mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
694d7f43dc
commit
8949b9759c
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050103 Serious Vulnerabilities In PhotoPost ReviewPost",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=110485682424110&w=2"
|
||||
"name": "reviewpost-php-file-upload(18735)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18735"
|
||||
},
|
||||
{
|
||||
"name": "http://www.gulftech.org/?node=research&article_id=00062-01022005",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://secunia.com/advisories/13697/"
|
||||
},
|
||||
{
|
||||
"name" : "reviewpost-php-file-upload(18735)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18735"
|
||||
"name": "20050103 Serious Vulnerabilities In PhotoPost ReviewPost",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=110485682424110&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "12534",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/12534"
|
||||
},
|
||||
{
|
||||
"name": "20050212 Infostring crash and shutdown in the Quake 3 engine",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://aluigi.altervista.org/adv/q3infoboom-adv.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://aluigi.altervista.org/adv/q3infoboom-adv.txt"
|
||||
},
|
||||
{
|
||||
"name" : "12534",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/12534"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://secunia.com/secunia_research/2004-20/advisory/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secunia.com/secunia_research/2004-20/advisory/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.webroot.com/services/mfp_advisory.php",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "13577",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/13577"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2004-20/advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2004-20/advisory/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050315 Few remote bugs in zPanel",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=111090324111053&w=2"
|
||||
"name": "14602",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14602"
|
||||
},
|
||||
{
|
||||
"name": "20050320 Re: Few remote bugs in zPanel",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111142323616309&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "14602",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/14602"
|
||||
},
|
||||
{
|
||||
"name": "zpanel-reinstall-security-bypass(19711)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19711"
|
||||
},
|
||||
{
|
||||
"name": "20050315 Few remote bugs in zPanel",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111090324111053&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "14749",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14749"
|
||||
},
|
||||
{
|
||||
"name": "20050329 Multiple sql injection, and xss vulnerabilities in PortalApp",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111213291118273&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://icis.digitalparadox.org/~dcrab/portalapp.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://icis.digitalparadox.org/~dcrab/portalapp.txt"
|
||||
},
|
||||
{
|
||||
"name" : "12936",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/12936"
|
||||
},
|
||||
{
|
||||
"name": "1013591",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1013591"
|
||||
},
|
||||
{
|
||||
"name" : "14749",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/14749"
|
||||
"name": "http://icis.digitalparadox.org/~dcrab/portalapp.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://icis.digitalparadox.org/~dcrab/portalapp.txt"
|
||||
},
|
||||
{
|
||||
"name": "portalapp-adclick-sql-injection(19892)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19892"
|
||||
},
|
||||
{
|
||||
"name": "12936",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/12936"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,6 +62,11 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/13041"
|
||||
},
|
||||
{
|
||||
"name": "scssboard-url-tag-xss(20021)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20021"
|
||||
},
|
||||
{
|
||||
"name": "1013659",
|
||||
"refsource": "SECTRACK",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "14694",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14694"
|
||||
},
|
||||
{
|
||||
"name" : "scssboard-url-tag-xss(20021)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20021"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050521 Cookie Cart Default Installation Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=111686721022831&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.soulblack.com.ar/repo/papers/cookiec_advisory.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.soulblack.com.ar/repo/papers/cookiec_advisory.txt"
|
||||
"name": "15448",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15448"
|
||||
},
|
||||
{
|
||||
"name": "1014026",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://securitytracker.com/id?1014026"
|
||||
},
|
||||
{
|
||||
"name" : "15448",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/15448"
|
||||
"name": "http://www.soulblack.com.ar/repo/papers/cookiec_advisory.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.soulblack.com.ar/repo/papers/cookiec_advisory.txt"
|
||||
},
|
||||
{
|
||||
"name": "20050521 Cookie Cart Default Installation Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111686721022831&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1014077",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1014077"
|
||||
},
|
||||
{
|
||||
"name": "20050530 Multiple vulnerabilities in x-cart Gold",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111748583101076&w=2"
|
||||
},
|
||||
{
|
||||
"name": "xcart-multiple-scripts-xss(20774)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20774"
|
||||
},
|
||||
{
|
||||
"name": "13817",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/13817"
|
||||
},
|
||||
{
|
||||
"name" : "1014077",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1014077"
|
||||
},
|
||||
{
|
||||
"name": "15555",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15555"
|
||||
},
|
||||
{
|
||||
"name" : "xcart-multiple-scripts-xss(20774)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20774"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://secwatch.org/advisories/secwatch/20050604_flatnuke.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secwatch.org/advisories/secwatch/20050604_flatnuke.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://flatnuke.sourceforge.net/index.php?mod=read&id=1117979256",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://flatnuke.sourceforge.net/index.php?mod=read&id=1117979256"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2005-0697",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2005/0697"
|
||||
"name": "1014114",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1014114"
|
||||
},
|
||||
{
|
||||
"name": "15603",
|
||||
@ -73,9 +63,19 @@
|
||||
"url": "http://secunia.com/advisories/15603"
|
||||
},
|
||||
{
|
||||
"name" : "1014114",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1014114"
|
||||
"name": "http://secwatch.org/advisories/secwatch/20050604_flatnuke.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secwatch.org/advisories/secwatch/20050604_flatnuke.txt"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-0697",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/0697"
|
||||
},
|
||||
{
|
||||
"name": "http://flatnuke.sourceforge.net/index.php?mod=read&id=1117979256",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://flatnuke.sourceforge.net/index.php?mod=read&id=1117979256"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.security.org.sg/vuln/spa-promail4.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.security.org.sg/vuln/spa-promail4.html"
|
||||
"name": "1014095",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1014095"
|
||||
},
|
||||
{
|
||||
"name": "spa-pro-imap-diectory-traversal(20860)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20860"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-0680",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/0680"
|
||||
},
|
||||
{
|
||||
"name" : "16989",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/16989"
|
||||
},
|
||||
{
|
||||
"name" : "1014095",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1014095"
|
||||
},
|
||||
{
|
||||
"name": "15573",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15573"
|
||||
},
|
||||
{
|
||||
"name" : "spa-pro-imap-diectory-traversal(20860)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20860"
|
||||
"name": "16989",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/16989"
|
||||
},
|
||||
{
|
||||
"name": "http://www.security.org.sg/vuln/spa-promail4.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.security.org.sg/vuln/spa-promail4.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://pridels0.blogspot.com/2005/12/link-up-gold-vuln.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://pridels0.blogspot.com/2005/12/link-up-gold-vuln.html"
|
||||
"name": "21701",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21701"
|
||||
},
|
||||
{
|
||||
"name": "15843",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/15843"
|
||||
},
|
||||
{
|
||||
"name" : "21701",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/21701"
|
||||
"name": "http://pridels0.blogspot.com/2005/12/link-up-gold-vuln.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://pridels0.blogspot.com/2005/12/link-up-gold-vuln.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "18117",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18117"
|
||||
},
|
||||
{
|
||||
"name": "http://pridels0.blogspot.com/2005/12/libertas-enterprise-cms-xss-vuln.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://pridels0.blogspot.com/2005/12/libertas-enterprise-cms-xss-vuln.html"
|
||||
},
|
||||
{
|
||||
"name" : "15950",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/15950"
|
||||
},
|
||||
{
|
||||
"name": "21819",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21819"
|
||||
},
|
||||
{
|
||||
"name" : "18117",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18117"
|
||||
"name": "15950",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15950"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090113 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller Uninitialized Memory Vulnerability",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=766"
|
||||
"name": "33250",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33250"
|
||||
},
|
||||
{
|
||||
"name": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17118",
|
||||
@ -63,20 +63,20 @@
|
||||
"url": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17118"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119"
|
||||
},
|
||||
{
|
||||
"name" : "33250",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/33250"
|
||||
"name": "20090113 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller Uninitialized Memory Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=766"
|
||||
},
|
||||
{
|
||||
"name": "1021559",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021559"
|
||||
},
|
||||
{
|
||||
"name": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119"
|
||||
},
|
||||
{
|
||||
"name": "33534",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "onm-login-sql-injection(48503)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48503"
|
||||
},
|
||||
{
|
||||
"name": "7970",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "33600",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33600"
|
||||
},
|
||||
{
|
||||
"name" : "onm-login-sql-injection(48503)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/48503"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2009-0795",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-117350-61-1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-117350-61-1"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2009-095.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2009-095.htm"
|
||||
"name": "1021840",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021840"
|
||||
},
|
||||
{
|
||||
"name": "242486",
|
||||
@ -68,9 +63,9 @@
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-242486-1"
|
||||
},
|
||||
{
|
||||
"name" : "34081",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/34081"
|
||||
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-117350-61-1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-117350-61-1"
|
||||
},
|
||||
{
|
||||
"name": "52561",
|
||||
@ -78,29 +73,34 @@
|
||||
"url": "http://osvdb.org/52561"
|
||||
},
|
||||
{
|
||||
"name" : "1021840",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1021840"
|
||||
},
|
||||
{
|
||||
"name" : "34227",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/34227"
|
||||
},
|
||||
{
|
||||
"name" : "34375",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/34375"
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2009-095.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2009-095.htm"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-0673",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0673"
|
||||
},
|
||||
{
|
||||
"name": "34227",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34227"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-0766",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0766"
|
||||
},
|
||||
{
|
||||
"name": "34375",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34375"
|
||||
},
|
||||
{
|
||||
"name": "34081",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/34081"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mega-nerd.com/erikd/Blog/CodeHacking/libsndfile/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mega-nerd.com/erikd/Blog/CodeHacking/libsndfile/"
|
||||
"name": "MDVSA-2009:132",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:132"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mega-nerd.com/libsndfile/",
|
||||
@ -63,29 +63,14 @@
|
||||
"url": "http://www.mega-nerd.com/libsndfile/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1814",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2009/dsa-1814"
|
||||
"name": "ADV-2009-1324",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1324"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200905-09",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200905-09.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2009:132",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:132"
|
||||
},
|
||||
{
|
||||
"name" : "34978",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/34978"
|
||||
},
|
||||
{
|
||||
"name" : "35076",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/35076"
|
||||
"name": "http://www.mega-nerd.com/erikd/Blog/CodeHacking/libsndfile/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mega-nerd.com/erikd/Blog/CodeHacking/libsndfile/"
|
||||
},
|
||||
{
|
||||
"name": "35247",
|
||||
@ -93,19 +78,34 @@
|
||||
"url": "http://secunia.com/advisories/35247"
|
||||
},
|
||||
{
|
||||
"name" : "35443",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/35443"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-1324",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/1324"
|
||||
"name": "DSA-1814",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2009/dsa-1814"
|
||||
},
|
||||
{
|
||||
"name": "libsndfile-aiff-voc-bo(50541)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50541"
|
||||
},
|
||||
{
|
||||
"name": "35076",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35076"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200905-09",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200905-09.xml"
|
||||
},
|
||||
{
|
||||
"name": "34978",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/34978"
|
||||
},
|
||||
{
|
||||
"name": "35443",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35443"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/0910-exploits/tftgallery-xss.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/0910-exploits/tftgallery-xss.txt"
|
||||
},
|
||||
{
|
||||
"name": "37156",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37156"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/0910-exploits/tftgallery-xss.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0910-exploits/tftgallery-xss.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "36797",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/36797"
|
||||
},
|
||||
{
|
||||
"name": "59261",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/59261"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-3026",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3026"
|
||||
},
|
||||
{
|
||||
"name": "37134",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37134"
|
||||
},
|
||||
{
|
||||
"name": "1023075",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1023075"
|
||||
},
|
||||
{
|
||||
"name": "20091022 {PRL} Pegasus Mail client BoF",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -67,31 +92,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.vupen.com/exploits/Pegasus_Mail_POP3_Message_Handling_Remote_Buffer_Overflow_Exploit_3026233.php"
|
||||
},
|
||||
{
|
||||
"name" : "36797",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/36797"
|
||||
},
|
||||
{
|
||||
"name" : "59261",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/59261"
|
||||
},
|
||||
{
|
||||
"name" : "1023075",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1023075"
|
||||
},
|
||||
{
|
||||
"name" : "37134",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/37134"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-3026",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/3026"
|
||||
},
|
||||
{
|
||||
"name": "pegasus-pop3-bo(53933)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,80 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://java.sun.com/javase/6/webnotes/6u17.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://java.sun.com/javase/6/webnotes/6u17.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200911-02",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200911-02.xml"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMU02703",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=131593453929393&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT100242",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=131593453929393&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMU02799",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02503",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=126566824131534&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT100019",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=126566824131534&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2010:084",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2009:1694",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1694.html"
|
||||
},
|
||||
{
|
||||
"name" : "270476",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270476-1"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2009:058",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "36881",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/36881"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:10328",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10328"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:6805",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6805"
|
||||
"name": "HPSBMU02799",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:8608",
|
||||
@ -133,9 +73,24 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8608"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11934",
|
||||
"name": "HPSBMU02703",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=131593453929393&w=2"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200911-02",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2009:1694",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:10328",
|
||||
"refsource": "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11934"
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10328"
|
||||
},
|
||||
{
|
||||
"name": "37231",
|
||||
@ -143,14 +98,44 @@
|
||||
"url": "http://secunia.com/advisories/37231"
|
||||
},
|
||||
{
|
||||
"name" : "37239",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/37239"
|
||||
"name": "SSRT100019",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=126566824131534&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "37386",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/37386"
|
||||
"name": "SSRT100242",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=131593453929393&w=2"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2009:058",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:6805",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6805"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-3131",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3131"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:11934",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11934"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html"
|
||||
},
|
||||
{
|
||||
"name": "http://java.sun.com/javase/6/webnotes/6u17.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://java.sun.com/javase/6/webnotes/6u17.html"
|
||||
},
|
||||
{
|
||||
"name": "37841",
|
||||
@ -158,9 +143,24 @@
|
||||
"url": "http://secunia.com/advisories/37841"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-3131",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/3131"
|
||||
"name": "270476",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270476-1"
|
||||
},
|
||||
{
|
||||
"name": "37239",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37239"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2010:084",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084"
|
||||
},
|
||||
{
|
||||
"name": "37386",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37386"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2009-4000",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "37280",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37280"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2009-48/",
|
||||
"refsource": "MISC",
|
||||
@ -62,6 +67,11 @@
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=126393370331959&w=2"
|
||||
},
|
||||
{
|
||||
"name": "1023470",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1023470"
|
||||
},
|
||||
{
|
||||
"name": "SSRT090252",
|
||||
"refsource": "HP",
|
||||
@ -71,16 +81,6 @@
|
||||
"name": "37873",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/37873"
|
||||
},
|
||||
{
|
||||
"name" : "1023470",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1023470"
|
||||
},
|
||||
{
|
||||
"name" : "37280",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/37280"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "9635",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/9635"
|
||||
},
|
||||
{
|
||||
"name": "drunkengolem-adminnews-file-include(53136)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53136"
|
||||
},
|
||||
{
|
||||
"name": "9635",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/9635"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://forum.openx.org/index.php?showtopic=503454011",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://forum.openx.org/index.php?showtopic=503454011"
|
||||
"name": "61300",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/61300"
|
||||
},
|
||||
{
|
||||
"name": "37914",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37914"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.openx.org/12/security-matters-2/",
|
||||
@ -68,14 +73,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/37457"
|
||||
},
|
||||
{
|
||||
"name" : "61300",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/61300"
|
||||
},
|
||||
{
|
||||
"name" : "37914",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/37914"
|
||||
"name": "http://forum.openx.org/index.php?showtopic=503454011",
|
||||
"refsource": "MISC",
|
||||
"url": "http://forum.openx.org/index.php?showtopic=503454011"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "cscart-productid-sql-injection(49154)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49154"
|
||||
},
|
||||
{
|
||||
"name": "8184",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "34048",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/34048"
|
||||
},
|
||||
{
|
||||
"name" : "cscart-productid-sql-injection(49154)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49154"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2012-2000",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "hp-system-health-code-execution(75316)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75316"
|
||||
},
|
||||
{
|
||||
"name": "53336",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53336"
|
||||
},
|
||||
{
|
||||
"name": "1026998",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1026998"
|
||||
},
|
||||
{
|
||||
"name": "81670",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/81670"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMU02772",
|
||||
"refsource": "HP",
|
||||
@ -62,30 +82,10 @@
|
||||
"refsource": "HP",
|
||||
"url": "http://www.securityfocus.com/archive/1/522549"
|
||||
},
|
||||
{
|
||||
"name" : "53336",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/53336"
|
||||
},
|
||||
{
|
||||
"name" : "81670",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/81670"
|
||||
},
|
||||
{
|
||||
"name" : "1026998",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1026998"
|
||||
},
|
||||
{
|
||||
"name": "49051",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/49051"
|
||||
},
|
||||
{
|
||||
"name" : "hp-system-health-code-execution(75316)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75316"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2012-2047",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2012-2563",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "53715",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53715"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kb.cert.org/vuls/id/MAPG-8R9LBY",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "VU#722963",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/722963"
|
||||
},
|
||||
{
|
||||
"name" : "53715",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/53715"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2012-2789",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/08/31/3"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
|
||||
},
|
||||
{
|
||||
"name" : "http://ffmpeg.org/security.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://ffmpeg.org/security.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=97a5addfcf0029d0f5538ed70cb38cae4108a618",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=97a5addfcf0029d0f5538ed70cb38cae4108a618"
|
||||
},
|
||||
{
|
||||
"name" : "http://libav.org/releases/libav-0.7.7.changelog",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://libav.org/releases/libav-0.7.7.changelog"
|
||||
},
|
||||
{
|
||||
"name": "http://libav.org/releases/libav-0.8.4.changelog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://libav.org/releases/libav-0.8.4.changelog"
|
||||
},
|
||||
{
|
||||
"name": "55355",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/55355"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:079",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
|
||||
},
|
||||
{
|
||||
"name" : "55355",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/55355"
|
||||
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=97a5addfcf0029d0f5538ed70cb38cae4108a618",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=97a5addfcf0029d0f5538ed70cb38cae4108a618"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
|
||||
},
|
||||
{
|
||||
"name": "http://ffmpeg.org/security.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://ffmpeg.org/security.html"
|
||||
},
|
||||
{
|
||||
"name": "http://libav.org/releases/libav-0.7.7.changelog",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://libav.org/releases/libav-0.7.7.changelog"
|
||||
},
|
||||
{
|
||||
"name": "50468",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/files/112691/WordPress-Share-And-Follow-1.80.3-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/files/112691/WordPress-Share-And-Follow-1.80.3-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "53533",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "shareandfollow-admin-xss(75616)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75616"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/files/112691/WordPress-Share-And-Follow-1.80.3-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/files/112691/WordPress-Share-And-Follow-1.80.3-Cross-Site-Scripting.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2012-6217",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2015-1922",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,15 +58,25 @@
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959650"
|
||||
},
|
||||
{
|
||||
"name" : "IT08523",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IT08523"
|
||||
"name": "75911",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75911"
|
||||
},
|
||||
{
|
||||
"name": "IT08524",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT08524"
|
||||
},
|
||||
{
|
||||
"name": "IT08523",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT08523"
|
||||
},
|
||||
{
|
||||
"name": "1032879",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032879"
|
||||
},
|
||||
{
|
||||
"name": "IT08525",
|
||||
"refsource": "AIXAPAR",
|
||||
@ -76,16 +86,6 @@
|
||||
"name": "IT08526",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT08526"
|
||||
},
|
||||
{
|
||||
"name" : "75911",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/75911"
|
||||
},
|
||||
{
|
||||
"name" : "1032879",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1032879"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2015-5560",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
|
||||
},
|
||||
{
|
||||
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201508-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201508-01"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:1603",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1603.html"
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1781",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
|
||||
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html"
|
||||
},
|
||||
{
|
||||
"name": "76289",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/76289"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1781",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
|
||||
},
|
||||
{
|
||||
"name": "1033235",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033235"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1603",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1603.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2015-5660",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://extplorer.net/news/18"
|
||||
},
|
||||
{
|
||||
"name" : "JVN#92520335",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/en/jp/JVN92520335/index.html"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2015-000126",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000126"
|
||||
},
|
||||
{
|
||||
"name": "JVN#92520335",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN92520335/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-5900",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205267",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205267"
|
||||
"name": "1033703",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033703"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-09-30-3",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name" : "1033703",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033703"
|
||||
"name": "https://support.apple.com/HT205267",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205267"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1041362",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041362"
|
||||
},
|
||||
{
|
||||
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us"
|
||||
},
|
||||
{
|
||||
"name" : "1041362",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041362"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-7030",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cybersecurity@se.com",
|
||||
"ASSIGNER": "cybersecurity@schneider-electric.com",
|
||||
"ID": "CVE-2018-7812",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "Secure@Microsoft.com",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2018-8462",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -107,15 +107,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8462"
|
||||
},
|
||||
{
|
||||
"name" : "105274",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/105274"
|
||||
},
|
||||
{
|
||||
"name": "1041629",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041629"
|
||||
},
|
||||
{
|
||||
"name": "105274",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105274"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "Secure@Microsoft.com",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2018-8466",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user