com/show_bug.cgi?id=698042",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=698042"
|
||||
},
|
||||
{
|
||||
"name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c53183d4e7103e87368b7cfa15367a47d559e323"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,11 +53,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0879",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0879"
|
||||
},
|
||||
{
|
||||
"name": "103303",
|
||||
"refsource": "BID",
|
||||
@ -67,6 +62,11 @@
|
||||
"name": "1040507",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040507"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0879",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0879"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-02-26",
|
||||
"ID": "CVE-2018-1000108",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins CppNCSS Plugin",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.1 and older"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins project"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-79"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-1000612",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-12-05T14:18:48.097031",
|
||||
"DATE_REQUESTED": "2018-11-29T17:16:48",
|
||||
"ID": "CVE-2018-1000860",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "phpipam",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.3.2 and earlier"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "phpipam"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Cross Site Scripting (XSS)"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/148383/Core-FTP-LE-2.2-Buffer-Overflow.html",
|
||||
"name": "https://gist.github.com/berkgoksel/e97b3f3b15e2f8293f649d4ebe6a6fc9",
|
||||
"refsource": "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/148383/Core-FTP-LE-2.2-Buffer-Overflow.html"
|
||||
"url": "https://gist.github.com/berkgoksel/e97b3f3b15e2f8293f649d4ebe6a6fc9"
|
||||
},
|
||||
{
|
||||
"name": "https://gist.github.com/berkgoksel/a654c8cb661c7a27a3f763dee92016aa",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "https://gist.github.com/berkgoksel/a654c8cb661c7a27a3f763dee92016aa"
|
||||
},
|
||||
{
|
||||
"name" : "https://gist.github.com/berkgoksel/e97b3f3b15e2f8293f649d4ebe6a6fc9",
|
||||
"name": "http://packetstormsecurity.com/files/148383/Core-FTP-LE-2.2-Buffer-Overflow.html",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://gist.github.com/berkgoksel/e97b3f3b15e2f8293f649d4ebe6a6fc9"
|
||||
"url": "http://packetstormsecurity.com/files/148383/Core-FTP-LE-2.2-Buffer-Overflow.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@suse.de",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"DATE_PUBLIC": "2018-09-26T00:00:00.000Z",
|
||||
"ID": "CVE-2018-12474",
|
||||
"STATE": "PUBLIC",
|
||||
@ -77,15 +77,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=1107507",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=1107507"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/openSUSE/obs-service-tar_scm/pull/254",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/openSUSE/obs-service-tar_scm/pull/254"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1107507",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1107507"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -53,15 +53,30 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html"
|
||||
"name": "GLSA-201811-12",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201811-12"
|
||||
},
|
||||
{
|
||||
"name": "USN-3768-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3768-1/"
|
||||
},
|
||||
{
|
||||
"name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=1497d65039885a52b598b137dd8622bd4672f9be",
|
||||
"refsource": "MISC",
|
||||
"url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=1497d65039885a52b598b137dd8622bd4672f9be"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4288",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4288"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html"
|
||||
},
|
||||
{
|
||||
"name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=971472c83a345a16dac9f90f91258bb22dd77f22",
|
||||
"refsource": "MISC",
|
||||
@ -71,21 +86,6 @@
|
||||
"name": "https://seclists.org/oss-sec/2018/q3/182",
|
||||
"refsource": "MISC",
|
||||
"url": "https://seclists.org/oss-sec/2018/q3/182"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4288",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4288"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201811-12",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201811-12"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3768-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3768-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user