mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
b93ee42f22
commit
97a4ac4400
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "g6ftp-username-dos(3513)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3513"
|
||||
},
|
||||
{
|
||||
"name": "19991117 Remote D.o.S Attack in G6 FTP Server v2.0 (beta 4/5) Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "805",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/805"
|
||||
},
|
||||
{
|
||||
"name" : "g6ftp-username-dos(3513)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/3513"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,6 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=96994604300675&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2000:066",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2000-066.html"
|
||||
},
|
||||
{
|
||||
"name" : "20001004 Immunix OS Security Update for lpr",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://online.securityfocus.com/archive/1/137555"
|
||||
},
|
||||
{
|
||||
"name": "lpr-checkremote-format-string(5286)",
|
||||
"refsource": "XF",
|
||||
@ -76,6 +66,16 @@
|
||||
"name": "1711",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/1711"
|
||||
},
|
||||
{
|
||||
"name": "20001004 Immunix OS Security Update for lpr",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://online.securityfocus.com/archive/1/137555"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2000:066",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2000-066.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050624 Solaris 10 /usr/sbin/traceroute vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=111963068714114&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20050624 Re: Solaris 10 /usr/sbin/traceroute vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111964580023012&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20050624 Solaris 10 /usr/sbin/traceroute vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111963068714114&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20050624 Re: [Full-disclosure] Solaris 10 /usr/sbin/traceroute vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102060-1"
|
||||
},
|
||||
{
|
||||
"name" : "14049",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/14049"
|
||||
"name": "1015261",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015261"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-2564",
|
||||
@ -83,9 +83,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2564"
|
||||
},
|
||||
{
|
||||
"name" : "1015261",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015261"
|
||||
"name": "14049",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/14049"
|
||||
},
|
||||
{
|
||||
"name": "17708",
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.niscc.gov.uk/niscc/docs/br-20050812-00673.html?lang=en",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.niscc.gov.uk/niscc/docs/br-20050812-00673.html?lang=en"
|
||||
},
|
||||
{
|
||||
"name" : "14562",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/14562"
|
||||
"name": "mindalign-bypass-authentication(21838)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21838"
|
||||
},
|
||||
{
|
||||
"name": "18756",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/18756"
|
||||
},
|
||||
{
|
||||
"name": "14562",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/14562"
|
||||
},
|
||||
{
|
||||
"name": "http://www.niscc.gov.uk/niscc/docs/br-20050812-00673.html?lang=en",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.niscc.gov.uk/niscc/docs/br-20050812-00673.html?lang=en"
|
||||
},
|
||||
{
|
||||
"name": "16408",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/16408"
|
||||
},
|
||||
{
|
||||
"name" : "mindalign-bypass-authentication(21838)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/21838"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050822 [SECURITYREASON.COM] Multiple vulnerabilities in PostNuke 0.760-RC4b=>x cXIb8O3.15",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/408818"
|
||||
},
|
||||
{
|
||||
"name": "14636",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/14636"
|
||||
},
|
||||
{
|
||||
"name": "20050822 [SECURITYREASON.COM] Multiple vulnerabilities in PostNuke 0.760-RC4b=>x cXIb8O3.15",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/408818"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=112605610624004&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://rgod.altervista.org/phpccal.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://rgod.altervista.org/phpccal.html"
|
||||
},
|
||||
{
|
||||
"name": "phpcommunitycalendar-admin-bypass-security(22182)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22182"
|
||||
},
|
||||
{
|
||||
"name": "http://rgod.altervista.org/phpccal.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://rgod.altervista.org/phpccal.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2005-2978",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278"
|
||||
"name": "USN-210-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/210-1/"
|
||||
},
|
||||
{
|
||||
"name": "1015071",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015071"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-2133",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2133"
|
||||
},
|
||||
{
|
||||
"name": "17282",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17282"
|
||||
},
|
||||
{
|
||||
"name": "DSA-878",
|
||||
@ -63,24 +78,49 @@
|
||||
"url": "http://www.debian.org/security/2005/dsa-878"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200510-18",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml"
|
||||
"name": "17221",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17221"
|
||||
},
|
||||
{
|
||||
"name": "17357",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17357"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2005:793",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-793.html"
|
||||
},
|
||||
{
|
||||
"name": "17256",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17256"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278"
|
||||
},
|
||||
{
|
||||
"name": "17265",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17265"
|
||||
},
|
||||
{
|
||||
"name": "17222",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17222"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2005:024",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2005_24_sr.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-210-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/210-1/"
|
||||
"name": "GLSA-200510-18",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml"
|
||||
},
|
||||
{
|
||||
"name": "15128",
|
||||
@ -91,46 +131,6 @@
|
||||
"name": "oval:org.mitre.oval:def:10135",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2005-2133",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2005/2133"
|
||||
},
|
||||
{
|
||||
"name" : "1015071",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1015071"
|
||||
},
|
||||
{
|
||||
"name" : "17357",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/17357"
|
||||
},
|
||||
{
|
||||
"name" : "17221",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/17221"
|
||||
},
|
||||
{
|
||||
"name" : "17222",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/17222"
|
||||
},
|
||||
{
|
||||
"name" : "17256",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/17256"
|
||||
},
|
||||
{
|
||||
"name" : "17265",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/17265"
|
||||
},
|
||||
{
|
||||
"name" : "17282",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/17282"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070313 Unrarlib 0.4.0 (urarlib_get) Local buffer overflow",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://marc.info/?l=full-disclosure&m=117392197607422&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://unrarlib.svn.sourceforge.net/viewvc/unrarlib/tags/unrarlib040/unrarlib/unrarlib.c?revision=3&view=markup",
|
||||
"refsource": "MISC",
|
||||
"url": "http://unrarlib.svn.sourceforge.net/viewvc/unrarlib/tags/unrarlib040/unrarlib/unrarlib.c?revision=3&view=markup"
|
||||
},
|
||||
{
|
||||
"name": "34076",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34076"
|
||||
},
|
||||
{
|
||||
"name": "24472",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24472"
|
||||
},
|
||||
{
|
||||
"name": "22942",
|
||||
"refsource": "BID",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/0961"
|
||||
},
|
||||
{
|
||||
"name" : "34076",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/34076"
|
||||
},
|
||||
{
|
||||
"name" : "24472",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/24472"
|
||||
"name": "20070313 Unrarlib 0.4.0 (urarlib_get) Local buffer overflow",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://marc.info/?l=full-disclosure&m=117392197607422&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,25 +57,25 @@
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/jp/JVN%2370075625/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "25843",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/25843"
|
||||
},
|
||||
{
|
||||
"name": "41380",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/41380"
|
||||
},
|
||||
{
|
||||
"name": "aipo-aipoasp-session-hijacking(36850)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36850"
|
||||
},
|
||||
{
|
||||
"name": "27004",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27004"
|
||||
},
|
||||
{
|
||||
"name" : "aipo-aipoasp-session-hijacking(36850)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36850"
|
||||
"name": "25843",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25843"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071004 DDIVRT-2007-05 NetSupport Manager Client Buffer Overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/481537/100/0/threaded"
|
||||
"name": "netsupport-unspecified-dos(36963)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36963"
|
||||
},
|
||||
{
|
||||
"name": "http://www.netsupportsoftware.com/support/td.asp?td=545&Site=nsltd&Lang=",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.netsupportsoftware.com/support/td.asp?td=545&Site=nsltd&Lang="
|
||||
},
|
||||
{
|
||||
"name": "3198",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3198"
|
||||
},
|
||||
{
|
||||
"name": "20071004 DDIVRT-2007-05 NetSupport Manager Client Buffer Overflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/481537/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "25932",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/25932"
|
||||
},
|
||||
{
|
||||
"name" : "1018774",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1018774"
|
||||
},
|
||||
{
|
||||
"name": "27082",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/27082"
|
||||
},
|
||||
{
|
||||
"name" : "3198",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3198"
|
||||
},
|
||||
{
|
||||
"name" : "netsupport-unspecified-dos(36963)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36963"
|
||||
"name": "1018774",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1018774"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2009-2532",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/9153"
|
||||
},
|
||||
{
|
||||
"name" : "55856",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/55856"
|
||||
},
|
||||
{
|
||||
"name": "35842",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35842"
|
||||
},
|
||||
{
|
||||
"name": "55856",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/55856"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "9129",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/9129"
|
||||
"name": "35787",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35787"
|
||||
},
|
||||
{
|
||||
"name": "35637",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/35637"
|
||||
},
|
||||
{
|
||||
"name": "censura-itemid-sql-injection(51663)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51663"
|
||||
},
|
||||
{
|
||||
"name": "55790",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/55790"
|
||||
},
|
||||
{
|
||||
"name" : "35787",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/35787"
|
||||
},
|
||||
{
|
||||
"name" : "censura-itemid-sql-injection(51663)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51663"
|
||||
"name": "9129",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/9129"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2015-0060",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-010"
|
||||
},
|
||||
{
|
||||
"name" : "72472",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/72472"
|
||||
},
|
||||
{
|
||||
"name": "ms-kmd-cve20150060-dos(100434)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100434"
|
||||
},
|
||||
{
|
||||
"name": "72472",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72472"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/01/29/6"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.drupal.org/node/2407347",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.drupal.org/node/2407347"
|
||||
"name": "72365",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72365"
|
||||
},
|
||||
{
|
||||
"name": "https://www.drupal.org/node/2407145",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "https://www.drupal.org/node/2407145"
|
||||
},
|
||||
{
|
||||
"name" : "72365",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/72365"
|
||||
"name": "https://www.drupal.org/node/2407347",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.drupal.org/node/2407347"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/01/29/6"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.phpmyadmin.net/home_page/security/PMASA-2015-2.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.phpmyadmin.net/home_page/security/PMASA-2015-2.php"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/phpmyadmin/phpmyadmin/commit/ee92eb9bab8e2d546756c1d4aec81ec7c8e44b83",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/phpmyadmin/phpmyadmin/commit/ee92eb9bab8e2d546756c1d4aec81ec7c8e44b83"
|
||||
"name": "openSUSE-SU-2015:1191",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3382",
|
||||
@ -68,19 +63,24 @@
|
||||
"url": "http://www.debian.org/security/2015/dsa-3382"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1191",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-07/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name" : "74657",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/74657"
|
||||
"name": "https://github.com/phpmyadmin/phpmyadmin/commit/ee92eb9bab8e2d546756c1d4aec81ec7c8e44b83",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/phpmyadmin/phpmyadmin/commit/ee92eb9bab8e2d546756c1d4aec81ec7c8e44b83"
|
||||
},
|
||||
{
|
||||
"name": "1032404",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032404"
|
||||
},
|
||||
{
|
||||
"name": "http://www.phpmyadmin.net/home_page/security/PMASA-2015-2.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.phpmyadmin.net/home_page/security/PMASA-2015-2.php"
|
||||
},
|
||||
{
|
||||
"name": "74657",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/74657"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2015-4242",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,45 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150603 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/06/03/6"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20150615 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/06/16/4"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1227243",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1227243"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3302",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3302"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2015-9674",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160668.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201602-03",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201602-03"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:1917",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1917.html"
|
||||
"name": "[oss-security] 20150603 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/06/03/6"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1132",
|
||||
@ -98,20 +68,40 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1134",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html"
|
||||
"name": "GLSA-201602-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201602-03"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1212",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html"
|
||||
"name": "FEDORA-2015-9674",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160668.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-2670-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2670-1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1227243",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227243"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1134",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150615 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/06/16/4"
|
||||
},
|
||||
{
|
||||
"name": "75230",
|
||||
"refsource": "BID",
|
||||
@ -121,6 +111,16 @@
|
||||
"name": "1032771",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1032771"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1212",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1917",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1917.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2015-4762",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
|
||||
},
|
||||
{
|
||||
"name": "1033877",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033877"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2015-4799",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-8493",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://blog.ensilo.com/the-av-vulnerability-that-bypasses-mitigations",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blog.ensilo.com/the-av-vulnerability-that-bypasses-mitigations"
|
||||
"name": "78810",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/78810"
|
||||
},
|
||||
{
|
||||
"name": "http://breakingmalware.com/vulnerabilities/sedating-watchdog-abusing-security-products-bypass-mitigations/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://breakingmalware.com/vulnerabilities/sedating-watchdog-abusing-security-products-bypass-mitigations/"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.ensilo.com/the-av-vulnerability-that-bypasses-mitigations",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.ensilo.com/the-av-vulnerability-that-bypasses-mitigations"
|
||||
},
|
||||
{
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10142",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10142"
|
||||
},
|
||||
{
|
||||
"name" : "78810",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/78810"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=d48b0eff28c995947ac3f8d842ddd9b50dd5798d",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=d48b0eff28c995947ac3f8d842ddd9b50dd5798d"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/security/wnpa-sec-2015-60.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11931"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=d48b0eff28c995947ac3f8d842ddd9b50dd5798d",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=d48b0eff28c995947ac3f8d842ddd9b50dd5798d"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201604-05",
|
||||
"refsource": "GENTOO",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-8908",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2016-1064",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
|
||||
},
|
||||
{
|
||||
"name": "1035828",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1035828"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"ID": "CVE-2016-5761",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html"
|
||||
},
|
||||
{
|
||||
"name": "20160825 SEC Consult SA-20160825-0 :: Multiple vulnerabilities in Micro Focus (Novell) GroupWise",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/539296/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "92645",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92645"
|
||||
},
|
||||
{
|
||||
"name": "20160825 SEC Consult SA-20160825-0 :: Multiple vulnerabilities in Micro Focus (Novell) GroupWise",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2016/Aug/123"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160825-0_Micro_Focus_GroupWise_Multiple_vulnerabilities_v10.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160825-0_Micro_Focus_GroupWise_Multiple_vulnerabilities_v10.txt"
|
||||
},
|
||||
{
|
||||
"name": "https://www.novell.com/support/kb/doc.php?id=7017974",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.novell.com/support/kb/doc.php?id=7017974"
|
||||
},
|
||||
{
|
||||
"name" : "92645",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/92645"
|
||||
"name": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160825-0_Micro_Focus_GroupWise_Multiple_vulnerabilities_v10.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160825-0_Micro_Focus_GroupWise_Multiple_vulnerabilities_v10.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-2140",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-2194",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -74,9 +74,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://launchpad.support.sap.com/#/notes/2372688",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://launchpad.support.sap.com/#/notes/2372688"
|
||||
"name": "103703",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103703"
|
||||
},
|
||||
{
|
||||
"name": "https://blogs.sap.com/2018/04/10/sap-security-patch-day-april-2018/",
|
||||
@ -84,9 +84,9 @@
|
||||
"url": "https://blogs.sap.com/2018/04/10/sap-security-patch-day-april-2018/"
|
||||
},
|
||||
{
|
||||
"name" : "103703",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/103703"
|
||||
"name": "https://launchpad.support.sap.com/#/notes/2372688",
|
||||
"refsource": "MISC",
|
||||
"url": "https://launchpad.support.sap.com/#/notes/2372688"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -54,9 +54,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
"name": "1040698",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040698"
|
||||
},
|
||||
{
|
||||
"name": "https://security.netapp.com/advisory/ntap-20180419-0002/",
|
||||
@ -68,6 +68,16 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3655"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name": "103783",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103783"
|
||||
},
|
||||
{
|
||||
"name": "USN-3629-1",
|
||||
"refsource": "UBUNTU",
|
||||
@ -77,16 +87,6 @@
|
||||
"name": "USN-3629-3",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3629-3/"
|
||||
},
|
||||
{
|
||||
"name" : "103783",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/103783"
|
||||
},
|
||||
{
|
||||
"name" : "1040698",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040698"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -54,24 +54,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.vmware.com/security/advisories/VMSA-2018-0018.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.vmware.com/security/advisories/VMSA-2018-0018.html"
|
||||
"name": "1041357",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041357"
|
||||
},
|
||||
{
|
||||
"name": "104883",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104883"
|
||||
},
|
||||
{
|
||||
"name" : "1041357",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041357"
|
||||
},
|
||||
{
|
||||
"name": "1041358",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041358"
|
||||
},
|
||||
{
|
||||
"name": "https://www.vmware.com/security/advisories/VMSA-2018-0018.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0018.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/Studio-42/elFinder/commit/f133163f2d754584de65d718b2fde96191557316",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/Studio-42/elFinder/commit/f133163f2d754584de65d718b2fde96191557316"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Studio-42/elFinder/releases/tag/2.1.45",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/Studio-42/elFinder/releases/tag/2.1.45"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Studio-42/elFinder/commit/f133163f2d754584de65d718b2fde96191557316",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/Studio-42/elFinder/commit/f133163f2d754584de65d718b2fde96191557316"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user