"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:09:03 +00:00
parent dc62da86c0
commit 89c0651f7c
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 4256 additions and 4256 deletions

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "oracle-appserver-webcachemanager-dos(10284)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10284.php"
},
{ {
"name": "A102802-1", "name": "A102802-1",
"refsource": "ATSTAKE", "refsource": "ATSTAKE",
"url": "http://www.atstake.com/research/advisories/2002/a102802-1.txt" "url": "http://www.atstake.com/research/advisories/2002/a102802-1.txt"
}, },
{
"name" : "http://otn.oracle.com/deploy/security/pdf/2002alert43rev1.pdf",
"refsource" : "CONFIRM",
"url" : "http://otn.oracle.com/deploy/security/pdf/2002alert43rev1.pdf"
},
{ {
"name": "5902", "name": "5902",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/5902" "url": "http://www.securityfocus.com/bid/5902"
}, },
{ {
"name" : "oracle-appserver-webcachemanager-dos(10284)", "name": "http://otn.oracle.com/deploy/security/pdf/2002alert43rev1.pdf",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "http://www.iss.net/security_center/static/10284.php" "url": "http://otn.oracle.com/deploy/security/pdf/2002alert43rev1.pdf"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "xtux-server-dos(8422)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8422.php"
},
{ {
"name": "20020309 xtux server DoS.", "name": "20020309 xtux server DoS.",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/260912" "url": "http://online.securityfocus.com/archive/1/260912"
}, },
{
"name" : "https://sourceforge.net/tracker/index.php?func=detail&aid=529046&group_id=206&atid=100206",
"refsource" : "MISC",
"url" : "https://sourceforge.net/tracker/index.php?func=detail&aid=529046&group_id=206&atid=100206"
},
{ {
"name": "4260", "name": "4260",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/4260" "url": "http://www.securityfocus.com/bid/4260"
}, },
{ {
"name" : "xtux-server-dos(8422)", "name": "https://sourceforge.net/tracker/index.php?func=detail&aid=529046&group_id=206&atid=100206",
"refsource" : "XF", "refsource": "MISC",
"url" : "http://www.iss.net/security_center/static/8422.php" "url": "https://sourceforge.net/tracker/index.php?func=detail&aid=529046&group_id=206&atid=100206"
} }
] ]
} }

View File

@ -53,65 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20021003 iDEFENSE Security Advisory 10.03.2002: Apache 1.3.x shared memory scoreboard vulnerabilities", "name": "DSA-188",
"refsource" : "VULNWATCH", "refsource": "DEBIAN",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0012.html" "url": "http://www.debian.org/security/2002/dsa-188"
},
{
"name" : "http://www.apacheweek.com/issues/02-10-04",
"refsource" : "CONFIRM",
"url" : "http://www.apacheweek.com/issues/02-10-04"
}, },
{ {
"name": "http://marc.info/?l=apache-httpd-announce&m=103367938230488&w=2", "name": "http://marc.info/?l=apache-httpd-announce&m=103367938230488&w=2",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://marc.info/?l=apache-httpd-announce&m=103367938230488&w=2" "url": "http://marc.info/?l=apache-httpd-announce&m=103367938230488&w=2"
}, },
{
"name" : "CLA-2002:530",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000530"
},
{ {
"name": "ESA-20021007-024", "name": "ESA-20021007-024",
"refsource": "ENGARDE", "refsource": "ENGARDE",
"url": "http://www.linuxsecurity.com/advisories/other_advisory-2414.html" "url": "http://www.linuxsecurity.com/advisories/other_advisory-2414.html"
}, },
{
"name" : "HPSBOV02683",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
},
{
"name" : "SSRT090208",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
},
{
"name" : "MDKSA-2002:068",
"refsource" : "MANDRAKE",
"url" : "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-068.php"
},
{
"name" : "DSA-187",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2002/dsa-187"
},
{
"name" : "DSA-188",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2002/dsa-188"
},
{
"name" : "DSA-195",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2002/dsa-195"
},
{
"name" : "20021003 [OpenPKG-SA-2002.009] OpenPKG Security Advisory (apache)",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=103376585508776&w=2"
},
{ {
"name": "20021105-01-I", "name": "20021105-01-I",
"refsource": "SGI", "refsource": "SGI",
@ -123,24 +78,69 @@
"url": "http://online.securityfocus.com/advisories/4617" "url": "http://online.securityfocus.com/advisories/4617"
}, },
{ {
"name" : "20021015 GLSA: apache", "name": "DSA-187",
"refsource" : "BUGTRAQ", "refsource": "DEBIAN",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-10/0195.html" "url": "http://www.debian.org/security/2002/dsa-187"
}, },
{ {
"name" : "20021017 TSLSA-2002-0069-apache", "name": "SSRT090208",
"refsource" : "BUGTRAQ", "refsource": "HP",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-10/0254.html" "url": "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
},
{
"name": "20021003 iDEFENSE Security Advisory 10.03.2002: Apache 1.3.x shared memory scoreboard vulnerabilities",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0012.html"
},
{
"name": "http://www.apacheweek.com/issues/02-10-04",
"refsource": "CONFIRM",
"url": "http://www.apacheweek.com/issues/02-10-04"
}, },
{ {
"name": "5884", "name": "5884",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/5884" "url": "http://www.securityfocus.com/bid/5884"
}, },
{
"name": "DSA-195",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2002/dsa-195"
},
{
"name": "20021003 [OpenPKG-SA-2002.009] OpenPKG Security Advisory (apache)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=103376585508776&w=2"
},
{ {
"name": "apache-scorecard-memory-overwrite(10280)", "name": "apache-scorecard-memory-overwrite(10280)",
"refsource": "XF", "refsource": "XF",
"url": "http://www.iss.net/security_center/static/10280.php" "url": "http://www.iss.net/security_center/static/10280.php"
},
{
"name": "MDKSA-2002:068",
"refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-068.php"
},
{
"name": "HPSBOV02683",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
},
{
"name": "CLA-2002:530",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000530"
},
{
"name": "20021017 TSLSA-2002-0069-apache",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0254.html"
},
{
"name": "20021015 GLSA: apache",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0195.html"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "cisco-ids-directory-traversal(9174)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9174.php"
},
{ {
"name": "20020524 Cisco IDS Device Manager 3.1.1 Advisory", "name": "20020524 Cisco IDS Device Manager 3.1.1 Advisory",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "4760", "name": "4760",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/4760" "url": "http://www.securityfocus.com/bid/4760"
},
{
"name" : "cisco-ids-directory-traversal(9174)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/9174.php"
} }
] ]
} }

View File

@ -58,24 +58,24 @@
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0087.html" "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0087.html"
}, },
{ {
"name" : "20020604 [DER #11] - Remotey exploitable fmt string bug in squid", "name": "msntauth-squid-format-string(9248)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://online.securityfocus.com/archive/1/275347" "url": "http://www.iss.net/security_center/static/9248.php"
}, },
{ {
"name": "http://www.squid-cache.org/Versions/v2/2.4/diff-2.4.STABLE6-2.4.STABLE7.gz", "name": "http://www.squid-cache.org/Versions/v2/2.4/diff-2.4.STABLE6-2.4.STABLE7.gz",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.squid-cache.org/Versions/v2/2.4/diff-2.4.STABLE6-2.4.STABLE7.gz" "url": "http://www.squid-cache.org/Versions/v2/2.4/diff-2.4.STABLE6-2.4.STABLE7.gz"
}, },
{
"name": "20020604 [DER #11] - Remotey exploitable fmt string bug in squid",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/275347"
},
{ {
"name": "4929", "name": "4929",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/4929" "url": "http://www.securityfocus.com/bid/4929"
},
{
"name" : "msntauth-squid-format-string(9248)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/9248.php"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "CISCO", "refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml" "url": "http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml"
}, },
{
"name" : "cisco-vpn-xml-filter(10023)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/10023.php"
},
{ {
"name": "5614", "name": "5614",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/5614" "url": "http://www.securityfocus.com/bid/5614"
},
{
"name": "cisco-vpn-xml-filter(10023)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10023.php"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20021112 EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities", "name": "6122",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html" "url": "http://www.securityfocus.com/bid/6122"
},
{
"name" : "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
"refsource" : "VULNWATCH",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html"
}, },
{ {
"name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities", "name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
@ -73,14 +68,19 @@
"url": "http://www.eeye.com/html/Research/Advisories/AD20021112.html" "url": "http://www.eeye.com/html/Research/Advisories/AD20021112.html"
}, },
{ {
"name" : "6122", "name": "20021112 EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/6122" "url": "http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html"
}, },
{ {
"name": "jrun-long-url-bo(10568)", "name": "jrun-long-url-bo(10568)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10568" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10568"
},
{
"name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.nextgenss.com/papers/hpoas.pdf",
"refsource" : "MISC",
"url" : "http://www.nextgenss.com/papers/hpoas.pdf"
},
{ {
"name": "oracle-htpprint-xss(10687)", "name": "oracle-htpprint-xss(10687)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10687" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10687"
},
{
"name": "http://www.nextgenss.com/papers/hpoas.pdf",
"refsource": "MISC",
"url": "http://www.nextgenss.com/papers/hpoas.pdf"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20021016 NSSI-2002-zonealarm3: ZoneAlarm Pro Denial of Service Vulnerability", "name": "5975",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/295434" "url": "http://www.securityfocus.com/bid/5975"
}, },
{ {
"name": "20021017 Re: NSSI-2002-zonealarm3: ZoneAlarm Pro Denial of Service Vulnerability", "name": "20021017 Re: NSSI-2002-zonealarm3: ZoneAlarm Pro Denial of Service Vulnerability",
@ -63,9 +63,9 @@
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0238.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0238.html"
}, },
{ {
"name" : "5975", "name": "20021016 NSSI-2002-zonealarm3: ZoneAlarm Pro Denial of Service Vulnerability",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/5975" "url": "http://www.securityfocus.com/archive/1/295434"
}, },
{ {
"name": "zonealarm-synflood-dos(10379)", "name": "zonealarm-synflood-dos(10379)",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20021006 phpSecurePages & Killer Protection ( PHP )", "name": "killer-protection-vars-password(10315)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://online.securityfocus.com/archive/1/294208" "url": "http://www.iss.net/security_center/static/10315.php"
}, },
{ {
"name": "5905", "name": "5905",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/5905" "url": "http://www.securityfocus.com/bid/5905"
}, },
{ {
"name" : "killer-protection-vars-password(10315)", "name": "20021006 phpSecurePages & Killer Protection ( PHP )",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "http://www.iss.net/security_center/static/10315.php" "url": "http://online.securityfocus.com/archive/1/294208"
} }
] ]
} }

View File

@ -53,124 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20050712 MITKRB5-SA-2005-002: buffer overflow, heap corruption in KDC", "name": "kerberos-kdc-krb5-udp-tcp-bo(21328)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://marc.info/?l=bugtraq&m=112122123211974&w=2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21328"
},
{
"name" : "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt",
"refsource" : "CONFIRM",
"url" : "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt"
},
{
"name" : "IY85474",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474"
},
{
"name" : "APPLE-SA-2005-08-15",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
},
{
"name" : "APPLE-SA-2005-08-17",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
},
{
"name" : "DSA-757",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-757"
},
{
"name" : "RHSA-2005:562",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-562.html"
},
{
"name" : "RHSA-2005:567",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-567.html"
},
{
"name" : "20050703-01-U",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc"
},
{
"name" : "101809",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1"
},
{
"name" : "SUSE-SR:2005:017",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2005_17_sr.html"
},
{
"name" : "TLSA-2005-78",
"refsource" : "TURBO",
"url" : "http://www.turbolinux.com/security/2005/TLSA-2005-78.txt"
},
{
"name" : "2005-0036",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2005/0036"
},
{
"name" : "USN-224-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/224-1/"
},
{
"name" : "VU#885830",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/885830"
},
{
"name" : "14236",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/14236"
},
{
"name" : "oval:org.mitre.oval:def:9902",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902"
},
{
"name" : "ADV-2005-1066",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/1066"
},
{
"name" : "ADV-2006-2074",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2074"
},
{
"name" : "oval:org.mitre.oval:def:736",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A736"
},
{
"name" : "1014460",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1014460"
},
{
"name" : "16041",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/16041"
},
{
"name" : "17899",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17899"
},
{
"name" : "17135",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17135"
}, },
{ {
"name": "20364", "name": "20364",
@ -178,9 +63,124 @@
"url": "http://secunia.com/advisories/20364" "url": "http://secunia.com/advisories/20364"
}, },
{ {
"name" : "kerberos-kdc-krb5-udp-tcp-bo(21328)", "name": "RHSA-2005:567",
"refsource" : "XF", "refsource": "REDHAT",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/21328" "url": "http://www.redhat.com/support/errata/RHSA-2005-567.html"
},
{
"name": "oval:org.mitre.oval:def:736",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A736"
},
{
"name": "SUSE-SR:2005:017",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2005_17_sr.html"
},
{
"name": "14236",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14236"
},
{
"name": "20050712 MITKRB5-SA-2005-002: buffer overflow, heap corruption in KDC",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112122123211974&w=2"
},
{
"name": "1014460",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014460"
},
{
"name": "ADV-2006-2074",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2074"
},
{
"name": "RHSA-2005:562",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-562.html"
},
{
"name": "101809",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1"
},
{
"name": "TLSA-2005-78",
"refsource": "TURBO",
"url": "http://www.turbolinux.com/security/2005/TLSA-2005-78.txt"
},
{
"name": "IY85474",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474"
},
{
"name": "oval:org.mitre.oval:def:9902",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902"
},
{
"name": "20050703-01-U",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc"
},
{
"name": "16041",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16041"
},
{
"name": "USN-224-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/224-1/"
},
{
"name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt",
"refsource": "CONFIRM",
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt"
},
{
"name": "DSA-757",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-757"
},
{
"name": "APPLE-SA-2005-08-15",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
},
{
"name": "17135",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17135"
},
{
"name": "17899",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17899"
},
{
"name": "ADV-2005-1066",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/1066"
},
{
"name": "APPLE-SA-2005-08-17",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
},
{
"name": "VU#885830",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/885830"
},
{
"name": "2005-0036",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2005/0036"
} }
] ]
} }

View File

@ -53,30 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "PK77505", "name": "ADV-2009-0854",
"refsource" : "AIXAPAR", "refsource": "VUPEN",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PK77505" "url": "http://www.vupen.com/english/advisories/2009/0854"
},
{
"name" : "PK81212",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PK81212"
},
{
"name" : "PK82988",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PK82988"
},
{
"name" : "34001",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/34001"
}, },
{ {
"name": "34259", "name": "34259",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/34259" "url": "http://www.securityfocus.com/bid/34259"
}, },
{
"name": "ADV-2009-0607",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0607"
},
{ {
"name": "34131", "name": "34131",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -88,14 +78,24 @@
"url": "http://secunia.com/advisories/34461" "url": "http://secunia.com/advisories/34461"
}, },
{ {
"name" : "ADV-2009-0607", "name": "PK81212",
"refsource" : "VUPEN", "refsource": "AIXAPAR",
"url" : "http://www.vupen.com/english/advisories/2009/0607" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK81212"
}, },
{ {
"name" : "ADV-2009-0854", "name": "PK77505",
"refsource" : "VUPEN", "refsource": "AIXAPAR",
"url" : "http://www.vupen.com/english/advisories/2009/0854" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK77505"
},
{
"name": "34001",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34001"
},
{
"name": "PK82988",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK82988"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2009-1168", "ID": "CVE-2009-1168",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,21 +57,11 @@
"refsource": "CISCO", "refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml" "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080aea4c9.shtml"
}, },
{
"name" : "35862",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35862"
},
{ {
"name": "oval:org.mitre.oval:def:6697", "name": "oval:org.mitre.oval:def:6697",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6697" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6697"
}, },
{
"name" : "1022619",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1022619"
},
{ {
"name": "36046", "name": "36046",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -81,6 +71,16 @@
"name": "ADV-2009-2082", "name": "ADV-2009-2082",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2082" "url": "http://www.vupen.com/english/advisories/2009/2082"
},
{
"name": "1022619",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022619"
},
{
"name": "35862",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35862"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2009-1537", "ID": "CVE-2009-1537",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,69 +53,69 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://isc.sans.org/diary.html?storyid=6481", "name": "MS09-028",
"refsource" : "MISC", "refsource": "MS",
"url" : "http://isc.sans.org/diary.html?storyid=6481" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028"
},
{
"name" : "http://blogs.technet.com/msrc/archive/2009/05/28/microsoft-security-advisory-971778-vulnerability-in-microsoft-directshow-released.aspx",
"refsource" : "CONFIRM",
"url" : "http://blogs.technet.com/msrc/archive/2009/05/28/microsoft-security-advisory-971778-vulnerability-in-microsoft-directshow-released.aspx"
}, },
{ {
"name": "http://blogs.technet.com/srd/archive/2009/05/28/new-vulnerability-in-quicktime-parsing.aspx", "name": "http://blogs.technet.com/srd/archive/2009/05/28/new-vulnerability-in-quicktime-parsing.aspx",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://blogs.technet.com/srd/archive/2009/05/28/new-vulnerability-in-quicktime-parsing.aspx" "url": "http://blogs.technet.com/srd/archive/2009/05/28/new-vulnerability-in-quicktime-parsing.aspx"
}, },
{
"name" : "http://www.microsoft.com/technet/security/advisory/971778.mspx",
"refsource" : "CONFIRM",
"url" : "http://www.microsoft.com/technet/security/advisory/971778.mspx"
},
{
"name" : "MS09-028",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028"
},
{
"name" : "TA09-195A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-195A.html"
},
{
"name" : "35139",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35139"
},
{
"name" : "54797",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/54797"
},
{ {
"name": "oval:org.mitre.oval:def:6237", "name": "oval:org.mitre.oval:def:6237",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6237" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6237"
}, },
{
"name" : "1022299",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1022299"
},
{ {
"name": "35268", "name": "35268",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35268" "url": "http://secunia.com/advisories/35268"
}, },
{ {
"name" : "ADV-2009-1445", "name": "1022299",
"refsource" : "VUPEN", "refsource": "SECTRACK",
"url" : "http://www.vupen.com/english/advisories/2009/1445" "url": "http://www.securitytracker.com/id?1022299"
}, },
{ {
"name": "ADV-2009-1886", "name": "ADV-2009-1886",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1886" "url": "http://www.vupen.com/english/advisories/2009/1886"
},
{
"name": "ADV-2009-1445",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1445"
},
{
"name": "54797",
"refsource": "OSVDB",
"url": "http://osvdb.org/54797"
},
{
"name": "35139",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35139"
},
{
"name": "TA09-195A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-195A.html"
},
{
"name": "http://isc.sans.org/diary.html?storyid=6481",
"refsource": "MISC",
"url": "http://isc.sans.org/diary.html?storyid=6481"
},
{
"name": "http://www.microsoft.com/technet/security/advisory/971778.mspx",
"refsource": "CONFIRM",
"url": "http://www.microsoft.com/technet/security/advisory/971778.mspx"
},
{
"name": "http://blogs.technet.com/msrc/archive/2009/05/28/microsoft-security-advisory-971778-vulnerability-in-microsoft-directshow-released.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/msrc/archive/2009/05/28/microsoft-security-advisory-971778-vulnerability-in-microsoft-directshow-released.aspx"
} }
] ]
} }

View File

@ -53,24 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20090518 CVE id request: slim", "name": "54583",
"refsource" : "MLIST", "refsource": "OSVDB",
"url" : "http://www.openwall.com/lists/oss-security/2009/05/18/2" "url": "http://osvdb.org/54583"
}, },
{ {
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529306", "name": "slim-xauthority-info-disclosure(50611)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529306" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50611"
},
{
"name" : "FEDORA-2009-13551",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00000.html"
},
{
"name" : "FEDORA-2009-13552",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00009.html"
}, },
{ {
"name": "35015", "name": "35015",
@ -78,14 +68,9 @@
"url": "http://www.securityfocus.com/bid/35015" "url": "http://www.securityfocus.com/bid/35015"
}, },
{ {
"name" : "54583", "name": "FEDORA-2009-13551",
"refsource" : "OSVDB", "refsource": "FEDORA",
"url" : "http://osvdb.org/54583" "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00000.html"
},
{
"name" : "35132",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35132"
}, },
{ {
"name": "38070", "name": "38070",
@ -93,9 +78,24 @@
"url": "http://secunia.com/advisories/38070" "url": "http://secunia.com/advisories/38070"
}, },
{ {
"name" : "slim-xauthority-info-disclosure(50611)", "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529306",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50611" "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529306"
},
{
"name": "FEDORA-2009-13552",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00009.html"
},
{
"name": "[oss-security] 20090518 CVE id request: slim",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/05/18/2"
},
{
"name": "35132",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35132"
} }
] ]
} }

View File

@ -34,7 +34,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Directory traversal vulnerability in gastbuch.php in Gästebuch (Gastebuch) 1.6 allows remote attackers to read arbitrary files via a .. (dot dot) in the start parameter." "value": "Directory traversal vulnerability in gastbuch.php in G\u00e4stebuch (Gastebuch) 1.6 allows remote attackers to read arbitrary files via a .. (dot dot) in the start parameter."
} }
] ]
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "8027",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/8027"
},
{ {
"name": "33707", "name": "33707",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/33707" "url": "http://www.securityfocus.com/bid/33707"
}, },
{
"name": "8027",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/8027"
},
{ {
"name": "gastbuch-gastbuch-file-include(48644)", "name": "gastbuch-gastbuch-file-include(48644)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0042", "ID": "CVE-2012-0042",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,30 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20120111 Re: CVE request: Wireshark multiple vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/01/11/7"
},
{
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=40194",
"refsource" : "CONFIRM",
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=40194"
},
{ {
"name": "http://www.wireshark.org/security/wnpa-sec-2012-02.html", "name": "http://www.wireshark.org/security/wnpa-sec-2012-02.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2012-02.html" "url": "http://www.wireshark.org/security/wnpa-sec-2012-02.html"
}, },
{ {
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6634", "name": "54425",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6634" "url": "http://secunia.com/advisories/54425"
},
{
"name" : "GLSA-201308-05",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
}, },
{ {
"name": "RHSA-2013:0125", "name": "RHSA-2013:0125",
@ -83,29 +68,44 @@
"url": "http://rhn.redhat.com/errata/RHSA-2013-0125.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-0125.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:15368", "name": "48947",
"refsource" : "OVAL", "refsource": "SECUNIA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15368" "url": "http://secunia.com/advisories/48947"
},
{
"name": "[oss-security] 20120111 Re: CVE request: Wireshark multiple vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/01/11/7"
}, },
{ {
"name": "1026507", "name": "1026507",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026507" "url": "http://www.securitytracker.com/id?1026507"
}, },
{
"name" : "48947",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48947"
},
{ {
"name": "47494", "name": "47494",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47494" "url": "http://secunia.com/advisories/47494"
}, },
{ {
"name" : "54425", "name": "GLSA-201308-05",
"refsource" : "SECUNIA", "refsource": "GENTOO",
"url" : "http://secunia.com/advisories/54425" "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
},
{
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=40194",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=40194"
},
{
"name": "oval:org.mitre.oval:def:15368",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15368"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6634",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6634"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2012-0122", "ID": "CVE-2012-0122",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,12 +53,12 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBMU02746", "name": "SSRT100781",
"refsource": "HP", "refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/521944" "url": "http://www.securityfocus.com/archive/1/521944"
}, },
{ {
"name" : "SSRT100781", "name": "HPSBMU02746",
"refsource": "HP", "refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/521944" "url": "http://www.securityfocus.com/archive/1/521944"
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-0553", "ID": "CVE-2012-0553",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,25 +57,25 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html" "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html"
}, },
{
"name": "53372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53372"
},
{ {
"name": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow", "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow" "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow"
}, },
{
"name" : "GLSA-201308-06",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{ {
"name": "52445", "name": "52445",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52445" "url": "http://secunia.com/advisories/52445"
}, },
{ {
"name" : "53372", "name": "GLSA-201308-06",
"refsource" : "SECUNIA", "refsource": "GENTOO",
"url" : "http://secunia.com/advisories/53372" "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2748", "ID": "CVE-2012-2748",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20120619 Re: Joomla! Security News 2012-06-19",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/06/19/2"
},
{
"name" : "http://developer.joomla.org/security/news/471-20120602-core-information-disclosure",
"refsource" : "CONFIRM",
"url" : "http://developer.joomla.org/security/news/471-20120602-core-information-disclosure"
},
{ {
"name": "http://www.joomla.org/announcements/release-news/5427-joomla-255-released.html", "name": "http://www.joomla.org/announcements/release-news/5427-joomla-255-released.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.joomla.org/announcements/release-news/5427-joomla-255-released.html" "url": "http://www.joomla.org/announcements/release-news/5427-joomla-255-released.html"
}, },
{
"name" : "54073",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/54073"
},
{
"name" : "83069",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/83069"
},
{ {
"name": "49605", "name": "49605",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49605" "url": "http://secunia.com/advisories/49605"
}, },
{
"name": "[oss-security] 20120619 Re: Joomla! Security News 2012-06-19",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/06/19/2"
},
{
"name": "83069",
"refsource": "OSVDB",
"url": "http://osvdb.org/83069"
},
{
"name": "54073",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54073"
},
{ {
"name": "joomla-unspecified1-information-disclosure(76414)", "name": "joomla-unspecified1-information-disclosure(76414)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76414" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76414"
},
{
"name": "http://developer.joomla.org/security/news/471-20120602-core-information-disclosure",
"refsource": "CONFIRM",
"url": "http://developer.joomla.org/security/news/471-20120602-core-information-disclosure"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2012-2840", "ID": "CVE-2012-2840",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[libexif-devel] 20120712 libexif project security advisory July 12, 2012", "name": "54437",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://sourceforge.net/mailarchive/message.php?msg_id=29534027" "url": "http://www.securityfocus.com/bid/54437"
}, },
{ {
"name": "DSA-2559", "name": "DSA-2559",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2559" "url": "http://www.debian.org/security/2012/dsa-2559"
}, },
{
"name" : "RHSA-2012:1255",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1255.html"
},
{ {
"name": "SUSE-SU-2012:0903", "name": "SUSE-SU-2012:0903",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html"
}, },
{ {
"name" : "USN-1513-1", "name": "[libexif-devel] 20120712 libexif project security advisory July 12, 2012",
"refsource" : "UBUNTU", "refsource": "MLIST",
"url" : "http://www.ubuntu.com/usn/USN-1513-1" "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29534027"
},
{
"name" : "54437",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/54437"
}, },
{ {
"name": "49988", "name": "49988",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49988" "url": "http://secunia.com/advisories/49988"
},
{
"name": "RHSA-2012:1255",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1255.html"
},
{
"name": "USN-1513-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1513-1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3378", "ID": "CVE-2012-3378",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20120705 Three CVE requests: at-spi2-atk, as31, naxsi",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/07/05/1"
},
{
"name" : "[oss-security] 20120706 Re: Three CVE requests: at-spi2-atk, as31, naxsi",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/07/06/3"
},
{ {
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026", "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026",
"refsource": "MISC", "refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026" "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026"
}, },
{
"name": "[oss-security] 20120705 Three CVE requests: at-spi2-atk, as31, naxsi",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/05/1"
},
{ {
"name": "https://bugzilla.gnome.org/show_bug.cgi?id=678348", "name": "https://bugzilla.gnome.org/show_bug.cgi?id=678348",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=678348" "url": "https://bugzilla.gnome.org/show_bug.cgi?id=678348"
},
{
"name": "[oss-security] 20120706 Re: Three CVE requests: at-spi2-atk, as31, naxsi",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/06/3"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3428", "ID": "CVE-2012-3428",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,24 +58,29 @@
"url": "https://issues.jboss.org/browse/JBPAPP-9584" "url": "https://issues.jboss.org/browse/JBPAPP-9584"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=843358", "name": "RHSA-2012:1594",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=843358" "url": "http://rhn.redhat.com/errata/RHSA-2012-1594.html"
}, },
{ {
"name": "https://issues.jboss.org/browse/JBJCA-864", "name": "https://issues.jboss.org/browse/JBJCA-864",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://issues.jboss.org/browse/JBJCA-864" "url": "https://issues.jboss.org/browse/JBJCA-864"
}, },
{
"name": "51607",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51607"
},
{ {
"name": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522", "name": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522" "url": "https://issues.jboss.org/secure/ReleaseNote.jspa?projectId=12310691&version=12319522"
}, },
{ {
"name" : "RHSA-2012:1591", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=843358",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1591.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843358"
}, },
{ {
"name": "RHSA-2012:1592", "name": "RHSA-2012:1592",
@ -83,14 +88,9 @@
"url": "http://rhn.redhat.com/errata/RHSA-2012-1592.html" "url": "http://rhn.redhat.com/errata/RHSA-2012-1592.html"
}, },
{ {
"name" : "RHSA-2012:1594", "name": "RHSA-2012:1591",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1594.html" "url": "http://rhn.redhat.com/errata/RHSA-2012-1591.html"
},
{
"name" : "51607",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51607"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3523", "ID": "CVE-2012-3523",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:156" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:156"
}, },
{
"name" : "openSUSE-SU-2012:1171",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2012-09/msg00058.html"
},
{ {
"name": "50661", "name": "50661",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50661" "url": "http://secunia.com/advisories/50661"
},
{
"name": "openSUSE-SU-2012:1171",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00058.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2012-3683", "ID": "CVE-2012-3683",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT5400",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5400"
},
{ {
"name": "http://support.apple.com/kb/HT5485", "name": "http://support.apple.com/kb/HT5485",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5485" "url": "http://support.apple.com/kb/HT5485"
}, },
{
"name": "APPLE-SA-2012-09-19-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{ {
"name": "http://support.apple.com/kb/HT5503", "name": "http://support.apple.com/kb/HT5503",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5503" "url": "http://support.apple.com/kb/HT5503"
}, },
{
"name" : "APPLE-SA-2012-07-25-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
},
{ {
"name": "APPLE-SA-2012-09-12-1", "name": "APPLE-SA-2012-09-12-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html" "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
}, },
{ {
"name" : "APPLE-SA-2012-09-19-1", "name": "APPLE-SA-2012-07-25-1",
"refsource": "APPLE", "refsource": "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html" "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT5400",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5400"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://www.httpcs.com/advisories", "name": "http://www.phplist.com/?lid=579",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "https://www.httpcs.com/advisories" "url": "http://www.phplist.com/?lid=579"
}, },
{ {
"name": "https://www.httpcs.com/advisory/httpcs1", "name": "https://www.httpcs.com/advisory/httpcs1",
@ -63,9 +63,14 @@
"url": "https://www.httpcs.com/advisory/httpcs1" "url": "https://www.httpcs.com/advisory/httpcs1"
}, },
{ {
"name" : "https://www.httpcs.com/advisory/httpcs2", "name": "https://www.httpcs.com/advisories",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://www.httpcs.com/advisory/httpcs2" "url": "https://www.httpcs.com/advisories"
},
{
"name": "https://www.httpcs.com/advisory/httpcs4",
"refsource": "MISC",
"url": "https://www.httpcs.com/advisory/httpcs4"
}, },
{ {
"name": "https://www.httpcs.com/advisory/httpcs3", "name": "https://www.httpcs.com/advisory/httpcs3",
@ -73,9 +78,9 @@
"url": "https://www.httpcs.com/advisory/httpcs3" "url": "https://www.httpcs.com/advisory/httpcs3"
}, },
{ {
"name" : "https://www.httpcs.com/advisory/httpcs4", "name": "https://www.httpcs.com/advisory/httpcs2",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://www.httpcs.com/advisory/httpcs4" "url": "https://www.httpcs.com/advisory/httpcs2"
}, },
{ {
"name": "https://www.httpcs.com/advisory/httpcs6", "name": "https://www.httpcs.com/advisory/httpcs6",
@ -86,11 +91,6 @@
"name": "https://www.httpcs.com/advisory/httpcs7", "name": "https://www.httpcs.com/advisory/httpcs7",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.httpcs.com/advisory/httpcs7" "url": "https://www.httpcs.com/advisory/httpcs7"
},
{
"name" : "http://www.phplist.com/?lid=579",
"refsource" : "CONFIRM",
"url" : "http://www.phplist.com/?lid=579"
} }
] ]
} }

View File

@ -52,36 +52,36 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.vbulletin.com/forum/showthread.php/400162-vBulletin-3-x-MAPI-Plugin-1-4-3-released-with-security-patch-04-23-2012",
"refsource" : "CONFIRM",
"url" : "https://www.vbulletin.com/forum/showthread.php/400162-vBulletin-3-x-MAPI-Plugin-1-4-3-released-with-security-patch-04-23-2012"
},
{
"name" : "https://www.vbulletin.com/forum/showthread.php/400164-vBulletin-Security-Patch-for-vBulletin-4-1-2-4-1-11-for-Suite-amp-Forum-04-23-2012",
"refsource" : "CONFIRM",
"url" : "https://www.vbulletin.com/forum/showthread.php/400164-vBulletin-Security-Patch-for-vBulletin-4-1-2-4-1-11-for-Suite-amp-Forum-04-23-2012"
},
{ {
"name": "https://www.vbulletin.com/forum/showthread.php/400165-vBulletin-Security-Patch-for-vBulletin-4-1-12-for-Suite-amp-Forum-04-23-2012", "name": "https://www.vbulletin.com/forum/showthread.php/400165-vBulletin-Security-Patch-for-vBulletin-4-1-12-for-Suite-amp-Forum-04-23-2012",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.vbulletin.com/forum/showthread.php/400165-vBulletin-Security-Patch-for-vBulletin-4-1-12-for-Suite-amp-Forum-04-23-2012" "url": "https://www.vbulletin.com/forum/showthread.php/400165-vBulletin-Security-Patch-for-vBulletin-4-1-12-for-Suite-amp-Forum-04-23-2012"
}, },
{
"name" : "53226",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/53226"
},
{ {
"name": "81474", "name": "81474",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/81474" "url": "http://osvdb.org/81474"
}, },
{
"name": "https://www.vbulletin.com/forum/showthread.php/400164-vBulletin-Security-Patch-for-vBulletin-4-1-2-4-1-11-for-Suite-amp-Forum-04-23-2012",
"refsource": "CONFIRM",
"url": "https://www.vbulletin.com/forum/showthread.php/400164-vBulletin-Security-Patch-for-vBulletin-4-1-2-4-1-11-for-Suite-amp-Forum-04-23-2012"
},
{ {
"name": "48917", "name": "48917",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48917" "url": "http://secunia.com/advisories/48917"
}, },
{
"name": "53226",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53226"
},
{
"name": "https://www.vbulletin.com/forum/showthread.php/400162-vBulletin-3-x-MAPI-Plugin-1-4-3-released-with-security-patch-04-23-2012",
"refsource": "CONFIRM",
"url": "https://www.vbulletin.com/forum/showthread.php/400162-vBulletin-3-x-MAPI-Plugin-1-4-3-released-with-security-patch-04-23-2012"
},
{ {
"name": "vbulletin-mapi-unspecified(75160)", "name": "vbulletin-mapi-unspecified(75160)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://technet.microsoft.com/security/msvr/msvr12-014", "name": "50656",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://technet.microsoft.com/security/msvr/msvr12-014" "url": "http://secunia.com/advisories/50656"
}, },
{ {
"name": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt", "name": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt",
@ -63,9 +63,9 @@
"url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt" "url": "http://code.google.com/p/sumatrapdf/source/browse/trunk/docs/releasenotes.txt"
}, },
{ {
"name" : "50656", "name": "http://technet.microsoft.com/security/msvr/msvr12-014",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/50656" "url": "http://technet.microsoft.com/security/msvr/msvr12-014"
} }
] ]
} }

View File

@ -57,16 +57,16 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/18912" "url": "http://www.exploit-db.com/exploits/18912"
}, },
{
"name" : "http://www.henryhoggard.co.uk/security/197",
"refsource" : "MISC",
"url" : "http://www.henryhoggard.co.uk/security/197"
},
{ {
"name": "53637", "name": "53637",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/53637" "url": "http://www.securityfocus.com/bid/53637"
}, },
{
"name": "http://www.henryhoggard.co.uk/security/197",
"refsource": "MISC",
"url": "http://www.henryhoggard.co.uk/security/197"
},
{ {
"name": "49215", "name": "49215",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "JVN#51274854",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN51274854/index.html"
},
{ {
"name": "99290", "name": "99290",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/99290" "url": "http://www.securityfocus.com/bid/99290"
},
{
"name": "JVN#51274854",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN51274854/index.html"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "41801", "name": "1038137",
"refsource" : "EXPLOIT-DB", "refsource": "SECTRACK",
"url" : "https://www.exploit-db.com/exploits/41801/" "url": "http://www.securitytracker.com/id/1038137"
},
{
"name" : "https://support.apple.com/HT207600",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207600"
}, },
{ {
"name": "https://support.apple.com/HT207601", "name": "https://support.apple.com/HT207601",
@ -68,9 +63,14 @@
"url": "https://support.apple.com/HT207601" "url": "https://support.apple.com/HT207601"
}, },
{ {
"name" : "https://support.apple.com/HT207617", "name": "97130",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://support.apple.com/HT207617" "url": "http://www.securityfocus.com/bid/97130"
},
{
"name": "41801",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41801/"
}, },
{ {
"name": "GLSA-201706-15", "name": "GLSA-201706-15",
@ -78,14 +78,14 @@
"url": "https://security.gentoo.org/glsa/201706-15" "url": "https://security.gentoo.org/glsa/201706-15"
}, },
{ {
"name" : "97130", "name": "https://support.apple.com/HT207600",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/97130" "url": "https://support.apple.com/HT207600"
}, },
{ {
"name" : "1038137", "name": "https://support.apple.com/HT207617",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1038137" "url": "https://support.apple.com/HT207617"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://github.com/radare/radare2/commit/252afb1cff9676f3ae1f341a28448bf2c8b6e308", "name": "96523",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://github.com/radare/radare2/commit/252afb1cff9676f3ae1f341a28448bf2c8b6e308" "url": "http://www.securityfocus.com/bid/96523"
}, },
{ {
"name": "https://github.com/radare/radare2/issues/6872", "name": "https://github.com/radare/radare2/issues/6872",
@ -63,9 +63,9 @@
"url": "https://github.com/radare/radare2/issues/6872" "url": "https://github.com/radare/radare2/issues/6872"
}, },
{ {
"name" : "96523", "name": "https://github.com/radare/radare2/commit/252afb1cff9676f3ae1f341a28448bf2c8b6e308",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/96523" "url": "https://github.com/radare/radare2/commit/252afb1cff9676f3ae1f341a28448bf2c8b6e308"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc1",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc1"
},
{ {
"name": "98951", "name": "98951",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/98951" "url": "http://www.securityfocus.com/bid/98951"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc1",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-esc1"
} }
] ]
} }

View File

@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "42955",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/42955/"
},
{
"name" : "https://support.apple.com/HT208112",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208112"
},
{
"name" : "https://support.apple.com/HT208113",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208113"
},
{
"name" : "https://support.apple.com/HT208116",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208116"
},
{ {
"name": "https://support.apple.com/HT208141", "name": "https://support.apple.com/HT208141",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT208141" "url": "https://support.apple.com/HT208141"
}, },
{
"name" : "https://support.apple.com/HT208142",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208142"
},
{
"name" : "101006",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101006"
},
{ {
"name": "1039384", "name": "1039384",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039384" "url": "http://www.securitytracker.com/id/1039384"
}, },
{
"name": "42955",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42955/"
},
{
"name": "https://support.apple.com/HT208142",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208142"
},
{
"name": "https://support.apple.com/HT208113",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208113"
},
{
"name": "101006",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101006"
},
{
"name": "https://support.apple.com/HT208112",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208112"
},
{ {
"name": "1039428", "name": "1039428",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039428" "url": "http://www.securitytracker.com/id/1039428"
},
{
"name": "https://support.apple.com/HT208116",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208116"
} }
] ]
} }

View File

@ -60,6 +60,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1041689",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041689"
},
{ {
"name": "20180919 Cisco Webex Network Recording Player Remote Code Execution Vulnerabilities", "name": "20180919 Cisco Webex Network Recording Player Remote Code Execution Vulnerabilities",
"refsource": "CISCO", "refsource": "CISCO",
@ -69,11 +74,6 @@
"name": "105374", "name": "105374",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/105374" "url": "http://www.securityfocus.com/bid/105374"
},
{
"name" : "1041689",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041689"
} }
] ]
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com", "ASSIGNER": "security@google.com",
"ID": "CVE-2018-20070", "ID": "CVE-2018-20070",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://crbug.com/895885",
"refsource" : "MISC",
"url" : "https://crbug.com/895885"
},
{ {
"name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", "name": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/895885",
"refsource": "MISC",
"url": "https://crbug.com/895885"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/mate-desktop/mate-screensaver/pull/167",
"refsource": "MISC",
"url": "https://github.com/mate-desktop/mate-screensaver/pull/167"
},
{
"name": "https://github.com/mate-desktop/mate-screensaver/issues/170",
"refsource": "MISC",
"url": "https://github.com/mate-desktop/mate-screensaver/issues/170"
},
{ {
"name": "https://github.com/mate-desktop/mate-screensaver/issues/152", "name": "https://github.com/mate-desktop/mate-screensaver/issues/152",
"refsource": "MISC", "refsource": "MISC",
@ -61,16 +71,6 @@
"name": "https://github.com/mate-desktop/mate-screensaver/issues/155", "name": "https://github.com/mate-desktop/mate-screensaver/issues/155",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/mate-desktop/mate-screensaver/issues/155" "url": "https://github.com/mate-desktop/mate-screensaver/issues/155"
},
{
"name" : "https://github.com/mate-desktop/mate-screensaver/issues/170",
"refsource" : "MISC",
"url" : "https://github.com/mate-desktop/mate-screensaver/issues/170"
},
{
"name" : "https://github.com/mate-desktop/mate-screensaver/pull/167",
"refsource" : "MISC",
"url" : "https://github.com/mate-desktop/mate-screensaver/pull/167"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/Cacti/cacti/issues/2212",
"refsource": "MISC",
"url": "https://github.com/Cacti/cacti/issues/2212"
},
{ {
"name": "https://github.com/Cacti/cacti/blob/develop/CHANGELOG", "name": "https://github.com/Cacti/cacti/blob/develop/CHANGELOG",
"refsource": "MISC", "refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://github.com/Cacti/cacti/commit/1f42478506d83d188f68ce5ff41728a7bd159f53", "name": "https://github.com/Cacti/cacti/commit/1f42478506d83d188f68ce5ff41728a7bd159f53",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/Cacti/cacti/commit/1f42478506d83d188f68ce5ff41728a7bd159f53" "url": "https://github.com/Cacti/cacti/commit/1f42478506d83d188f68ce5ff41728a7bd159f53"
},
{
"name" : "https://github.com/Cacti/cacti/issues/2212",
"refsource" : "MISC",
"url" : "https://github.com/Cacti/cacti/issues/2212"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2018-9522", "ID": "CVE-2018-9522",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2018-11-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2018-11-01"
},
{ {
"name": "105848", "name": "105848",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/105848" "url": "http://www.securityfocus.com/bid/105848"
},
{
"name": "https://source.android.com/security/bulletin/2018-11-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2018-11-01"
} }
] ]
} }