"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:53:58 +00:00
parent cad60ca9a1
commit 81bedd82e4
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 3734 additions and 3734 deletions

View File

@ -53,49 +53,49 @@
"references": {
"reference_data": [
{
"name" : "20030805 Local ZoneAlarm Firewall (probably all versions - tested on v3.1)",
"refsource" : "VULNWATCH",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0070.html"
},
{
"name" : "http://sec-labs.hack.pl/advisories/seclabs-adv-zone-alarm-04-08-2003.txt",
"refsource" : "MISC",
"url" : "http://sec-labs.hack.pl/advisories/seclabs-adv-zone-alarm-04-08-2003.txt"
},
{
"name" : "http://sec-labs.hack.pl/papers/win32ddc.php",
"refsource" : "MISC",
"url" : "http://sec-labs.hack.pl/papers/win32ddc.php"
},
{
"name" : "http://download.zonelabs.com/bin/free/information/znalm/zaReleaseHistory.html",
"refsource" : "CONFIRM",
"url" : "http://download.zonelabs.com/bin/free/information/znalm/zaReleaseHistory.html"
"name": "4362",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4362"
},
{
"name": "8342",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/8342"
},
{
"name": "device-driver-gain-privileges(12824)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12824"
},
{
"name": "http://download.zonelabs.com/bin/free/information/znalm/zaReleaseHistory.html",
"refsource": "CONFIRM",
"url": "http://download.zonelabs.com/bin/free/information/znalm/zaReleaseHistory.html"
},
{
"name": "http://sec-labs.hack.pl/papers/win32ddc.php",
"refsource": "MISC",
"url": "http://sec-labs.hack.pl/papers/win32ddc.php"
},
{
"name": "http://sec-labs.hack.pl/advisories/seclabs-adv-zone-alarm-04-08-2003.txt",
"refsource": "MISC",
"url": "http://sec-labs.hack.pl/advisories/seclabs-adv-zone-alarm-04-08-2003.txt"
},
{
"name": "2375",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/2375"
},
{
"name" : "4362",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/4362"
},
{
"name": "9459",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/9459"
},
{
"name" : "device-driver-gain-privileges(12824)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/12824"
"name": "20030805 Local ZoneAlarm Firewall (probably all versions - tested on v3.1)",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0070.html"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "7879",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/7879"
},
{
"name": "20030115 Directory traversal vulnerabilities found in NITE ftp-server version 1.83",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0022.html"
},
{
"name" : "6648",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/6648"
},
{
"name": "1005923",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1005923"
},
{
"name" : "7879",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/7879"
},
{
"name": "niteserver-dotdot-directory-traversal(11062)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11062"
},
{
"name": "6648",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6648"
}
]
}

View File

@ -52,31 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20040211 Mutt-1.4.2 fixes buffer overflow.",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107651677817933&w=2"
},
{
"name" : "CSSA-2004-013.0",
"refsource" : "CALDERA",
"url" : "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-013.0.txt"
},
{
"name" : "RHSA-2004:050",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-050.html"
},
{
"name" : "RHSA-2004:051",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-051.html"
},
{
"name" : "MDKSA-2004:010",
"refsource" : "MANDRAKE",
"url" : "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:010"
},
{
"name": "SSA:2004-043",
"refsource": "SLACKWARE",
@ -93,34 +68,59 @@
"url": "http://marc.info/?l=bugtraq&m=107696262905039&w=2"
},
{
"name" : "20040309 [OpenPKG-SA-2004.005] OpenPKG Security Advisory (mutt)",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107884956930903&w=2"
},
{
"name" : "mutt-index-menu-bo(15134)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15134"
},
{
"name" : "9641",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/9641"
},
{
"name" : "3918",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/3918"
"name": "RHSA-2004:051",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-051.html"
},
{
"name": "oval:org.mitre.oval:def:811",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A811"
},
{
"name": "mutt-index-menu-bo(15134)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15134"
},
{
"name": "oval:org.mitre.oval:def:838",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A838"
},
{
"name": "9641",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9641"
},
{
"name": "20040211 Mutt-1.4.2 fixes buffer overflow.",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107651677817933&w=2"
},
{
"name": "RHSA-2004:050",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-050.html"
},
{
"name": "20040309 [OpenPKG-SA-2004.005] OpenPKG Security Advisory (mutt)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107884956930903&w=2"
},
{
"name": "3918",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/3918"
},
{
"name": "MDKSA-2004:010",
"refsource": "MANDRAKE",
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:010"
},
{
"name": "CSSA-2004-013.0",
"refsource": "CALDERA",
"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-013.0.txt"
}
]
}

View File

@ -53,119 +53,29 @@
"references": {
"reference_data": [
{
"name" : "20040323 Advisory 03/2004: Multiple (13) Ethereal remote overflows",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=108007072215742&w=2"
},
{
"name" : "http://security.e-matters.de/advisories/032004.html",
"refsource" : "MISC",
"url" : "http://security.e-matters.de/advisories/032004.html"
},
{
"name" : "http://www.ethereal.com/appnotes/enpa-sa-00013.html",
"refsource" : "CONFIRM",
"url" : "http://www.ethereal.com/appnotes/enpa-sa-00013.html"
},
{
"name" : "DSA-511",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-511"
},
{
"name" : "20040329 LNSA-#2004-0007: Multiple security problems in Ethereal",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=108058005324316&w=2"
"name": "VU#659140",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/659140"
},
{
"name": "GLSA-200403-07",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200403-07.xml"
},
{
"name" : "RHSA-2004:136",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-136.html"
},
{
"name": "RHSA-2004:137",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-137.html"
},
{
"name" : "CLA-2004:835",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835"
"name": "DSA-511",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-511"
},
{
"name" : "MDKSA-2004:024",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:024"
},
{
"name" : "20040416 [OpenPKG-SA-2004.015] OpenPKG Security Advisory (ethereal)",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=108213710306260&w=2"
},
{
"name" : "VU#119876",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/119876"
},
{
"name" : "VU#125156",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/125156"
},
{
"name" : "VU#433596",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/433596"
},
{
"name" : "VU#591820",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/591820"
},
{
"name" : "VU#644886",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/644886"
},
{
"name" : "VU#659140",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/659140"
},
{
"name" : "VU#740188",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/740188"
},
{
"name" : "VU#864884",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/864884"
},
{
"name" : "VU#931588",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/931588"
},
{
"name" : "6893",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/6893"
},
{
"name" : "oval:org.mitre.oval:def:878",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A878"
},
{
"name" : "oval:org.mitre.oval:def:887",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A887"
"name": "RHSA-2004:136",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-136.html"
},
{
"name": "oval:org.mitre.oval:def:10187",
@ -177,10 +87,100 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11185"
},
{
"name": "20040329 LNSA-#2004-0007: Multiple security problems in Ethereal",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108058005324316&w=2"
},
{
"name": "http://security.e-matters.de/advisories/032004.html",
"refsource": "MISC",
"url": "http://security.e-matters.de/advisories/032004.html"
},
{
"name": "6893",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/6893"
},
{
"name": "CLA-2004:835",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835"
},
{
"name": "20040323 Advisory 03/2004: Multiple (13) Ethereal remote overflows",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108007072215742&w=2"
},
{
"name": "VU#864884",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/864884"
},
{
"name": "oval:org.mitre.oval:def:887",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A887"
},
{
"name": "VU#119876",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/119876"
},
{
"name": "VU#433596",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/433596"
},
{
"name": "VU#591820",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/591820"
},
{
"name": "http://www.ethereal.com/appnotes/enpa-sa-00013.html",
"refsource": "CONFIRM",
"url": "http://www.ethereal.com/appnotes/enpa-sa-00013.html"
},
{
"name": "VU#644886",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/644886"
},
{
"name": "ethereal-multiple-dissectors-bo(15569)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15569"
},
{
"name": "VU#740188",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/740188"
},
{
"name": "VU#125156",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/125156"
},
{
"name": "20040416 [OpenPKG-SA-2004.015] OpenPKG Security Advisory (ethereal)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108213710306260&w=2"
},
{
"name": "VU#931588",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/931588"
},
{
"name": "oval:org.mitre.oval:def:878",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A878"
},
{
"name": "MDKSA-2004:024",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:024"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1011329",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1011329"
},
{
"name": "20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities",
"refsource": "BUGTRAQ",
@ -62,11 +67,6 @@
"refsource": "MISC",
"url": "http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt"
},
{
"name" : "1011329",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1011329"
},
{
"name": "web-browser-cookie-session-hijack(17417)",
"refsource": "XF",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en",
"refsource": "MISC",
"url": "http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en"
},
{
"name": "http://www.corsaire.com/advisories/c040817-003.txt",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "http://www.mitel.com/DocController?documentId=14223",
"refsource": "CONFIRM",
"url": "http://www.mitel.com/DocController?documentId=14223"
},
{
"name" : "http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en",
"refsource" : "MISC",
"url" : "http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "13108",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13108/"
},
{
"name": "gentoolkit-symlink(17968)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17968"
},
{
"name": "11617",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11617"
},
{
"name": "GLSA-200411-13",
"refsource": "GENTOO",
@ -61,21 +76,6 @@
"name": "http://bugs.gentoo.org/show_bug.cgi?id=68846",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=68846"
},
{
"name" : "13108",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/13108/"
},
{
"name" : "11617",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/11617"
},
{
"name" : "gentoolkit-symlink(17968)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17968"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://tigger.uic.edu/~jlongs2/holes/abc2mtex.txt",
"refsource" : "MISC",
"url" : "http://tigger.uic.edu/~jlongs2/holes/abc2mtex.txt"
},
{
"name": "abc2mtex-processabc-bo(18578)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18578"
},
{
"name": "http://tigger.uic.edu/~jlongs2/holes/abc2mtex.txt",
"refsource": "MISC",
"url": "http://tigger.uic.edu/~jlongs2/holes/abc2mtex.txt"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "11383",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/11383"
},
{
"name": "57669",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57669-1"
},
{
"name" : "101589",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101589-1"
},
{
"name": "11593",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11593"
},
{
"name" : "11383",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/11383"
},
{
"name" : "13072",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/13072"
"name": "101589",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101589-1"
},
{
"name": "sun-java-web-application-dos(17941)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17941"
},
{
"name": "13072",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13072"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20040829 CuteNews News.txt writable to world",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2004-08/0396.html"
"name": "1011099",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1011099"
},
{
"name": "9385",
@ -63,9 +63,9 @@
"url": "http://www.osvdb.org/9385"
},
{
"name" : "1011099",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1011099"
"name": "20040829 CuteNews News.txt writable to world",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-08/0396.html"
},
{
"name": "cutenews-newstxt-world-writable(17161)",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "29163",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29163"
},
{
"name": "30178",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30178"
},
{
"name": "29163",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29163"
},
{
"name": "fusebox-fusebox5-file-include(42389)",
"refsource": "XF",

View File

@ -52,26 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "236481",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236481-1"
},
{
"name" : "29355",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29355"
},
{
"name": "ADV-2008-1649",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1649/references"
},
{
"name" : "1020110",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020110"
},
{
"name": "30381",
"refsource": "SECUNIA",
@ -81,6 +66,21 @@
"name": "javasystem-advancedsearch-xss(42624)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42624"
},
{
"name": "29355",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29355"
},
{
"name": "236481",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236481-1"
},
{
"name": "1020110",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020110"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-2936",
"STATE": "PUBLIC"
},
@ -53,34 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20080814 Postfix local privilege escalation via hardlinked symlinks",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495474/100/0/threaded"
},
{
"name" : "20080831 PoCfix (PoC for Postfix local root vuln - CVE-2008-2936)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495882/100/0/threaded"
},
{
"name" : "20080821 rPSA-2008-0259-1 postfix",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495632/100/0/threaded"
},
{
"name" : "6337",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6337"
},
{
"name" : "[postfix-announce] 20080814 Postfix local privilege escalation via hardlinked symlinks",
"refsource" : "MLIST",
"url" : "http://article.gmane.org/gmane.mail.postfix.announce/110"
},
{
"name" : "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY",
"refsource" : "CONFIRM",
"url" : "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY"
"name": "FEDORA-2008-8595",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
},
{
"name": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.3.15.HISTORY",
@ -88,99 +63,9 @@
"url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.3.15.HISTORY"
},
{
"name" : "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY",
"refsource" : "CONFIRM",
"url" : "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY"
},
{
"name" : "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY",
"refsource" : "CONFIRM",
"url" : "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY"
},
{
"name" : "http://wiki.rpath.com/Advisories:rPSA-2008-0259",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/Advisories:rPSA-2008-0259"
},
{
"name" : "https://issues.rpath.com/browse/RPL-2689",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-2689"
},
{
"name" : "DSA-1629",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1629"
},
{
"name" : "FEDORA-2008-8593",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
},
{
"name" : "FEDORA-2008-8595",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
},
{
"name" : "GLSA-200808-12",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200808-12.xml"
},
{
"name" : "MDVSA-2008:171",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:171"
},
{
"name" : "RHSA-2008:0839",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0839.html"
},
{
"name" : "SUSE-SA:2008:040",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html"
},
{
"name" : "USN-636-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/636-1/"
},
{
"name" : "VU#938323",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/938323"
},
{
"name" : "30691",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30691"
},
{
"name" : "oval:org.mitre.oval:def:10033",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10033"
},
{
"name" : "ADV-2008-2385",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2385"
},
{
"name" : "1020700",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020700"
},
{
"name" : "31485",
"name": "32231",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/31485"
},
{
"name" : "31500",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31500"
"url": "http://secunia.com/advisories/32231"
},
{
"name": "31469",
@ -188,9 +73,14 @@
"url": "http://secunia.com/advisories/31469"
},
{
"name" : "31477",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31477"
"name": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY",
"refsource": "CONFIRM",
"url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY"
},
{
"name": "DSA-1629",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1629"
},
{
"name": "31530",
@ -198,24 +88,134 @@
"url": "http://secunia.com/advisories/31530"
},
{
"name" : "31474",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31474"
"name": "FEDORA-2008-8593",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
},
{
"name" : "32231",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32231"
"name": "https://issues.rpath.com/browse/RPL-2689",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2689"
},
{
"name": "1020700",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020700"
},
{
"name": "20080821 rPSA-2008-0259-1 postfix",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495632/100/0/threaded"
},
{
"name": "VU#938323",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/938323"
},
{
"name": "[postfix-announce] 20080814 Postfix local privilege escalation via hardlinked symlinks",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.mail.postfix.announce/110"
},
{
"name": "4160",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4160"
},
{
"name": "30691",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30691"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0259",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0259"
},
{
"name": "SUSE-SA:2008:040",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html"
},
{
"name": "31474",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31474"
},
{
"name": "20080831 PoCfix (PoC for Postfix local root vuln - CVE-2008-2936)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495882/100/0/threaded"
},
{
"name": "postfix-symlink-code-execution(44460)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44460"
},
{
"name": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY",
"refsource": "CONFIRM",
"url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY"
},
{
"name": "6337",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6337"
},
{
"name": "RHSA-2008:0839",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0839.html"
},
{
"name": "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY",
"refsource": "CONFIRM",
"url": "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY"
},
{
"name": "31500",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31500"
},
{
"name": "oval:org.mitre.oval:def:10033",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10033"
},
{
"name": "31477",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31477"
},
{
"name": "31485",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31485"
},
{
"name": "USN-636-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/636-1/"
},
{
"name": "MDVSA-2008:171",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:171"
},
{
"name": "20080814 Postfix local privilege escalation via hardlinked symlinks",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495474/100/0/threaded"
},
{
"name": "ADV-2008-2385",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2385"
},
{
"name": "GLSA-200808-12",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200808-12.xml"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5883"
},
{
"name" : "29859",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29859"
},
{
"name": "31123",
"refsource": "SECUNIA",
@ -71,6 +66,11 @@
"name": "kblance-index-sql-injection(43272)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43272"
},
{
"name": "29859",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29859"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/cineon.c",
"name": "http://sourceforge.net/project/shownotes.php?release_id=604837",
"refsource": "CONFIRM",
"url" : "http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/cineon.c"
"url": "http://sourceforge.net/project/shownotes.php?release_id=604837"
},
{
"name": "http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/xcf.c",
@ -63,19 +63,9 @@
"url": "http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/xcf.c"
},
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=604785",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=604785"
},
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=604837",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=604837"
},
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485"
"name": "30549",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30549"
},
{
"name": "29583",
@ -83,9 +73,19 @@
"url": "http://www.securityfocus.com/bid/29583"
},
{
"name" : "30549",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30549"
"name": "http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485"
},
{
"name": "http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/cineon.c",
"refsource": "CONFIRM",
"url": "http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/cineon.c"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=604785",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=604785"
}
]
}

View File

@ -52,11 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "32087",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32087"
},
{
"name": "wikyblog-index-xss(45603)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45603"
},
{
"name": "http://sourceforge.net/project/shownotes.php?group_id=148518&release_id=647444",
"refsource": "MISC",
"url": "http://sourceforge.net/project/shownotes.php?group_id=148518&release_id=647444"
},
{
"name": "48790",
"refsource": "OSVDB",
"url": "http://osvdb.org/48790"
},
{
"name": "http://www.digitrustgroup.com/advisories/web-application-security-wikyblog.html",
"refsource": "MISC",
@ -66,21 +81,6 @@
"name": "31525",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31525"
},
{
"name" : "48790",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/48790"
},
{
"name" : "32087",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32087"
},
{
"name" : "wikyblog-index-xss(45603)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45603"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "33357",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33357"
},
{
"name": "7610",
"refsource": "EXPLOIT-DB",
@ -62,11 +67,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33040"
},
{
"name" : "33357",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33357"
},
{
"name": "lawyerportal-deptdisplay-sql-injection(47621)",
"refsource": "XF",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20081207 Multiple vulnerabilities in 3CX 6.0.806.0",
"refsource" : "FULLDISC",
"url" : "http://marc.info/?l=full-disclosure&m=122868146707468&w=2"
},
{
"name": "3cxphonesystem-unspecified-dos(52450)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52450"
},
{
"name": "20081207 Multiple vulnerabilities in 3CX 6.0.806.0",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=122868146707468&w=2"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "1026693",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026693"
},
{
"name": "52023",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52023"
},
{
"name": "thinkmanagement-vulcore-dir-traversal(73208)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73208"
},
{
"name": "79277",
"refsource": "OSVDB",
"url": "http://osvdb.org/79277"
},
{
"name" : "1026693",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1026693"
},
{
"name": "47666",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47666"
},
{
"name" : "thinkmanagement-vulcore-dir-traversal(73208)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73208"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "20121010 VMSA-2012-0014 VMware vCenter Operations, CapacityIQ, and Movie Decoder security updates",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-10/0069.html"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2012-0014.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2012-0014.html"
},
{
"name" : "85959",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/85959"
},
{
"name": "1027612",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027612"
},
{
"name" : "50795",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50795"
"name": "20121010 VMSA-2012-0014 VMware vCenter Operations, CapacityIQ, and Movie Decoder security updates",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0069.html"
},
{
"name": "vmware-vcenter-xss(79044)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79044"
},
{
"name": "85959",
"refsource": "OSVDB",
"url": "http://osvdb.org/85959"
},
{
"name": "50795",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50795"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "20120328 D-Link SecuriCam DCS-5605 Network Surveillance ActiveX Control DcsCliCtrl.dll lstrcpyW Remote Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-03/0154.html"
},
{
"name" : "18673",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/18673"
},
{
"name" : "52769",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/52769"
"name": "csc-dcsclictrl-bo(74447)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74447"
},
{
"name": "80663",
"refsource": "OSVDB",
"url": "http://osvdb.org/80663"
},
{
"name": "18673",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/18673"
},
{
"name": "20120328 D-Link SecuriCam DCS-5605 Network Surveillance ActiveX Control DcsCliCtrl.dll lstrcpyW Remote Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0154.html"
},
{
"name": "52769",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52769"
},
{
"name": "48602",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48602"
},
{
"name" : "csc-dcsclictrl-bo(74447)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/74447"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-5604",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-5655",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20121219 Re: CVE request for Drupal core, and contributed modules",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/12/20/1"
},
{
"name": "http://drupal.org/node/1870550",
"refsource": "CONFIRM",
@ -67,16 +62,21 @@
"refsource": "CONFIRM",
"url": "http://drupalcode.org/project/context.git/commitdiff/4452bf1"
},
{
"name" : "http://drupalcode.org/project/context.git/commitdiff/d8bf8b6",
"refsource" : "CONFIRM",
"url" : "http://drupalcode.org/project/context.git/commitdiff/d8bf8b6"
},
{
"name": "56993",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56993"
},
{
"name": "[oss-security] 20121219 Re: CVE request for Drupal core, and contributed modules",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/12/20/1"
},
{
"name": "http://drupalcode.org/project/context.git/commitdiff/d8bf8b6",
"refsource": "CONFIRM",
"url": "http://drupalcode.org/project/context.git/commitdiff/d8bf8b6"
},
{
"name": "51517",
"refsource": "SECUNIA",

View File

@ -54,9 +54,9 @@
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11782",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11782"
"name": "1039528",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039528"
},
{
"name": "101143",
@ -64,9 +64,9 @@
"url": "http://www.securityfocus.com/bid/101143"
},
{
"name" : "1039528",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039528"
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11782",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11782"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html",
"refsource" : "MISC",
"url" : "https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html"
"name": "101482",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101482"
},
{
"name": "https://crbug.com/756040",
"refsource": "MISC",
"url": "https://crbug.com/756040"
},
{
"name": "https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html"
},
{
"name": "DSA-4020",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4020"
},
{
"name" : "GLSA-201710-24",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201710-24"
},
{
"name": "RHSA-2017:2997",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2997"
},
{
"name" : "101482",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101482"
"name": "GLSA-201710-24",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201710-24"
}
]
}

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=88dcc44ea8fbe158d1dee3ea197e47794bf4449d",
"refsource" : "MISC",
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=88dcc44ea8fbe158d1dee3ea197e47794bf4449d"
},
{
"name": "https://source.android.com/security/bulletin/pixel/2018-02-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/pixel/2018-02-01"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=88dcc44ea8fbe158d1dee3ea197e47794bf4449d",
"refsource": "MISC",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=88dcc44ea8fbe158d1dee3ea197e47794bf4449d"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/experience-manager/apsb17-41.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/experience-manager/apsb17-41.html"
},
{
"name": "101834",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "1039800",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039800"
},
{
"name": "https://helpx.adobe.com/security/products/experience-manager/apsb17-41.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb17-41.html"
}
]
}

View File

@ -61,6 +61,11 @@
},
"references": {
"reference_data": [
{
"name": "1038287",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038287"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"refsource": "CONFIRM",
@ -75,11 +80,6 @@
"name": "97763",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97763"
},
{
"name" : "1038287",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038287"
}
]
}

View File

@ -70,15 +70,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
},
{
"name": "95531",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95531"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
}
]
}

View File

@ -70,15 +70,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
},
{
"name": "95531",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95531"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-8009",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,11 +53,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8467",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8467"
},
{
"name": "99409",
"refsource": "BID",
@ -67,6 +62,11 @@
"name": "1038853",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038853"
},
{
"name": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8467",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8467"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1212/",
"refsource" : "MISC",
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1212/"
},
{
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-18-1212/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-18-1212/"
}
]
}