mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
cad60ca9a1
commit
81bedd82e4
@ -53,49 +53,49 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20030805 Local ZoneAlarm Firewall (probably all versions - tested on v3.1)",
|
||||
"refsource" : "VULNWATCH",
|
||||
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0070.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://sec-labs.hack.pl/advisories/seclabs-adv-zone-alarm-04-08-2003.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://sec-labs.hack.pl/advisories/seclabs-adv-zone-alarm-04-08-2003.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://sec-labs.hack.pl/papers/win32ddc.php",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://sec-labs.hack.pl/papers/win32ddc.php"
|
||||
},
|
||||
{
|
||||
"name" : "http://download.zonelabs.com/bin/free/information/znalm/zaReleaseHistory.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://download.zonelabs.com/bin/free/information/znalm/zaReleaseHistory.html"
|
||||
"name": "4362",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/4362"
|
||||
},
|
||||
{
|
||||
"name": "8342",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/8342"
|
||||
},
|
||||
{
|
||||
"name": "device-driver-gain-privileges(12824)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12824"
|
||||
},
|
||||
{
|
||||
"name": "http://download.zonelabs.com/bin/free/information/znalm/zaReleaseHistory.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://download.zonelabs.com/bin/free/information/znalm/zaReleaseHistory.html"
|
||||
},
|
||||
{
|
||||
"name": "http://sec-labs.hack.pl/papers/win32ddc.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://sec-labs.hack.pl/papers/win32ddc.php"
|
||||
},
|
||||
{
|
||||
"name": "http://sec-labs.hack.pl/advisories/seclabs-adv-zone-alarm-04-08-2003.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://sec-labs.hack.pl/advisories/seclabs-adv-zone-alarm-04-08-2003.txt"
|
||||
},
|
||||
{
|
||||
"name": "2375",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/2375"
|
||||
},
|
||||
{
|
||||
"name" : "4362",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/4362"
|
||||
},
|
||||
{
|
||||
"name": "9459",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/9459"
|
||||
},
|
||||
{
|
||||
"name" : "device-driver-gain-privileges(12824)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/12824"
|
||||
"name": "20030805 Local ZoneAlarm Firewall (probably all versions - tested on v3.1)",
|
||||
"refsource": "VULNWATCH",
|
||||
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0070.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "7879",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/7879"
|
||||
},
|
||||
{
|
||||
"name": "20030115 Directory traversal vulnerabilities found in NITE ftp-server version 1.83",
|
||||
"refsource": "VULNWATCH",
|
||||
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0022.html"
|
||||
},
|
||||
{
|
||||
"name" : "6648",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/6648"
|
||||
},
|
||||
{
|
||||
"name": "1005923",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1005923"
|
||||
},
|
||||
{
|
||||
"name" : "7879",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/7879"
|
||||
},
|
||||
{
|
||||
"name": "niteserver-dotdot-directory-traversal(11062)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11062"
|
||||
},
|
||||
{
|
||||
"name": "6648",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/6648"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,31 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040211 Mutt-1.4.2 fixes buffer overflow.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=107651677817933&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "CSSA-2004-013.0",
|
||||
"refsource" : "CALDERA",
|
||||
"url" : "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-013.0.txt"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:050",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2004-050.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:051",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2004-051.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2004:010",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:010"
|
||||
},
|
||||
{
|
||||
"name": "SSA:2004-043",
|
||||
"refsource": "SLACKWARE",
|
||||
@ -93,34 +68,59 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=107696262905039&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20040309 [OpenPKG-SA-2004.005] OpenPKG Security Advisory (mutt)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=107884956930903&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "mutt-index-menu-bo(15134)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15134"
|
||||
},
|
||||
{
|
||||
"name" : "9641",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/9641"
|
||||
},
|
||||
{
|
||||
"name" : "3918",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/3918"
|
||||
"name": "RHSA-2004:051",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-051.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:811",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A811"
|
||||
},
|
||||
{
|
||||
"name": "mutt-index-menu-bo(15134)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15134"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:838",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A838"
|
||||
},
|
||||
{
|
||||
"name": "9641",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/9641"
|
||||
},
|
||||
{
|
||||
"name": "20040211 Mutt-1.4.2 fixes buffer overflow.",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=107651677817933&w=2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2004:050",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-050.html"
|
||||
},
|
||||
{
|
||||
"name": "20040309 [OpenPKG-SA-2004.005] OpenPKG Security Advisory (mutt)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=107884956930903&w=2"
|
||||
},
|
||||
{
|
||||
"name": "3918",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/3918"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2004:010",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:010"
|
||||
},
|
||||
{
|
||||
"name": "CSSA-2004-013.0",
|
||||
"refsource": "CALDERA",
|
||||
"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-013.0.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,119 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040323 Advisory 03/2004: Multiple (13) Ethereal remote overflows",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=108007072215742&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://security.e-matters.de/advisories/032004.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://security.e-matters.de/advisories/032004.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ethereal.com/appnotes/enpa-sa-00013.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ethereal.com/appnotes/enpa-sa-00013.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-511",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2004/dsa-511"
|
||||
},
|
||||
{
|
||||
"name" : "20040329 LNSA-#2004-0007: Multiple security problems in Ethereal",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=108058005324316&w=2"
|
||||
"name": "VU#659140",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/659140"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200403-07",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200403-07.xml"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:136",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2004-136.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2004:137",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-137.html"
|
||||
},
|
||||
{
|
||||
"name" : "CLA-2004:835",
|
||||
"refsource" : "CONECTIVA",
|
||||
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835"
|
||||
"name": "DSA-511",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-511"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2004:024",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:024"
|
||||
},
|
||||
{
|
||||
"name" : "20040416 [OpenPKG-SA-2004.015] OpenPKG Security Advisory (ethereal)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=108213710306260&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "VU#119876",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/119876"
|
||||
},
|
||||
{
|
||||
"name" : "VU#125156",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/125156"
|
||||
},
|
||||
{
|
||||
"name" : "VU#433596",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/433596"
|
||||
},
|
||||
{
|
||||
"name" : "VU#591820",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/591820"
|
||||
},
|
||||
{
|
||||
"name" : "VU#644886",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/644886"
|
||||
},
|
||||
{
|
||||
"name" : "VU#659140",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/659140"
|
||||
},
|
||||
{
|
||||
"name" : "VU#740188",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/740188"
|
||||
},
|
||||
{
|
||||
"name" : "VU#864884",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/864884"
|
||||
},
|
||||
{
|
||||
"name" : "VU#931588",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/931588"
|
||||
},
|
||||
{
|
||||
"name" : "6893",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/6893"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:878",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A878"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:887",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A887"
|
||||
"name": "RHSA-2004:136",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-136.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10187",
|
||||
@ -177,10 +87,100 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/11185"
|
||||
},
|
||||
{
|
||||
"name": "20040329 LNSA-#2004-0007: Multiple security problems in Ethereal",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=108058005324316&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://security.e-matters.de/advisories/032004.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://security.e-matters.de/advisories/032004.html"
|
||||
},
|
||||
{
|
||||
"name": "6893",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/6893"
|
||||
},
|
||||
{
|
||||
"name": "CLA-2004:835",
|
||||
"refsource": "CONECTIVA",
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835"
|
||||
},
|
||||
{
|
||||
"name": "20040323 Advisory 03/2004: Multiple (13) Ethereal remote overflows",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=108007072215742&w=2"
|
||||
},
|
||||
{
|
||||
"name": "VU#864884",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/864884"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:887",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A887"
|
||||
},
|
||||
{
|
||||
"name": "VU#119876",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/119876"
|
||||
},
|
||||
{
|
||||
"name": "VU#433596",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/433596"
|
||||
},
|
||||
{
|
||||
"name": "VU#591820",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/591820"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ethereal.com/appnotes/enpa-sa-00013.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ethereal.com/appnotes/enpa-sa-00013.html"
|
||||
},
|
||||
{
|
||||
"name": "VU#644886",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/644886"
|
||||
},
|
||||
{
|
||||
"name": "ethereal-multiple-dissectors-bo(15569)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15569"
|
||||
},
|
||||
{
|
||||
"name": "VU#740188",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/740188"
|
||||
},
|
||||
{
|
||||
"name": "VU#125156",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/125156"
|
||||
},
|
||||
{
|
||||
"name": "20040416 [OpenPKG-SA-2004.015] OpenPKG Security Advisory (ethereal)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=108213710306260&w=2"
|
||||
},
|
||||
{
|
||||
"name": "VU#931588",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/931588"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:878",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A878"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2004:024",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:024"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1011329",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1011329"
|
||||
},
|
||||
{
|
||||
"name": "20040916 wp-04-0001: Multiple Browser Cookie Injection Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.westpoint.ltd.uk/advisories/wp-04-0001.txt"
|
||||
},
|
||||
{
|
||||
"name" : "1011329",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1011329"
|
||||
},
|
||||
{
|
||||
"name": "web-browser-cookie-session-hijack(17417)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en"
|
||||
},
|
||||
{
|
||||
"name": "http://www.corsaire.com/advisories/c040817-003.txt",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://www.mitel.com/DocController?documentId=14223",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mitel.com/DocController?documentId=14223"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.niscc.gov.uk/niscc/docs/re-20050228-00178.pdf?lang=en"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "13108",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/13108/"
|
||||
},
|
||||
{
|
||||
"name": "gentoolkit-symlink(17968)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17968"
|
||||
},
|
||||
{
|
||||
"name": "11617",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11617"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200411-13",
|
||||
"refsource": "GENTOO",
|
||||
@ -61,21 +76,6 @@
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=68846",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=68846"
|
||||
},
|
||||
{
|
||||
"name" : "13108",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/13108/"
|
||||
},
|
||||
{
|
||||
"name" : "11617",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/11617"
|
||||
},
|
||||
{
|
||||
"name" : "gentoolkit-symlink(17968)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17968"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://tigger.uic.edu/~jlongs2/holes/abc2mtex.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://tigger.uic.edu/~jlongs2/holes/abc2mtex.txt"
|
||||
},
|
||||
{
|
||||
"name": "abc2mtex-processabc-bo(18578)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18578"
|
||||
},
|
||||
{
|
||||
"name": "http://tigger.uic.edu/~jlongs2/holes/abc2mtex.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://tigger.uic.edu/~jlongs2/holes/abc2mtex.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "11383",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/11383"
|
||||
},
|
||||
{
|
||||
"name": "57669",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57669-1"
|
||||
},
|
||||
{
|
||||
"name" : "101589",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101589-1"
|
||||
},
|
||||
{
|
||||
"name": "11593",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11593"
|
||||
},
|
||||
{
|
||||
"name" : "11383",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/11383"
|
||||
},
|
||||
{
|
||||
"name" : "13072",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/13072"
|
||||
"name": "101589",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101589-1"
|
||||
},
|
||||
{
|
||||
"name": "sun-java-web-application-dos(17941)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17941"
|
||||
},
|
||||
{
|
||||
"name": "13072",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/13072"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040829 CuteNews News.txt writable to world",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2004-08/0396.html"
|
||||
"name": "1011099",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1011099"
|
||||
},
|
||||
{
|
||||
"name": "9385",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.osvdb.org/9385"
|
||||
},
|
||||
{
|
||||
"name" : "1011099",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1011099"
|
||||
"name": "20040829 CuteNews News.txt writable to world",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-08/0396.html"
|
||||
},
|
||||
{
|
||||
"name": "cutenews-newstxt-world-writable(17161)",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "29163",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29163"
|
||||
},
|
||||
{
|
||||
"name": "30178",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30178"
|
||||
},
|
||||
{
|
||||
"name": "29163",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29163"
|
||||
},
|
||||
{
|
||||
"name": "fusebox-fusebox5-file-include(42389)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,26 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "236481",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236481-1"
|
||||
},
|
||||
{
|
||||
"name" : "29355",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29355"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-1649",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1649/references"
|
||||
},
|
||||
{
|
||||
"name" : "1020110",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1020110"
|
||||
},
|
||||
{
|
||||
"name": "30381",
|
||||
"refsource": "SECUNIA",
|
||||
@ -81,6 +66,21 @@
|
||||
"name": "javasystem-advancedsearch-xss(42624)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42624"
|
||||
},
|
||||
{
|
||||
"name": "29355",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29355"
|
||||
},
|
||||
{
|
||||
"name": "236481",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236481-1"
|
||||
},
|
||||
{
|
||||
"name": "1020110",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020110"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2008-2936",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,34 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080814 Postfix local privilege escalation via hardlinked symlinks",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/495474/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080831 PoCfix (PoC for Postfix local root vuln - CVE-2008-2936)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/495882/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080821 rPSA-2008-0259-1 postfix",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/495632/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "6337",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6337"
|
||||
},
|
||||
{
|
||||
"name" : "[postfix-announce] 20080814 Postfix local privilege escalation via hardlinked symlinks",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://article.gmane.org/gmane.mail.postfix.announce/110"
|
||||
},
|
||||
{
|
||||
"name" : "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY"
|
||||
"name": "FEDORA-2008-8595",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
|
||||
},
|
||||
{
|
||||
"name": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.3.15.HISTORY",
|
||||
@ -88,99 +63,9 @@
|
||||
"url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.3.15.HISTORY"
|
||||
},
|
||||
{
|
||||
"name" : "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY"
|
||||
},
|
||||
{
|
||||
"name" : "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY"
|
||||
},
|
||||
{
|
||||
"name" : "http://wiki.rpath.com/Advisories:rPSA-2008-0259",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://wiki.rpath.com/Advisories:rPSA-2008-0259"
|
||||
},
|
||||
{
|
||||
"name" : "https://issues.rpath.com/browse/RPL-2689",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://issues.rpath.com/browse/RPL-2689"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1629",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2008/dsa-1629"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-8593",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-8595",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00271.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200808-12",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200808-12.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2008:171",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:171"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0839",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0839.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2008:040",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-636-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/636-1/"
|
||||
},
|
||||
{
|
||||
"name" : "VU#938323",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/938323"
|
||||
},
|
||||
{
|
||||
"name" : "30691",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30691"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10033",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10033"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-2385",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/2385"
|
||||
},
|
||||
{
|
||||
"name" : "1020700",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1020700"
|
||||
},
|
||||
{
|
||||
"name" : "31485",
|
||||
"name": "32231",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31485"
|
||||
},
|
||||
{
|
||||
"name" : "31500",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31500"
|
||||
"url": "http://secunia.com/advisories/32231"
|
||||
},
|
||||
{
|
||||
"name": "31469",
|
||||
@ -188,9 +73,14 @@
|
||||
"url": "http://secunia.com/advisories/31469"
|
||||
},
|
||||
{
|
||||
"name" : "31477",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31477"
|
||||
"name": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.5.4.HISTORY"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1629",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2008/dsa-1629"
|
||||
},
|
||||
{
|
||||
"name": "31530",
|
||||
@ -198,24 +88,134 @@
|
||||
"url": "http://secunia.com/advisories/31530"
|
||||
},
|
||||
{
|
||||
"name" : "31474",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31474"
|
||||
"name": "FEDORA-2008-8593",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00287.html"
|
||||
},
|
||||
{
|
||||
"name" : "32231",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32231"
|
||||
"name": "https://issues.rpath.com/browse/RPL-2689",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.rpath.com/browse/RPL-2689"
|
||||
},
|
||||
{
|
||||
"name": "1020700",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020700"
|
||||
},
|
||||
{
|
||||
"name": "20080821 rPSA-2008-0259-1 postfix",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/495632/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "VU#938323",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/938323"
|
||||
},
|
||||
{
|
||||
"name": "[postfix-announce] 20080814 Postfix local privilege escalation via hardlinked symlinks",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://article.gmane.org/gmane.mail.postfix.announce/110"
|
||||
},
|
||||
{
|
||||
"name": "4160",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4160"
|
||||
},
|
||||
{
|
||||
"name": "30691",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30691"
|
||||
},
|
||||
{
|
||||
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0259",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0259"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2008:040",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "31474",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31474"
|
||||
},
|
||||
{
|
||||
"name": "20080831 PoCfix (PoC for Postfix local root vuln - CVE-2008-2936)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/495882/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "postfix-symlink-code-execution(44460)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44460"
|
||||
},
|
||||
{
|
||||
"name": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-2.4.8.HISTORY"
|
||||
},
|
||||
{
|
||||
"name": "6337",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6337"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0839",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0839.html"
|
||||
},
|
||||
{
|
||||
"name": "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "ftp://ftp.porcupine.org/mirrors/postfix-release/experimental/postfix-2.6-20080814.HISTORY"
|
||||
},
|
||||
{
|
||||
"name": "31500",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31500"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10033",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10033"
|
||||
},
|
||||
{
|
||||
"name": "31477",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31477"
|
||||
},
|
||||
{
|
||||
"name": "31485",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31485"
|
||||
},
|
||||
{
|
||||
"name": "USN-636-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/636-1/"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2008:171",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:171"
|
||||
},
|
||||
{
|
||||
"name": "20080814 Postfix local privilege escalation via hardlinked symlinks",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/495474/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2385",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2385"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200808-12",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200808-12.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5883"
|
||||
},
|
||||
{
|
||||
"name" : "29859",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29859"
|
||||
},
|
||||
{
|
||||
"name": "31123",
|
||||
"refsource": "SECUNIA",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "kblance-index-sql-injection(43272)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43272"
|
||||
},
|
||||
{
|
||||
"name": "29859",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29859"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/cineon.c",
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=604837",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/cineon.c"
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=604837"
|
||||
},
|
||||
{
|
||||
"name": "http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/xcf.c",
|
||||
@ -63,19 +63,9 @@
|
||||
"url": "http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/xcf.c"
|
||||
},
|
||||
{
|
||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=604785",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=604785"
|
||||
},
|
||||
{
|
||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=604837",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=604837"
|
||||
},
|
||||
{
|
||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485"
|
||||
"name": "30549",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30549"
|
||||
},
|
||||
{
|
||||
"name": "29583",
|
||||
@ -83,9 +73,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/29583"
|
||||
},
|
||||
{
|
||||
"name" : "30549",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30549"
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=604837&group_id=73485"
|
||||
},
|
||||
{
|
||||
"name": "http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/cineon.c",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cvs.graphicsmagick.org/cgi-bin/cvsweb.cgi/GraphicsMagick/coders/cineon.c"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=604785",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=604785"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "32087",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32087"
|
||||
},
|
||||
{
|
||||
"name": "wikyblog-index-xss(45603)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45603"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?group_id=148518&release_id=647444",
|
||||
"refsource": "MISC",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?group_id=148518&release_id=647444"
|
||||
},
|
||||
{
|
||||
"name": "48790",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/48790"
|
||||
},
|
||||
{
|
||||
"name": "http://www.digitrustgroup.com/advisories/web-application-security-wikyblog.html",
|
||||
"refsource": "MISC",
|
||||
@ -66,21 +81,6 @@
|
||||
"name": "31525",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31525"
|
||||
},
|
||||
{
|
||||
"name" : "48790",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/48790"
|
||||
},
|
||||
{
|
||||
"name" : "32087",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32087"
|
||||
},
|
||||
{
|
||||
"name" : "wikyblog-index-xss(45603)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45603"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "33357",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33357"
|
||||
},
|
||||
{
|
||||
"name": "7610",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33040"
|
||||
},
|
||||
{
|
||||
"name" : "33357",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33357"
|
||||
},
|
||||
{
|
||||
"name": "lawyerportal-deptdisplay-sql-injection(47621)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081207 Multiple vulnerabilities in 3CX 6.0.806.0",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://marc.info/?l=full-disclosure&m=122868146707468&w=2"
|
||||
},
|
||||
{
|
||||
"name": "3cxphonesystem-unspecified-dos(52450)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52450"
|
||||
},
|
||||
{
|
||||
"name": "20081207 Multiple vulnerabilities in 3CX 6.0.806.0",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://marc.info/?l=full-disclosure&m=122868146707468&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1026693",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1026693"
|
||||
},
|
||||
{
|
||||
"name": "52023",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/52023"
|
||||
},
|
||||
{
|
||||
"name": "thinkmanagement-vulcore-dir-traversal(73208)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73208"
|
||||
},
|
||||
{
|
||||
"name": "79277",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/79277"
|
||||
},
|
||||
{
|
||||
"name" : "1026693",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1026693"
|
||||
},
|
||||
{
|
||||
"name": "47666",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/47666"
|
||||
},
|
||||
{
|
||||
"name" : "thinkmanagement-vulcore-dir-traversal(73208)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73208"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20121010 VMSA-2012-0014 VMware vCenter Operations, CapacityIQ, and Movie Decoder security updates",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-10/0069.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vmware.com/security/advisories/VMSA-2012-0014.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vmware.com/security/advisories/VMSA-2012-0014.html"
|
||||
},
|
||||
{
|
||||
"name" : "85959",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/85959"
|
||||
},
|
||||
{
|
||||
"name": "1027612",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1027612"
|
||||
},
|
||||
{
|
||||
"name" : "50795",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/50795"
|
||||
"name": "20121010 VMSA-2012-0014 VMware vCenter Operations, CapacityIQ, and Movie Decoder security updates",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0069.html"
|
||||
},
|
||||
{
|
||||
"name": "vmware-vcenter-xss(79044)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79044"
|
||||
},
|
||||
{
|
||||
"name": "85959",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/85959"
|
||||
},
|
||||
{
|
||||
"name": "50795",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/50795"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20120328 D-Link SecuriCam DCS-5605 Network Surveillance ActiveX Control DcsCliCtrl.dll lstrcpyW Remote Buffer Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-03/0154.html"
|
||||
},
|
||||
{
|
||||
"name" : "18673",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/18673"
|
||||
},
|
||||
{
|
||||
"name" : "52769",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/52769"
|
||||
"name": "csc-dcsclictrl-bo(74447)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74447"
|
||||
},
|
||||
{
|
||||
"name": "80663",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/80663"
|
||||
},
|
||||
{
|
||||
"name": "18673",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/18673"
|
||||
},
|
||||
{
|
||||
"name": "20120328 D-Link SecuriCam DCS-5605 Network Surveillance ActiveX Control DcsCliCtrl.dll lstrcpyW Remote Buffer Overflow Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0154.html"
|
||||
},
|
||||
{
|
||||
"name": "52769",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/52769"
|
||||
},
|
||||
{
|
||||
"name": "48602",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48602"
|
||||
},
|
||||
{
|
||||
"name" : "csc-dcsclictrl-bo(74447)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/74447"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-5604",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-5655",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20121219 Re: CVE request for Drupal core, and contributed modules",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/12/20/1"
|
||||
},
|
||||
{
|
||||
"name": "http://drupal.org/node/1870550",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,16 +62,21 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupalcode.org/project/context.git/commitdiff/4452bf1"
|
||||
},
|
||||
{
|
||||
"name" : "http://drupalcode.org/project/context.git/commitdiff/d8bf8b6",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://drupalcode.org/project/context.git/commitdiff/d8bf8b6"
|
||||
},
|
||||
{
|
||||
"name": "56993",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/56993"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20121219 Re: CVE request for Drupal core, and contributed modules",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/12/20/1"
|
||||
},
|
||||
{
|
||||
"name": "http://drupalcode.org/project/context.git/commitdiff/d8bf8b6",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupalcode.org/project/context.git/commitdiff/d8bf8b6"
|
||||
},
|
||||
{
|
||||
"name": "51517",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -54,9 +54,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11782",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11782"
|
||||
"name": "1039528",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039528"
|
||||
},
|
||||
{
|
||||
"name": "101143",
|
||||
@ -64,9 +64,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/101143"
|
||||
},
|
||||
{
|
||||
"name" : "1039528",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039528"
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11782",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11782"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html"
|
||||
"name": "101482",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101482"
|
||||
},
|
||||
{
|
||||
"name": "https://crbug.com/756040",
|
||||
"refsource": "MISC",
|
||||
"url": "https://crbug.com/756040"
|
||||
},
|
||||
{
|
||||
"name": "https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4020",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2017/dsa-4020"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201710-24",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201710-24"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2997",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2997"
|
||||
},
|
||||
{
|
||||
"name" : "101482",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/101482"
|
||||
"name": "GLSA-201710-24",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201710-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=88dcc44ea8fbe158d1dee3ea197e47794bf4449d",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=88dcc44ea8fbe158d1dee3ea197e47794bf4449d"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/pixel/2018-02-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2018-02-01"
|
||||
},
|
||||
{
|
||||
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=88dcc44ea8fbe158d1dee3ea197e47794bf4449d",
|
||||
"refsource": "MISC",
|
||||
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=88dcc44ea8fbe158d1dee3ea197e47794bf4449d"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/experience-manager/apsb17-41.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/experience-manager/apsb17-41.html"
|
||||
},
|
||||
{
|
||||
"name": "101834",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1039800",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039800"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/experience-manager/apsb17-41.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb17-41.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1038287",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038287"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -75,11 +80,6 @@
|
||||
"name": "97763",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97763"
|
||||
},
|
||||
{
|
||||
"name" : "1038287",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038287"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -70,15 +70,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
|
||||
},
|
||||
{
|
||||
"name": "95531",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95531"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -70,15 +70,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
|
||||
},
|
||||
{
|
||||
"name": "95531",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95531"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-8009",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,11 +53,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8467",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8467"
|
||||
},
|
||||
{
|
||||
"name": "99409",
|
||||
"refsource": "BID",
|
||||
@ -67,6 +62,11 @@
|
||||
"name": "1038853",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038853"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8467",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8467"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1212/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1212/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
|
||||
},
|
||||
{
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-18-1212/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-18-1212/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user