"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:01:19 +00:00
parent f31c0223fd
commit 832e99e667
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 3955 additions and 3955 deletions

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2002-1259",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20020704 nn remote format string vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://online.securityfocus.com/archive/1/280639"
"name": "27086",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27086"
},
{
"name": "5160",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5160"
},
{
"name" : "27086",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27086"
},
{
"name": "nn-error-msg-format-string(9491)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9491.php"
},
{
"name": "20020704 nn remote format string vulnerability",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/280639"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20030428 Pi3Web 2.0.1 DoS",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=105155818012718&w=2"
},
{
"name" : "20030512 Unix Version of the Pi3web DoS",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=105275789410250&w=2"
"name": "pi3web-get-request-bo(11889)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11889"
},
{
"name": "7555",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/7555"
},
{
"name" : "pi3web-get-request-bo(11889)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/11889"
"name": "20030512 Unix Version of the Pi3web DoS",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=105275789410250&w=2"
},
{
"name": "20030428 Pi3Web 2.0.1 DoS",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=105155818012718&w=2"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20030627 VMware Workstation 4.0: Possible privilege escalation on the host",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=105673688529147&w=2"
},
{
"name": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1019",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1019"
},
{
"name": "20030627 VMware Workstation 4.0: Possible privilege escalation on the host",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=105673688529147&w=2"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20030701-01-P"
},
{
"name" : "8587",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/8587"
},
{
"name": "irix-nsd-map-dos(12635)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12635"
},
{
"name": "8587",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/8587"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20030724 Integrigy Security Alert - Oracle E-Business Suite AOL/J Setup Test Information Disclosure",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=105906689120237&w=2"
"name": "8268",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/8268"
},
{
"name": "http://otn.oracle.com/deploy/security/pdf/2003alert55.pdf",
@ -63,9 +63,9 @@
"url": "http://otn.oracle.com/deploy/security/pdf/2003alert55.pdf"
},
{
"name" : "8268",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/8268"
"name": "20030724 Integrigy Security Alert - Oracle E-Business Suite AOL/J Setup Test Information Disclosure",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=105906689120237&w=2"
}
]
}

View File

@ -52,35 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20030725 Oracle Extproc Buffer Overflow (#NISR25072003)",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=105914979629857&w=2"
},
{
"name" : "20030725 Oracle Extproc Buffer Overflow (#NISR25072003)",
"refsource" : "NTBUGTRAQ",
"url" : "http://marc.info/?l=ntbugtraq&m=105915485303327&w=2"
},
{
"name" : "20030725 question about oracle advisory",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=105916455814904&w=2"
},
{
"name": "http://otn.oracle.com/deploy/security/pdf/2003alert57.pdf",
"refsource": "CONFIRM",
"url": "http://otn.oracle.com/deploy/security/pdf/2003alert57.pdf"
},
{
"name" : "20030912 Update to the Oracle EXTPROC advisory",
"refsource" : "VULNWATCH",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0105.html"
},
{
"name" : "VU#936868",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/936868"
"name": "20030725 question about oracle advisory",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=105916455814904&w=2"
},
{
"name": "8267",
@ -91,6 +71,26 @@
"name": "oracle-extproc-bo(12721)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12721"
},
{
"name": "20030912 Update to the Oracle EXTPROC advisory",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0105.html"
},
{
"name": "20030725 Oracle Extproc Buffer Overflow (#NISR25072003)",
"refsource": "NTBUGTRAQ",
"url": "http://marc.info/?l=ntbugtraq&m=105915485303327&w=2"
},
{
"name": "VU#936868",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/936868"
},
{
"name": "20030725 Oracle Extproc Buffer Overflow (#NISR25072003)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=105914979629857&w=2"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "8120",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/8120"
},
{
"name": "gosa-plugin-file-include(11408)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11408"
},
{
"name": "20030224 GOnicus System Administrator php injection",
"refsource": "BUGTRAQ",
@ -71,16 +81,6 @@
"name": "1006162",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1006162"
},
{
"name" : "8120",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/8120"
},
{
"name" : "gosa-plugin-file-include(11408)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/11408"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20031022 IE6 CSS-Crash",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/342010"
"name": "3295",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3295"
},
{
"name": "8874",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/8874"
},
{
"name" : "3295",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3295"
"name": "20031022 IE6 CSS-Crash",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/342010"
},
{
"name": "ie-scrollbarbasecolor-dos(13809)",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.securiteam.com/windowsntfocus/6S0052K8LQ.html",
"refsource" : "MISC",
"url" : "http://www.securiteam.com/windowsntfocus/6S0052K8LQ.html"
"name": "tinyweb-httpget-dos(13402)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13402"
},
{
"name": "8810",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/8810"
},
{
"name" : "tinyweb-httpget-dos(13402)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/13402"
"name": "http://www.securiteam.com/windowsntfocus/6S0052K8LQ.html",
"refsource": "MISC",
"url": "http://www.securiteam.com/windowsntfocus/6S0052K8LQ.html"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20040305 Invision Power Board v1.3 Final Cross Site Scripting Vulnerabillity",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107851589701916&w=2"
},
{
"name": "9768",
"refsource": "BID",
@ -67,15 +62,20 @@
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4154"
},
{
"name" : "11053",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/11053"
},
{
"name": "invision-xss(15403)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15403"
},
{
"name": "20040305 Invision Power Board v1.3 Final Cross Site Scripting Vulnerabillity",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107851589701916&w=2"
},
{
"name": "11053",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/11053"
}
]
}

View File

@ -53,94 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt",
"refsource" : "MISC",
"url" : "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt"
},
{
"name" : "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en",
"refsource" : "MISC",
"url" : "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en"
},
{
"name" : "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html",
"refsource" : "MISC",
"url" : "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html"
},
{
"name" : "HPSBTU01210",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=112861397904255&w=2"
},
{
"name" : "SSRT4743",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=112861397904255&w=2"
},
{
"name" : "HPSBUX01164",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/418882/100/0/threaded"
},
{
"name" : "SSRT4884",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/418882/100/0/threaded"
},
{
"name" : "HPSBST02161",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
},
{
"name" : "SSRT061264",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
},
{
"name" : "MS05-019",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019"
},
{
"name" : "MS06-064",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064"
},
{
"name" : "SCOSA-2006.4",
"refsource" : "SCO",
"url" : "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt"
},
{
"name" : "57746",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1"
},
{
"name" : "101658",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1"
},
{
"name" : "13124",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/13124"
},
{
"name" : "ADV-2006-3983",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3983"
},
{
"name" : "oval:org.mitre.oval:def:3458",
"name": "oval:org.mitre.oval:def:412",
"refsource": "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3458"
},
{
"name" : "oval:org.mitre.oval:def:1910",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1910"
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A412"
},
{
"name": "oval:org.mitre.oval:def:4804",
@ -148,9 +63,19 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4804"
},
{
"name" : "oval:org.mitre.oval:def:1177",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1177"
"name": "13124",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/13124"
},
{
"name": "HPSBUX01164",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/418882/100/0/threaded"
},
{
"name": "SSRT061264",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:176",
@ -158,20 +83,115 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A176"
},
{
"name" : "oval:org.mitre.oval:def:211",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A211"
"name": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html",
"refsource": "MISC",
"url": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html"
},
{
"name" : "oval:org.mitre.oval:def:412",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A412"
"name": "MS06-064",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064"
},
{
"name": "oval:org.mitre.oval:def:514",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A514"
},
{
"name": "oval:org.mitre.oval:def:1910",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1910"
},
{
"name": "SSRT4743",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=112861397904255&w=2"
},
{
"name": "HPSBTU01210",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=112861397904255&w=2"
},
{
"name": "57746",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1"
},
{
"name": "MS05-019",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019"
},
{
"name": "101658",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1"
},
{
"name": "SCOSA-2006.4",
"refsource": "SCO",
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt"
},
{
"name": "oval:org.mitre.oval:def:1177",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1177"
},
{
"name": "HPSBST02161",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
},
{
"name": "18317",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18317"
},
{
"name": "oval:org.mitre.oval:def:3458",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3458"
},
{
"name": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en",
"refsource": "MISC",
"url": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en"
},
{
"name": "oval:org.mitre.oval:def:211",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A211"
},
{
"name": "19",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/19"
},
{
"name": "SSRT4884",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/418882/100/0/threaded"
},
{
"name": "57",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/57"
},
{
"name": "22341",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22341"
},
{
"name": "ADV-2006-3983",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3983"
},
{
"name": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt",
"refsource": "MISC",
"url": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt"
},
{
"name": "oval:org.mitre.oval:def:53",
"refsource": "OVAL",
@ -181,26 +201,6 @@
"name": "oval:org.mitre.oval:def:622",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A622"
},
{
"name" : "18317",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18317"
},
{
"name" : "22341",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/22341"
},
{
"name" : "19",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/19"
},
{
"name" : "57",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/57"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.networksecurity.fi/advisories/outlook-bcc.html",
"refsource" : "MISC",
"url" : "http://www.networksecurity.fi/advisories/outlook-bcc.html"
},
{
"name" : "843555",
"refsource" : "MSKB",
"url" : "http://support.microsoft.com/kb/843555"
},
{
"name": "11040",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11040"
},
{
"name" : "9167",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/9167"
"name": "http://www.networksecurity.fi/advisories/outlook-bcc.html",
"refsource": "MISC",
"url": "http://www.networksecurity.fi/advisories/outlook-bcc.html"
},
{
"name": "1011067",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1011067"
},
{
"name": "outlook-email-address-disclosure(17098)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17098"
},
{
"name": "843555",
"refsource": "MSKB",
"url": "http://support.microsoft.com/kb/843555"
},
{
"name": "12376",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/12376"
},
{
"name" : "outlook-email-address-disclosure(17098)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17098"
"name": "9167",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/9167"
}
]
}

View File

@ -57,6 +57,16 @@
"refsource": "MISC",
"url": "http://members.lycos.co.uk/r34ct/main/Caravan/Caravan.txt"
},
{
"name": "10763",
"refsource": "SECUNIA",
"url": "http://www.secunia.com/advisories/10763/"
},
{
"name": "caravan-dotdot-directory-traveral(15004)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15004"
},
{
"name": "9555",
"refsource": "BID",
@ -71,16 +81,6 @@
"name": "1008913",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1008913"
},
{
"name" : "10763",
"refsource" : "SECUNIA",
"url" : "http://www.secunia.com/advisories/10763/"
},
{
"name" : "caravan-dotdot-directory-traveral(15004)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15004"
}
]
}

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.astaro.org/showflat.php?Cat=&Number=51459&page=0&view=collapsed&sb=5&o=&fpart=1#51459",
"refsource" : "CONFIRM",
"url" : "http://www.astaro.org/showflat.php?Cat=&Number=51459&page=0&view=collapsed&sb=5&o=&fpart=1#51459"
},
{
"name": "11406",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/11406"
},
{
"name" : "1012065",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1012065"
"name": "http://www.astaro.org/showflat.php?Cat=&Number=51459&page=0&view=collapsed&sb=5&o=&fpart=1#51459",
"refsource": "CONFIRM",
"url": "http://www.astaro.org/showflat.php?Cat=&Number=51459&page=0&view=collapsed&sb=5&o=&fpart=1#51459"
},
{
"name": "astaro-pptp-info-disclosure(17959)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17959"
},
{
"name": "13089",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/13089"
},
{
"name" : "astaro-pptp-info-disclosure(17959)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17959"
"name": "1012065",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1012065"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-2257",
"STATE": "PUBLIC"
},
@ -53,14 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20080812 ZDI-08-050: Microsoft Internet Explorer XHTML Rendering Memory Corruption Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495430/100/0/threaded"
"name": "ADV-2008-2349",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2349"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-050/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-050/"
"name": "TA08-225A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-225A.html"
},
{
"name": "30613",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30613"
},
{
"name": "1020674",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020674"
},
{
"name": "HPSBST02360",
@ -78,34 +88,24 @@
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-045"
},
{
"name" : "TA08-225A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-225A.html"
"name": "20080812 ZDI-08-050: Microsoft Internet Explorer XHTML Rendering Memory Corruption Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495430/100/0/threaded"
},
{
"name" : "30613",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30613"
},
{
"name" : "oval:org.mitre.oval:def:5266",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5266"
},
{
"name" : "ADV-2008-2349",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2349"
},
{
"name" : "1020674",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020674"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-050/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-050/"
},
{
"name": "31375",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31375"
},
{
"name": "oval:org.mitre.oval:def:5266",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5266"
}
]
}

View File

@ -58,9 +58,19 @@
"url": "http://www.securityfocus.com/archive/1/493087/100/0/threaded"
},
{
"name" : "20080604 ZDI-08-035: CA ETrust Secure Content Manager Gateway FTP PASV Stack Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/493084/100/0/threaded"
"name": "30518",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30518"
},
{
"name": "http://dvlabs.tippingpoint.com/advisory/TPTI-08-05",
"refsource": "MISC",
"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-08-05"
},
{
"name": "29528",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29528"
},
{
"name": "20080604 ZDI-08-036: CA ETrust Secure Content Manager Gateway FTP LIST Stack Overflow",
@ -73,20 +83,20 @@
"url": "http://www.securityfocus.com/archive/1/493124/100/0/threaded"
},
{
"name" : "http://dvlabs.tippingpoint.com/advisory/TPTI-08-05",
"refsource" : "MISC",
"url" : "http://dvlabs.tippingpoint.com/advisory/TPTI-08-05"
"name": "ADV-2008-1741",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1741/references"
},
{
"name": "1020167",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020167"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-035/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-035/"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-036",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-036"
},
{
"name": "http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=36408",
"refsource": "CONFIRM",
@ -98,29 +108,19 @@
"url": "https://support.ca.com/irj/portal/anonymous/SolutionResults?aparNo=QO99987&os=NT&actionID=3"
},
{
"name" : "29528",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29528"
},
{
"name" : "ADV-2008-1741",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1741/references"
},
{
"name" : "1020167",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020167"
},
{
"name" : "30518",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30518"
"name": "20080604 ZDI-08-035: CA ETrust Secure Content Manager Gateway FTP PASV Stack Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493084/100/0/threaded"
},
{
"name": "ca-etrust-scm-ftp-bo(42821)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42821"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-036",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-036"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2012-0733",
"STATE": "PUBLIC"
},
@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21592188",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21592188"
},
{
"name" : "53247",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/53247"
"name": "ae-serviceacct-session-hijacking(74374)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74374"
},
{
"name": "48967",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48967"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21592188",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21592188"
},
{
"name": "48968",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48968"
},
{
"name" : "ae-serviceacct-session-hijacking(74374)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/74374"
"name": "53247",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53247"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "47896",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47896"
},
{
"name": "http://service.real.com/realplayer/security/02062012_player/en/",
"refsource": "CONFIRM",
"url": "http://service.real.com/realplayer/security/02062012_player/en/"
},
{
"name" : "51884",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/51884"
},
{
"name": "78912",
"refsource": "OSVDB",
"url": "http://osvdb.org/78912"
},
{
"name" : "47896",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/47896"
"name": "51884",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/51884"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt",
"refsource" : "MISC",
"url" : "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt"
},
{
"name": "http://secpod.org/blog/?p=450",
"refsource": "MISC",
"url": "http://secpod.org/blog/?p=450"
},
{
"name" : "51902",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/51902"
"name": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt",
"refsource": "MISC",
"url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt"
},
{
"name": "apache-struts-multiple-xss(72888)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72888"
},
{
"name": "51902",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/51902"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1135",
"STATE": "PUBLIC"
},
@ -52,101 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20120306 Re: CVE Request -- FreeType: Multiple security flaws to be fixed in v2.4.9",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/03/06/16"
},
{
"name" : "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=733512",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=733512"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=800593",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=800593"
},
{
"name" : "http://support.apple.com/kb/HT5503",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5503"
},
{
"name" : "APPLE-SA-2012-09-19-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name" : "GLSA-201204-04",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201204-04.xml"
},
{
"name" : "MDVSA-2012:057",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057"
},
{
"name" : "SUSE-SU-2012:0483",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html"
},
{
"name" : "SUSE-SU-2012:0521",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html"
},
{
"name" : "SUSE-SU-2012:0484",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html"
},
{
"name" : "openSUSE-SU-2012:0489",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html"
},
{
"name" : "USN-1403-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1403-1"
},
{
"name" : "52318",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/52318"
},
{
"name" : "1026765",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1026765"
},
{
"name" : "48918",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48918"
},
{
"name" : "48951",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48951"
},
{
"name" : "48822",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48822"
},
{
"name" : "48973",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48973"
},
{
"name": "48797",
"refsource": "SECUNIA",
@ -156,6 +61,101 @@
"name": "48508",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48508"
},
{
"name": "48822",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48822"
},
{
"name": "MDVSA-2012:057",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057"
},
{
"name": "APPLE-SA-2012-09-19-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT5503",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5503"
},
{
"name": "52318",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52318"
},
{
"name": "USN-1403-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1403-1"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512"
},
{
"name": "48918",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48918"
},
{
"name": "[oss-security] 20120306 Re: CVE Request -- FreeType: Multiple security flaws to be fixed in v2.4.9",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/03/06/16"
},
{
"name": "SUSE-SU-2012:0484",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html"
},
{
"name": "SUSE-SU-2012:0521",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html"
},
{
"name": "48973",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48973"
},
{
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html"
},
{
"name": "SUSE-SU-2012:0483",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html"
},
{
"name": "1026765",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026765"
},
{
"name": "openSUSE-SU-2012:0489",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html"
},
{
"name": "48951",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48951"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=800593",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=800593"
},
{
"name": "GLSA-201204-04",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201204-04.xml"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "MS12-071",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-071"
},
{
"name" : "TA12-318A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA12-318A.html"
},
{
"name" : "56421",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/56421"
},
{
"name": "oval:org.mitre.oval:def:15886",
"refsource": "OVAL",
@ -77,10 +62,25 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027749"
},
{
"name": "MS12-071",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-071"
},
{
"name": "56421",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56421"
},
{
"name": "51202",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51202"
},
{
"name": "TA12-318A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA12-318A.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1607",
"STATE": "PUBLIC"
},
@ -52,11 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "48647",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48647"
},
{
"name": "48622",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48622"
},
{
"name": "[oss-security] 20120329 Re: CVE request: TYPO3-CORE-SA-2012-001",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/03/30/4"
},
{
"name": "80761",
"refsource": "OSVDB",
"url": "http://osvdb.org/80761"
},
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-001/",
"refsource": "CONFIRM",
@ -71,21 +86,6 @@
"name": "52771",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52771"
},
{
"name" : "80761",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/80761"
},
{
"name" : "48622",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48622"
},
{
"name" : "48647",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48647"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-5062",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-5072",
"STATE": "PUBLIC"
},
@ -53,34 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21616490",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21616490"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21621154",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21621154"
},
{
"name" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
"refsource" : "CONFIRM",
"url" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21620037",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21620037"
},
{
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html"
"name": "SUSE-SU-2012:1398",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html"
},
{
"name": "GLSA-201406-32",
@ -88,44 +63,9 @@
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "HPSBUX02832",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
},
{
"name" : "SSRT101042",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
},
{
"name" : "HPSBOV02833",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
},
{
"name" : "SSRT101043",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
},
{
"name" : "RHSA-2012:1385",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1385.html"
},
{
"name" : "RHSA-2012:1386",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1386.html"
},
{
"name" : "RHSA-2012:1391",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1391.html"
},
{
"name" : "RHSA-2012:1392",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1392.html"
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html"
},
{
"name": "RHSA-2012:1466",
@ -133,89 +73,149 @@
"url": "http://rhn.redhat.com/errata/RHSA-2012-1466.html"
},
{
"name" : "RHSA-2012:1467",
"name": "RHSA-2012:1386",
"refsource": "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1467.html"
},
{
"name" : "RHSA-2013:1455",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name" : "RHSA-2013:1456",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name" : "openSUSE-SU-2012:1423",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html"
},
{
"name" : "SUSE-SU-2012:1398",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html"
},
{
"name" : "SUSE-SU-2012:1595",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html"
},
{
"name" : "56083",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/56083"
},
{
"name" : "oval:org.mitre.oval:def:16522",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16522"
},
{
"name" : "51028",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51028"
},
{
"name" : "51029",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51029"
},
{
"name" : "51141",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51141"
},
{
"name" : "51326",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51326"
},
{
"name" : "51327",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51327"
},
{
"name" : "51390",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51390"
"url": "http://rhn.redhat.com/errata/RHSA-2012-1386.html"
},
{
"name": "51438",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51438"
},
{
"name": "51141",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51141"
},
{
"name": "SSRT101043",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21621154",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21621154"
},
{
"name": "openSUSE-SU-2012:1423",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "56083",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56083"
},
{
"name": "RHSA-2012:1391",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1391.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21620037",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21620037"
},
{
"name": "51029",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51029"
},
{
"name": "HPSBOV02833",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
},
{
"name": "51166",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51166"
},
{
"name": "51390",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51390"
},
{
"name": "RHSA-2012:1392",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1392.html"
},
{
"name": "SUSE-SU-2012:1595",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21616490",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21616490"
},
{
"name": "51327",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51327"
},
{
"name": "oval:org.mitre.oval:def:16522",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16522"
},
{
"name": "RHSA-2012:1467",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1467.html"
},
{
"name": "SSRT101042",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
},
{
"name": "51028",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51028"
},
{
"name": "RHSA-2013:1456",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
},
{
"name": "51326",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51326"
},
{
"name": "javaruntimeenvironment-security-info-disc(79434)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79434"
},
{
"name": "RHSA-2012:1385",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1385.html"
},
{
"name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
"refsource": "CONFIRM",
"url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
},
{
"name": "HPSBUX02832",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-5505",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/11/10/1"
},
{
"name": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt",
"refsource": "CONFIRM",
"url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt"
},
{
"name" : "https://plone.org/products/plone-hotfix/releases/20121106",
"refsource" : "CONFIRM",
"url" : "https://plone.org/products/plone-hotfix/releases/20121106"
"name": "[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/11/10/1"
},
{
"name": "https://plone.org/products/plone/security/advisories/20121106/21",
"refsource": "CONFIRM",
"url": "https://plone.org/products/plone/security/advisories/20121106/21"
},
{
"name": "https://plone.org/products/plone-hotfix/releases/20121106",
"refsource": "CONFIRM",
"url": "https://plone.org/products/plone-hotfix/releases/20121106"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-5517",
"STATE": "PUBLIC"
},
@ -52,80 +52,80 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20121113 Re: CVE request -- Linux kernel: mm/hotplug: failure in propagating hot-added memory to other nodes",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/11/13/11"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=08dff7b7d629807dbb1f398c68dd9cd58dd657a1",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=08dff7b7d629807dbb1f398c68dd9cd58dd657a1"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=875374",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=875374"
},
{
"name" : "https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1"
},
{
"name" : "RHSA-2012:1580",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1580.html"
},
{
"name" : "SUSE-SU-2012:1679",
"refsource" : "SUSE",
"url" : "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html"
},
{
"name" : "openSUSE-SU-2013:0925",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
},
{
"name" : "USN-1678-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1678-1"
},
{
"name" : "USN-1671-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1671-1"
},
{
"name" : "USN-1673-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1673-1"
},
{
"name" : "USN-1677-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1677-1"
},
{
"name": "USN-1679-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1679-1"
},
{
"name": "RHSA-2012:1580",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1580.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/"
},
{
"name": "SUSE-SU-2012:1679",
"refsource": "SUSE",
"url": "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html"
},
{
"name": "USN-1673-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1673-1"
},
{
"name": "https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1"
},
{
"name": "[oss-security] 20121113 Re: CVE request -- Linux kernel: mm/hotplug: failure in propagating hot-added memory to other nodes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/11"
},
{
"name": "USN-1678-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1678-1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=08dff7b7d629807dbb1f398c68dd9cd58dd657a1",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=08dff7b7d629807dbb1f398c68dd9cd58dd657a1"
},
{
"name": "56527",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56527"
},
{
"name": "USN-1671-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1671-1"
},
{
"name": "openSUSE-SU-2013:0925",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html"
},
{
"name": "USN-1677-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1677-1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=875374",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875374"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html"
"name": "1038228",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038228"
},
{
"name": "97556",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/97556"
},
{
"name" : "1038228",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038228"
"name": "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html"
"name": "1038228",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038228"
},
{
"name": "97556",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/97556"
},
{
"name" : "1038228",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038228"
"name": "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb17-11.html"
}
]
}

View File

@ -57,16 +57,6 @@
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb17-17.html"
},
{
"name" : "GLSA-201707-15",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201707-15"
},
{
"name" : "RHSA-2017:1439",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1439"
},
{
"name": "99023",
"refsource": "BID",
@ -76,6 +66,16 @@
"name": "1038655",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038655"
},
{
"name": "RHSA-2017:1439",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1439"
},
{
"name": "GLSA-201707-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201707-15"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20170320 CVE-2017-7183 ExtraPuTTY v029_RC2 TFTP Denial Of Service",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/540300/100/0/threaded"
},
{
"name" : "41639",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/41639/"
"name": "96973",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96973"
},
{
"name": "http://packetstormsecurity.com/files/141705/ExtraPuTTY-029_rc2-Denial-Of-Service.html",
@ -68,9 +63,14 @@
"url": "http://packetstormsecurity.com/files/141705/ExtraPuTTY-029_rc2-Denial-Of-Service.html"
},
{
"name" : "96973",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96973"
"name": "41639",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41639/"
},
{
"name": "20170320 CVE-2017-7183 ExtraPuTTY v029_RC2 TFTP Denial Of Service",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/540300/100/0/threaded"
}
]
}

View File

@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "http://x-stream.github.io/CVE-2017-7957.html",
"refsource" : "CONFIRM",
"url" : "http://x-stream.github.io/CVE-2017-7957.html"
},
{
"name" : "https://www-prd-trops.events.ibm.com/node/715749",
"refsource" : "CONFIRM",
"url" : "https://www-prd-trops.events.ibm.com/node/715749"
},
{
"name" : "DSA-3841",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3841"
},
{
"name": "RHSA-2017:2888",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2888"
},
{
"name" : "RHSA-2017:2889",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:2889"
},
{
"name": "RHSA-2017:1832",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1832"
},
{
"name" : "100687",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/100687"
"name": "RHSA-2017:2889",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2889"
},
{
"name": "1039499",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039499"
},
{
"name": "https://www-prd-trops.events.ibm.com/node/715749",
"refsource": "CONFIRM",
"url": "https://www-prd-trops.events.ibm.com/node/715749"
},
{
"name": "xstream-cve20177957-dos(125800)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/125800"
},
{
"name": "DSA-3841",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3841"
},
{
"name": "http://x-stream.github.io/CVE-2017-7957.html",
"refsource": "CONFIRM",
"url": "http://x-stream.github.io/CVE-2017-7957.html"
},
{
"name": "100687",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100687"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-13260",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
"refsource" : "MISC",
"url" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
},
{
"name": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/CoinToken",
"refsource": "MISC",
"url": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/CoinToken"
},
{
"name": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
"refsource": "MISC",
"url": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/TeamSeri0us/pocs/tree/master/soundtouch/2018_09_03",
"refsource" : "MISC",
"url" : "https://github.com/TeamSeri0us/pocs/tree/master/soundtouch/2018_09_03"
},
{
"name": "https://gitlab.com/soundtouch/soundtouch/issues/14",
"refsource": "MISC",
"url": "https://gitlab.com/soundtouch/soundtouch/issues/14"
},
{
"name": "https://github.com/TeamSeri0us/pocs/tree/master/soundtouch/2018_09_03",
"refsource": "MISC",
"url": "https://github.com/TeamSeri0us/pocs/tree/master/soundtouch/2018_09_03"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44444/"
},
{
"name" : "https://wordpress.org/plugins/wp-file-upload/#developers",
"refsource" : "CONFIRM",
"url" : "https://wordpress.org/plugins/wp-file-upload/#developers"
},
{
"name": "https://www.iptanus.com/new-version-4-3-4-of-wordpress-file-upload-plugin/",
"refsource": "CONFIRM",
"url": "https://www.iptanus.com/new-version-4-3-4-of-wordpress-file-upload-plugin/"
},
{
"name": "https://wordpress.org/plugins/wp-file-upload/#developers",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/wp-file-upload/#developers"
}
]
}