"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:36:34 +00:00
parent 694d7f43dc
commit 8949b9759c
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3628 additions and 3628 deletions

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20050103 Serious Vulnerabilities In PhotoPost ReviewPost",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=110485682424110&w=2"
"name": "reviewpost-php-file-upload(18735)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18735"
},
{
"name": "http://www.gulftech.org/?node=research&article_id=00062-01022005",
@ -68,9 +68,9 @@
"url": "http://secunia.com/advisories/13697/"
},
{
"name" : "reviewpost-php-file-upload(18735)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18735"
"name": "20050103 Serious Vulnerabilities In PhotoPost ReviewPost",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110485682424110&w=2"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "12534",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12534"
},
{
"name": "20050212 Infostring crash and shutdown in the Quake 3 engine",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "http://aluigi.altervista.org/adv/q3infoboom-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/q3infoboom-adv.txt"
},
{
"name" : "12534",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/12534"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://secunia.com/secunia_research/2004-20/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2004-20/advisory/"
},
{
"name": "http://www.webroot.com/services/mfp_advisory.php",
"refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "13577",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13577"
},
{
"name": "http://secunia.com/secunia_research/2004-20/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2004-20/advisory/"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20050315 Few remote bugs in zPanel",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=111090324111053&w=2"
"name": "14602",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14602"
},
{
"name": "20050320 Re: Few remote bugs in zPanel",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111142323616309&w=2"
},
{
"name" : "14602",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/14602"
},
{
"name": "zpanel-reinstall-security-bypass(19711)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19711"
},
{
"name": "20050315 Few remote bugs in zPanel",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111090324111053&w=2"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "14749",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14749"
},
{
"name": "20050329 Multiple sql injection, and xss vulnerabilities in PortalApp",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111213291118273&w=2"
},
{
"name" : "http://icis.digitalparadox.org/~dcrab/portalapp.txt",
"refsource" : "MISC",
"url" : "http://icis.digitalparadox.org/~dcrab/portalapp.txt"
},
{
"name" : "12936",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/12936"
},
{
"name": "1013591",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1013591"
},
{
"name" : "14749",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/14749"
"name": "http://icis.digitalparadox.org/~dcrab/portalapp.txt",
"refsource": "MISC",
"url": "http://icis.digitalparadox.org/~dcrab/portalapp.txt"
},
{
"name": "portalapp-adclick-sql-injection(19892)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19892"
},
{
"name": "12936",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12936"
}
]
}

View File

@ -62,6 +62,11 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/13041"
},
{
"name": "scssboard-url-tag-xss(20021)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20021"
},
{
"name": "1013659",
"refsource": "SECTRACK",
@ -71,11 +76,6 @@
"name": "14694",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14694"
},
{
"name" : "scssboard-url-tag-xss(20021)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20021"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20050521 Cookie Cart Default Installation Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=111686721022831&w=2"
},
{
"name" : "http://www.soulblack.com.ar/repo/papers/cookiec_advisory.txt",
"refsource" : "MISC",
"url" : "http://www.soulblack.com.ar/repo/papers/cookiec_advisory.txt"
"name": "15448",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15448"
},
{
"name": "1014026",
@ -68,9 +63,14 @@
"url": "http://securitytracker.com/id?1014026"
},
{
"name" : "15448",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/15448"
"name": "http://www.soulblack.com.ar/repo/papers/cookiec_advisory.txt",
"refsource": "MISC",
"url": "http://www.soulblack.com.ar/repo/papers/cookiec_advisory.txt"
},
{
"name": "20050521 Cookie Cart Default Installation Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111686721022831&w=2"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "1014077",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014077"
},
{
"name": "20050530 Multiple vulnerabilities in x-cart Gold",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111748583101076&w=2"
},
{
"name": "xcart-multiple-scripts-xss(20774)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20774"
},
{
"name": "13817",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/13817"
},
{
"name" : "1014077",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1014077"
},
{
"name": "15555",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15555"
},
{
"name" : "xcart-multiple-scripts-xss(20774)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20774"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://secwatch.org/advisories/secwatch/20050604_flatnuke.txt",
"refsource" : "MISC",
"url" : "http://secwatch.org/advisories/secwatch/20050604_flatnuke.txt"
},
{
"name" : "http://flatnuke.sourceforge.net/index.php?mod=read&id=1117979256",
"refsource" : "CONFIRM",
"url" : "http://flatnuke.sourceforge.net/index.php?mod=read&id=1117979256"
},
{
"name" : "ADV-2005-0697",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/0697"
"name": "1014114",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014114"
},
{
"name": "15603",
@ -73,9 +63,19 @@
"url": "http://secunia.com/advisories/15603"
},
{
"name" : "1014114",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1014114"
"name": "http://secwatch.org/advisories/secwatch/20050604_flatnuke.txt",
"refsource": "MISC",
"url": "http://secwatch.org/advisories/secwatch/20050604_flatnuke.txt"
},
{
"name": "ADV-2005-0697",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/0697"
},
{
"name": "http://flatnuke.sourceforge.net/index.php?mod=read&id=1117979256",
"refsource": "CONFIRM",
"url": "http://flatnuke.sourceforge.net/index.php?mod=read&id=1117979256"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "http://www.security.org.sg/vuln/spa-promail4.html",
"refsource" : "MISC",
"url" : "http://www.security.org.sg/vuln/spa-promail4.html"
"name": "1014095",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014095"
},
{
"name": "spa-pro-imap-diectory-traversal(20860)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20860"
},
{
"name": "ADV-2005-0680",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/0680"
},
{
"name" : "16989",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/16989"
},
{
"name" : "1014095",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1014095"
},
{
"name": "15573",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15573"
},
{
"name" : "spa-pro-imap-diectory-traversal(20860)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20860"
"name": "16989",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/16989"
},
{
"name": "http://www.security.org.sg/vuln/spa-promail4.html",
"refsource": "MISC",
"url": "http://www.security.org.sg/vuln/spa-promail4.html"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://pridels0.blogspot.com/2005/12/link-up-gold-vuln.html",
"refsource" : "MISC",
"url" : "http://pridels0.blogspot.com/2005/12/link-up-gold-vuln.html"
"name": "21701",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21701"
},
{
"name": "15843",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/15843"
},
{
"name" : "21701",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21701"
"name": "http://pridels0.blogspot.com/2005/12/link-up-gold-vuln.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2005/12/link-up-gold-vuln.html"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "18117",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18117"
},
{
"name": "http://pridels0.blogspot.com/2005/12/libertas-enterprise-cms-xss-vuln.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2005/12/libertas-enterprise-cms-xss-vuln.html"
},
{
"name" : "15950",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15950"
},
{
"name": "21819",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21819"
},
{
"name" : "18117",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18117"
"name": "15950",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15950"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20090113 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller Uninitialized Memory Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=766"
"name": "33250",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33250"
},
{
"name": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17118",
@ -63,20 +63,20 @@
"url": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17118"
},
{
"name" : "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119",
"refsource" : "CONFIRM",
"url" : "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119"
},
{
"name" : "33250",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33250"
"name": "20090113 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller Uninitialized Memory Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=766"
},
{
"name": "1021559",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021559"
},
{
"name": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119",
"refsource": "CONFIRM",
"url": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119"
},
{
"name": "33534",
"refsource": "SECUNIA",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "onm-login-sql-injection(48503)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48503"
},
{
"name": "7970",
"refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "33600",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33600"
},
{
"name" : "onm-login-sql-injection(48503)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/48503"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2009-0795",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-117350-61-1",
"refsource" : "CONFIRM",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-117350-61-1"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2009-095.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2009-095.htm"
"name": "1021840",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021840"
},
{
"name": "242486",
@ -68,9 +63,9 @@
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-242486-1"
},
{
"name" : "34081",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/34081"
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-117350-61-1",
"refsource": "CONFIRM",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-117350-61-1"
},
{
"name": "52561",
@ -78,29 +73,34 @@
"url": "http://osvdb.org/52561"
},
{
"name" : "1021840",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021840"
},
{
"name" : "34227",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34227"
},
{
"name" : "34375",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34375"
"name": "http://support.avaya.com/elmodocs2/security/ASA-2009-095.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2009-095.htm"
},
{
"name": "ADV-2009-0673",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0673"
},
{
"name": "34227",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34227"
},
{
"name": "ADV-2009-0766",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0766"
},
{
"name": "34375",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34375"
},
{
"name": "34081",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34081"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.mega-nerd.com/erikd/Blog/CodeHacking/libsndfile/",
"refsource" : "CONFIRM",
"url" : "http://www.mega-nerd.com/erikd/Blog/CodeHacking/libsndfile/"
"name": "MDVSA-2009:132",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:132"
},
{
"name": "http://www.mega-nerd.com/libsndfile/",
@ -63,29 +63,14 @@
"url": "http://www.mega-nerd.com/libsndfile/"
},
{
"name" : "DSA-1814",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1814"
"name": "ADV-2009-1324",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1324"
},
{
"name" : "GLSA-200905-09",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200905-09.xml"
},
{
"name" : "MDVSA-2009:132",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:132"
},
{
"name" : "34978",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/34978"
},
{
"name" : "35076",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35076"
"name": "http://www.mega-nerd.com/erikd/Blog/CodeHacking/libsndfile/",
"refsource": "CONFIRM",
"url": "http://www.mega-nerd.com/erikd/Blog/CodeHacking/libsndfile/"
},
{
"name": "35247",
@ -93,19 +78,34 @@
"url": "http://secunia.com/advisories/35247"
},
{
"name" : "35443",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35443"
},
{
"name" : "ADV-2009-1324",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/1324"
"name": "DSA-1814",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1814"
},
{
"name": "libsndfile-aiff-voc-bo(50541)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50541"
},
{
"name": "35076",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35076"
},
{
"name": "GLSA-200905-09",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200905-09.xml"
},
{
"name": "34978",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34978"
},
{
"name": "35443",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35443"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.org/0910-exploits/tftgallery-xss.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/0910-exploits/tftgallery-xss.txt"
},
{
"name": "37156",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37156"
},
{
"name": "http://packetstormsecurity.org/0910-exploits/tftgallery-xss.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0910-exploits/tftgallery-xss.txt"
}
]
}

View File

@ -52,6 +52,31 @@
},
"references": {
"reference_data": [
{
"name": "36797",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36797"
},
{
"name": "59261",
"refsource": "OSVDB",
"url": "http://osvdb.org/59261"
},
{
"name": "ADV-2009-3026",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3026"
},
{
"name": "37134",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37134"
},
{
"name": "1023075",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023075"
},
{
"name": "20091022 {PRL} Pegasus Mail client BoF",
"refsource": "BUGTRAQ",
@ -67,31 +92,6 @@
"refsource": "MISC",
"url": "http://www.vupen.com/exploits/Pegasus_Mail_POP3_Message_Handling_Remote_Buffer_Overflow_Exploit_3026233.php"
},
{
"name" : "36797",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/36797"
},
{
"name" : "59261",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/59261"
},
{
"name" : "1023075",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1023075"
},
{
"name" : "37134",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37134"
},
{
"name" : "ADV-2009-3026",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/3026"
},
{
"name": "pegasus-pop3-bo(53933)",
"refsource": "XF",

View File

@ -52,80 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "http://java.sun.com/javase/6/webnotes/6u17.html",
"refsource" : "CONFIRM",
"url" : "http://java.sun.com/javase/6/webnotes/6u17.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html"
},
{
"name" : "GLSA-200911-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"name" : "HPSBMU02703",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=131593453929393&w=2"
},
{
"name" : "SSRT100242",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=131593453929393&w=2"
},
{
"name" : "HPSBMU02799",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
},
{
"name": "HPSBUX02503",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=126566824131534&w=2"
},
{
"name" : "SSRT100019",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=126566824131534&w=2"
},
{
"name" : "MDVSA-2010:084",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084"
},
{
"name" : "RHSA-2009:1694",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1694.html"
},
{
"name" : "270476",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270476-1"
},
{
"name" : "SUSE-SA:2009:058",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html"
},
{
"name": "36881",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36881"
},
{
"name" : "oval:org.mitre.oval:def:10328",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10328"
},
{
"name" : "oval:org.mitre.oval:def:6805",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6805"
"name": "HPSBMU02799",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
},
{
"name": "oval:org.mitre.oval:def:8608",
@ -133,9 +73,24 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8608"
},
{
"name" : "oval:org.mitre.oval:def:11934",
"name": "HPSBMU02703",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=131593453929393&w=2"
},
{
"name": "GLSA-200911-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"name": "RHSA-2009:1694",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html"
},
{
"name": "oval:org.mitre.oval:def:10328",
"refsource": "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11934"
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10328"
},
{
"name": "37231",
@ -143,14 +98,44 @@
"url": "http://secunia.com/advisories/37231"
},
{
"name" : "37239",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37239"
"name": "SSRT100019",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=126566824131534&w=2"
},
{
"name" : "37386",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37386"
"name": "SSRT100242",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=131593453929393&w=2"
},
{
"name": "SUSE-SA:2009:058",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00010.html"
},
{
"name": "oval:org.mitre.oval:def:6805",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6805"
},
{
"name": "ADV-2009-3131",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3131"
},
{
"name": "oval:org.mitre.oval:def:11934",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11934"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html"
},
{
"name": "http://java.sun.com/javase/6/webnotes/6u17.html",
"refsource": "CONFIRM",
"url": "http://java.sun.com/javase/6/webnotes/6u17.html"
},
{
"name": "37841",
@ -158,9 +143,24 @@
"url": "http://secunia.com/advisories/37841"
},
{
"name" : "ADV-2009-3131",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/3131"
"name": "270476",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-270476-1"
},
{
"name": "37239",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37239"
},
{
"name": "MDVSA-2010:084",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:084"
},
{
"name": "37386",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37386"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2009-4000",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "37280",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37280"
},
{
"name": "http://secunia.com/secunia_research/2009-48/",
"refsource": "MISC",
@ -62,6 +67,11 @@
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=126393370331959&w=2"
},
{
"name": "1023470",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023470"
},
{
"name": "SSRT090252",
"refsource": "HP",
@ -71,16 +81,6 @@
"name": "37873",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37873"
},
{
"name" : "1023470",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1023470"
},
{
"name" : "37280",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37280"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "9635",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/9635"
},
{
"name": "drunkengolem-adminnews-file-include(53136)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53136"
},
{
"name": "9635",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/9635"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://forum.openx.org/index.php?showtopic=503454011",
"refsource" : "MISC",
"url" : "http://forum.openx.org/index.php?showtopic=503454011"
"name": "61300",
"refsource": "OSVDB",
"url": "http://osvdb.org/61300"
},
{
"name": "37914",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37914"
},
{
"name": "http://blog.openx.org/12/security-matters-2/",
@ -68,14 +73,9 @@
"url": "http://www.securityfocus.com/bid/37457"
},
{
"name" : "61300",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/61300"
},
{
"name" : "37914",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37914"
"name": "http://forum.openx.org/index.php?showtopic=503454011",
"refsource": "MISC",
"url": "http://forum.openx.org/index.php?showtopic=503454011"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "cscart-productid-sql-injection(49154)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49154"
},
{
"name": "8184",
"refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "34048",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34048"
},
{
"name" : "cscart-productid-sql-injection(49154)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49154"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2012-2000",
"STATE": "PUBLIC"
},
@ -52,6 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "hp-system-health-code-execution(75316)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75316"
},
{
"name": "53336",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53336"
},
{
"name": "1026998",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026998"
},
{
"name": "81670",
"refsource": "OSVDB",
"url": "http://osvdb.org/81670"
},
{
"name": "HPSBMU02772",
"refsource": "HP",
@ -62,30 +82,10 @@
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/522549"
},
{
"name" : "53336",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/53336"
},
{
"name" : "81670",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/81670"
},
{
"name" : "1026998",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1026998"
},
{
"name": "49051",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49051"
},
{
"name" : "hp-system-health-code-execution(75316)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75316"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2012-2047",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-2563",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "53715",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53715"
},
{
"name": "http://www.kb.cert.org/vuls/id/MAPG-8R9LBY",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "VU#722963",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/722963"
},
{
"name" : "53715",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/53715"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2012-2789",
"STATE": "PUBLIC"
},
@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/08/31/3"
},
{
"name": "[oss-security] 20120902 Re: Information on security issues fixed in ffmpeg 0.11?",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/09/02/4"
},
{
"name" : "http://ffmpeg.org/security.html",
"refsource" : "CONFIRM",
"url" : "http://ffmpeg.org/security.html"
},
{
"name" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=97a5addfcf0029d0f5538ed70cb38cae4108a618",
"refsource" : "CONFIRM",
"url" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=97a5addfcf0029d0f5538ed70cb38cae4108a618"
},
{
"name" : "http://libav.org/releases/libav-0.7.7.changelog",
"refsource" : "CONFIRM",
"url" : "http://libav.org/releases/libav-0.7.7.changelog"
},
{
"name": "http://libav.org/releases/libav-0.8.4.changelog",
"refsource": "CONFIRM",
"url": "http://libav.org/releases/libav-0.8.4.changelog"
},
{
"name": "55355",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55355"
},
{
"name": "MDVSA-2013:079",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079"
},
{
"name" : "55355",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/55355"
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=97a5addfcf0029d0f5538ed70cb38cae4108a618",
"refsource": "CONFIRM",
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=97a5addfcf0029d0f5538ed70cb38cae4108a618"
},
{
"name": "[oss-security] 20120831 Information on security issues fixed in ffmpeg 0.11?",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/08/31/3"
},
{
"name": "http://ffmpeg.org/security.html",
"refsource": "CONFIRM",
"url": "http://ffmpeg.org/security.html"
},
{
"name": "http://libav.org/releases/libav-0.7.7.changelog",
"refsource": "CONFIRM",
"url": "http://libav.org/releases/libav-0.7.7.changelog"
},
{
"name": "50468",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.org/files/112691/WordPress-Share-And-Follow-1.80.3-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/files/112691/WordPress-Share-And-Follow-1.80.3-Cross-Site-Scripting.html"
},
{
"name": "53533",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "shareandfollow-admin-xss(75616)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75616"
},
{
"name": "http://packetstormsecurity.org/files/112691/WordPress-Share-And-Follow-1.80.3-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/files/112691/WordPress-Share-And-Follow-1.80.3-Cross-Site-Scripting.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2012-6217",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-1922",
"STATE": "PUBLIC"
},
@ -58,15 +58,25 @@
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959650"
},
{
"name" : "IT08523",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IT08523"
"name": "75911",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75911"
},
{
"name": "IT08524",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT08524"
},
{
"name": "IT08523",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT08523"
},
{
"name": "1032879",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032879"
},
{
"name": "IT08525",
"refsource": "AIXAPAR",
@ -76,16 +86,6 @@
"name": "IT08526",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT08526"
},
{
"name" : "75911",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/75911"
},
{
"name" : "1032879",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032879"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-5560",
"STATE": "PUBLIC"
},
@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "GLSA-201508-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201508-01"
},
{
"name" : "RHSA-2015:1603",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1603.html"
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name" : "openSUSE-SU-2015:1781",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html"
},
{
"name": "76289",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76289"
},
{
"name": "openSUSE-SU-2015:1781",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
},
{
"name": "1033235",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033235"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
},
{
"name": "RHSA-2015:1603",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1603.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-5660",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://extplorer.net/news/18"
},
{
"name" : "JVN#92520335",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN92520335/index.html"
},
{
"name": "JVNDB-2015-000126",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000126"
},
{
"name": "JVN#92520335",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN92520335/index.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-5900",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT205267",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205267"
"name": "1033703",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033703"
},
{
"name": "APPLE-SA-2015-09-30-3",
@ -63,9 +63,9 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
},
{
"name" : "1033703",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033703"
"name": "https://support.apple.com/HT205267",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205267"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1041362",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041362"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us"
},
{
"name" : "1041362",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041362"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-7030",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cybersecurity@se.com",
"ASSIGNER": "cybersecurity@schneider-electric.com",
"ID": "CVE-2018-7812",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8462",
"STATE": "PUBLIC"
},
@ -107,15 +107,15 @@
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8462"
},
{
"name" : "105274",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/105274"
},
{
"name": "1041629",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041629"
},
{
"name": "105274",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105274"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8466",
"STATE": "PUBLIC"
},