mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
05432b9e76
commit
99610ab358
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040222 lbreakout2 < 2.4beta-2 local exploit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=107755821705356&w=2"
|
||||
},
|
||||
{
|
||||
"name": "DSA-445",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-445"
|
||||
},
|
||||
{
|
||||
"name": "breakout2-home-bo(15229)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15229"
|
||||
},
|
||||
{
|
||||
"name": "20040222 lbreakout2 < 2.4beta-2 local exploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=107755821705356&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://security.debian.org/pool/updates/main/l/lbreakout2/lbreakout2_2.2.2-1woody1.diff.gz",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "9712",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/9712"
|
||||
},
|
||||
{
|
||||
"name" : "breakout2-home-bo(15229)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15229"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,55 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040416 void.at - neon format string bugs",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=108214147022626&w=2"
|
||||
"name": "10136",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/10136"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-487",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2004/dsa-487"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2004-1552",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://bugzilla.fedora.us/show_bug.cgi?id=1552"
|
||||
"name": "GLSA-200405-04",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200405-04.xml"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2004:157",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-157.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:158",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2004-158.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:159",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2004-159.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:160",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2004-160.html"
|
||||
},
|
||||
{
|
||||
"name" : "20040404-01-U",
|
||||
"refsource" : "SGI",
|
||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc"
|
||||
},
|
||||
{
|
||||
"name" : "SuSE-SA:2004:008",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0003.html"
|
||||
},
|
||||
{
|
||||
"name" : "SuSE-SA:2004:009",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0002.html"
|
||||
},
|
||||
{
|
||||
"name": "20040416 [OpenPKG-SA-2004.016] OpenPKG Security Advisory (neon)",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -113,9 +78,9 @@
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200405-01.xml"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200405-04",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200405-04.xml"
|
||||
"name": "RHSA-2004:160",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-160.html"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2004:032",
|
||||
@ -123,14 +88,9 @@
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:032"
|
||||
},
|
||||
{
|
||||
"name" : "10136",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/10136"
|
||||
},
|
||||
{
|
||||
"name" : "5365",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/5365"
|
||||
"name": "DSA-487",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-487"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:1065",
|
||||
@ -142,10 +102,50 @@
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10913"
|
||||
},
|
||||
{
|
||||
"name": "SuSE-SA:2004:009",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0002.html"
|
||||
},
|
||||
{
|
||||
"name": "20040404-01-U",
|
||||
"refsource": "SGI",
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2004:158",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-158.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2004:159",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-159.html"
|
||||
},
|
||||
{
|
||||
"name": "20040416 void.at - neon format string bugs",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=108214147022626&w=2"
|
||||
},
|
||||
{
|
||||
"name": "11363",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/11363"
|
||||
},
|
||||
{
|
||||
"name": "SuSE-SA:2004:008",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0003.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2004-1552",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://bugzilla.fedora.us/show_bug.cgi?id=1552"
|
||||
},
|
||||
{
|
||||
"name": "5365",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/5365"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040205 Possible Cross Site Scripting in Discuz! Board",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=107606726417150&w=2"
|
||||
},
|
||||
{
|
||||
"name": "9584",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "discuzboard-image-tag-xss(15066)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15066"
|
||||
},
|
||||
{
|
||||
"name": "20040205 Possible Cross Site Scripting in Discuz! Board",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=107606726417150&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=107755692400728&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20040222 GateKeeper Pro 4.7 buffer overflow",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/017703.html"
|
||||
},
|
||||
{
|
||||
"name": "9716",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/9716"
|
||||
},
|
||||
{
|
||||
"name": "20040222 GateKeeper Pro 4.7 buffer overflow",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/017703.html"
|
||||
},
|
||||
{
|
||||
"name": "gatekeeper-long-get-bo(15277)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,35 +53,35 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "DSA-1017",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1017"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1070",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1070"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1067",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1067"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1069",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1069"
|
||||
"name": "20163",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20163"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1082",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1082"
|
||||
},
|
||||
{
|
||||
"name": "12102",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/12102"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2005:017",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-017.html"
|
||||
},
|
||||
{
|
||||
"name": "FLSA:2336",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1070",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1070"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2004:689",
|
||||
"refsource": "REDHAT",
|
||||
@ -93,14 +93,19 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-016.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2005:017",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-017.html"
|
||||
"name": "20162",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20162"
|
||||
},
|
||||
{
|
||||
"name" : "12102",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/12102"
|
||||
"name": "DSA-1067",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1067"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1069",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1069"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:9786",
|
||||
@ -108,34 +113,29 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9786"
|
||||
},
|
||||
{
|
||||
"name" : "19374",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/19374"
|
||||
},
|
||||
{
|
||||
"name" : "20162",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20162"
|
||||
},
|
||||
{
|
||||
"name" : "20163",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20163"
|
||||
"name": "DSA-1017",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1017"
|
||||
},
|
||||
{
|
||||
"name": "20202",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20202"
|
||||
},
|
||||
{
|
||||
"name" : "20338",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20338"
|
||||
},
|
||||
{
|
||||
"name": "linux-ioedgeport-bo(18433)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18433"
|
||||
},
|
||||
{
|
||||
"name": "19374",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/19374"
|
||||
},
|
||||
{
|
||||
"name": "20338",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20338"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "11566",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11566"
|
||||
},
|
||||
{
|
||||
"name": "1012005",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1012005"
|
||||
},
|
||||
{
|
||||
"name": "http://www.pentest.co.uk/documents/ptl-2004-06.html",
|
||||
"refsource": "MISC",
|
||||
@ -77,21 +87,11 @@
|
||||
"refsource": "AUSCERT",
|
||||
"url": "http://www.auscert.org.au/render.html?it=4516"
|
||||
},
|
||||
{
|
||||
"name" : "11566",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/11566"
|
||||
},
|
||||
{
|
||||
"name": "11304",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/displayvuln.php?osvdb_id=11304"
|
||||
},
|
||||
{
|
||||
"name" : "1012005",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1012005"
|
||||
},
|
||||
{
|
||||
"name": "13036",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040902 [hackgen-2004-#001] - Non-critacal Cross-Site Scripting bug in CuteNews",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=109415338521881&w=2"
|
||||
"name": "12432",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/12432"
|
||||
},
|
||||
{
|
||||
"name": "11097",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/11097"
|
||||
},
|
||||
{
|
||||
"name" : "12432",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/12432"
|
||||
"name": "20040902 [hackgen-2004-#001] - Non-critacal Cross-Site Scripting bug in CuteNews",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=109415338521881&w=2"
|
||||
},
|
||||
{
|
||||
"name": "cutenews-mod-xss(17214)",
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://gaim.sourceforge.net/security/?id=6",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://gaim.sourceforge.net/security/?id=6"
|
||||
},
|
||||
{
|
||||
"name" : "11056",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/11056"
|
||||
"name": "gaim-content-length-dos(17150)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17150"
|
||||
},
|
||||
{
|
||||
"name": "9264",
|
||||
@ -72,15 +67,20 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1011083"
|
||||
},
|
||||
{
|
||||
"name": "http://gaim.sourceforge.net/security/?id=6",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://gaim.sourceforge.net/security/?id=6"
|
||||
},
|
||||
{
|
||||
"name": "11056",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11056"
|
||||
},
|
||||
{
|
||||
"name": "12383",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/12383"
|
||||
},
|
||||
{
|
||||
"name" : "gaim-content-length-dos(17150)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17150"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,6 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/491127/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.rooksecurity.com/blog/?p=6",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.rooksecurity.com/blog/?p=6"
|
||||
},
|
||||
{
|
||||
"name" : "28877",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28877"
|
||||
},
|
||||
{
|
||||
"name": "3834",
|
||||
"refsource": "SREASON",
|
||||
@ -76,6 +66,16 @@
|
||||
"name": "captcha-imagestring-codebg-weak-security(42152)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42152"
|
||||
},
|
||||
{
|
||||
"name": "28877",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28877"
|
||||
},
|
||||
{
|
||||
"name": "http://www.rooksecurity.com/blog/?p=6",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.rooksecurity.com/blog/?p=6"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "5608",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/5608"
|
||||
"name": "29192",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29192"
|
||||
},
|
||||
{
|
||||
"name": "metoforum-multiple-sql-injection(42390)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42390"
|
||||
},
|
||||
{
|
||||
"name": "29189",
|
||||
@ -63,14 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/29189"
|
||||
},
|
||||
{
|
||||
"name" : "29192",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29192"
|
||||
},
|
||||
{
|
||||
"name" : "30233",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30233"
|
||||
"name": "5608",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5608"
|
||||
},
|
||||
{
|
||||
"name": "metoforum-kategori-sql-injection(42398)",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42398"
|
||||
},
|
||||
{
|
||||
"name" : "metoforum-multiple-sql-injection(42390)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42390"
|
||||
"name": "30233",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30233"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081204 Joomla Component GameQ",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/498903/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20081204 Re: Joomla Component GameQ",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/498923/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "5752",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/5752"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/0806-exploits/joomlagameq-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0806-exploits/joomlagameq-sql.txt"
|
||||
},
|
||||
{
|
||||
"name" : "29592",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29592"
|
||||
},
|
||||
{
|
||||
"name" : "32633",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/32633"
|
||||
"name": "gameq-index-sql-injection(42929)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42929"
|
||||
},
|
||||
{
|
||||
"name": "30570",
|
||||
@ -88,9 +68,29 @@
|
||||
"url": "http://secunia.com/advisories/30570"
|
||||
},
|
||||
{
|
||||
"name" : "gameq-index-sql-injection(42929)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42929"
|
||||
"name": "5752",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5752"
|
||||
},
|
||||
{
|
||||
"name": "20081204 Joomla Component GameQ",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/498903/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "32633",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32633"
|
||||
},
|
||||
{
|
||||
"name": "20081204 Re: Joomla Component GameQ",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/498923/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "29592",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29592"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,31 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080704 Novell GroupWise Messenger Client (GWIM) Remote Stack Overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/493964/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5026700.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5026700.html"
|
||||
},
|
||||
{
|
||||
"name": "29602",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29602"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-1764",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/1764/references"
|
||||
},
|
||||
{
|
||||
"name" : "1020209",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1020209"
|
||||
},
|
||||
{
|
||||
"name": "30576",
|
||||
"refsource": "SECUNIA",
|
||||
@ -86,6 +66,26 @@
|
||||
"name": "groupwise-messenger-client-bo(42917)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42917"
|
||||
},
|
||||
{
|
||||
"name": "1020209",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020209"
|
||||
},
|
||||
{
|
||||
"name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5026700.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5026700.html"
|
||||
},
|
||||
{
|
||||
"name": "20080704 Novell GroupWise Messenger Client (GWIM) Remote Stack Overflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/493964/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-1764",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1764/references"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2008-2728",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2008-3086",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://drupal.org/node/274919",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://drupal.org/node/274919"
|
||||
},
|
||||
{
|
||||
"name": "29953",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29953"
|
||||
},
|
||||
{
|
||||
"name": "http://drupal.org/node/274919",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/274919"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-1931",
|
||||
"refsource": "VUPEN",
|
||||
|
@ -53,14 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6167",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6167"
|
||||
"name": "4149",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4149"
|
||||
},
|
||||
{
|
||||
"name" : "30452",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30452"
|
||||
"name": "articlefriendly-authordetail-sql-injection(44120)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44120"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2255",
|
||||
@ -73,14 +73,14 @@
|
||||
"url": "http://secunia.com/advisories/31292"
|
||||
},
|
||||
{
|
||||
"name" : "4149",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4149"
|
||||
"name": "30452",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30452"
|
||||
},
|
||||
{
|
||||
"name" : "articlefriendly-authordetail-sql-injection(44120)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44120"
|
||||
"name": "6167",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6167"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "vbulletin-admincalendar-sql-injection(46683)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46683"
|
||||
},
|
||||
{
|
||||
"name": "20081117 [waraxe-2008-SA#068] - Sql Injection in vBulletin 3.7.3.pl1",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "32735",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32735"
|
||||
},
|
||||
{
|
||||
"name" : "vbulletin-admincalendar-sql-injection(46683)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46683"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,35 +57,35 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7625"
|
||||
},
|
||||
{
|
||||
"name": "cmscout-admin-index-file-include(47660)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47660"
|
||||
},
|
||||
{
|
||||
"name": "http://www.cmscout.co.za/index.php?page=news&id=30",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.cmscout.co.za/index.php?page=news&id=30"
|
||||
},
|
||||
{
|
||||
"name" : "33068",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/33068"
|
||||
},
|
||||
{
|
||||
"name" : "51119",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/51119"
|
||||
},
|
||||
{
|
||||
"name": "51120",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/51120"
|
||||
},
|
||||
{
|
||||
"name": "33068",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33068"
|
||||
},
|
||||
{
|
||||
"name": "33375",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33375"
|
||||
},
|
||||
{
|
||||
"name" : "cmscout-admin-index-file-include(47660)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47660"
|
||||
"name": "51119",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/51119"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2013-2887",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,30 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://crbug.com/116128",
|
||||
"name": "http://crbug.com/249854",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://crbug.com/116128"
|
||||
"url": "http://crbug.com/249854"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/166916",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/166916"
|
||||
"name": "oval:org.mitre.oval:def:17741",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17741"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/172119",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/172119"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/177876",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/177876"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/220039",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/220039"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/231688",
|
||||
"refsource": "CONFIRM",
|
||||
@ -87,6 +77,31 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/232393"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/246635",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/246635"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/249064",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/249064"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2013/08/stable-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2013/08/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/116128",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/116128"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/261609",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/261609"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/234809",
|
||||
"refsource": "CONFIRM",
|
||||
@ -97,55 +112,40 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/236147"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/254159",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/254159"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/238837",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/238837"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/246635",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/246635"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/248960",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/248960"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/249064",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/249064"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/249854",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://crbug.com/249854"
|
||||
},
|
||||
{
|
||||
"name": "http://crbug.com/252848",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://crbug.com/252848"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/254159",
|
||||
"name": "http://crbug.com/166916",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://crbug.com/254159"
|
||||
"url": "http://crbug.com/166916"
|
||||
},
|
||||
{
|
||||
"name" : "http://crbug.com/261609",
|
||||
"name": "http://crbug.com/220039",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://crbug.com/261609"
|
||||
"url": "http://crbug.com/220039"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2013/08/stable-channel-update.html",
|
||||
"name": "http://crbug.com/248960",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2013/08/stable-channel-update.html"
|
||||
"url": "http://crbug.com/248960"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=274602",
|
||||
"name": "http://crbug.com/177876",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=274602"
|
||||
"url": "http://crbug.com/177876"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2741",
|
||||
@ -153,9 +153,9 @@
|
||||
"url": "http://www.debian.org/security/2013/dsa-2741"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:17741",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17741"
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=274602",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=274602"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20180627 [SECURITY] [DLA 1401-1] graphicsmagick security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name": "http://hg.code.sf.net/p/graphicsmagick/code/rev/39961adf974c",
|
||||
"refsource": "CONFIRM",
|
||||
@ -67,6 +62,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4321"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180627 [SECURITY] [DLA 1401-1] graphicsmagick security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name": "99978",
|
||||
"refsource": "BID",
|
||||
|
@ -53,79 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "42941",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/42941/"
|
||||
},
|
||||
{
|
||||
"name" : "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html"
|
||||
},
|
||||
{
|
||||
"name" : "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://thekelleys.org.uk/dnsmasq/CHANGELOG",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://thekelleys.org.uk/dnsmasq/CHANGELOG"
|
||||
},
|
||||
{
|
||||
"name" : "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc"
|
||||
},
|
||||
{
|
||||
"name" : "https://access.redhat.com/security/vulnerabilities/3199382",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://access.redhat.com/security/vulnerabilities/3199382"
|
||||
},
|
||||
{
|
||||
"name" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
|
||||
"name": "1039474",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039474"
|
||||
},
|
||||
{
|
||||
"name": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt"
|
||||
},
|
||||
{
|
||||
"name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3989",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3989"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201710-27",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201710-27"
|
||||
"name": "https://access.redhat.com/security/vulnerabilities/3199382",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://access.redhat.com/security/vulnerabilities/3199382"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2836",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2836"
|
||||
"name": "101085",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101085"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2837",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2837"
|
||||
"name": "USN-3430-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3430-1"
|
||||
},
|
||||
{
|
||||
"name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc"
|
||||
},
|
||||
{
|
||||
"name": "101977",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101977"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2838",
|
||||
@ -133,15 +98,65 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2838"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:2839",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:2839"
|
||||
"name": "VU#973527",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "https://www.kb.cert.org/vuls/id/973527"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201710-27",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201710-27"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2840",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2840"
|
||||
},
|
||||
{
|
||||
"name": "USN-3430-2",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3430-2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2839",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2839"
|
||||
},
|
||||
{
|
||||
"name": "[dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78.",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2836",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2836"
|
||||
},
|
||||
{
|
||||
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561"
|
||||
},
|
||||
{
|
||||
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2837",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2837"
|
||||
},
|
||||
{
|
||||
"name": "42941",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/42941/"
|
||||
},
|
||||
{
|
||||
"name": "http://thekelleys.org.uk/dnsmasq/CHANGELOG",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://thekelleys.org.uk/dnsmasq/CHANGELOG"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2841",
|
||||
"refsource": "REDHAT",
|
||||
@ -153,34 +168,19 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3430-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-3430-1"
|
||||
"name": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3430-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-3430-2"
|
||||
"name": "[dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION.",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#973527",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "https://www.kb.cert.org/vuls/id/973527"
|
||||
},
|
||||
{
|
||||
"name" : "101085",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/101085"
|
||||
},
|
||||
{
|
||||
"name" : "101977",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/101977"
|
||||
},
|
||||
{
|
||||
"name" : "1039474",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039474"
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://core.trac.wordpress.org/changeset/41395",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://core.trac.wordpress.org/changeset/41395"
|
||||
},
|
||||
{
|
||||
"name" : "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/"
|
||||
},
|
||||
{
|
||||
"name" : "https://wpvulndb.com/vulnerabilities/8914",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://wpvulndb.com/vulnerabilities/8914"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3997",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2017/dsa-3997"
|
||||
},
|
||||
{
|
||||
"name": "https://core.trac.wordpress.org/changeset/41395",
|
||||
"refsource": "MISC",
|
||||
"url": "https://core.trac.wordpress.org/changeset/41395"
|
||||
},
|
||||
{
|
||||
"name": "100912",
|
||||
"refsource": "BID",
|
||||
@ -81,6 +71,16 @@
|
||||
"name": "1039553",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039553"
|
||||
},
|
||||
{
|
||||
"name": "https://wpvulndb.com/vulnerabilities/8914",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpvulndb.com/vulnerabilities/8914"
|
||||
},
|
||||
{
|
||||
"name": "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-15564",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,6 +53,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1039529",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039529"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8726",
|
||||
"refsource": "CONFIRM",
|
||||
@ -62,11 +67,6 @@
|
||||
"name": "101084",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101084"
|
||||
},
|
||||
{
|
||||
"name" : "1039529",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039529"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "1/31/2018 20:22:19",
|
||||
"ID": "CVE-2018-1000043",
|
||||
"REQUESTER": "medsgerj@gmail.com",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Squert",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.0.1 through 1.6.7"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Security Onion Solutions"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-78: Improper Neutralization of Special Elements used in an OS Command (OS Command Injection)"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "1/20/2018 9:34:40",
|
||||
"ID": "CVE-2018-1000049",
|
||||
"REQUESTER": "reversebrain@protonmail.com",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Claymore Dual Miner",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "7.3 and earlier"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "nanopool"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Remote Code Execution"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -55,24 +55,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "44638",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/44638/"
|
||||
"name": "https://twitter.com/ReverseBrain/status/951850534985662464",
|
||||
"refsource": "MISC",
|
||||
"url": "https://twitter.com/ReverseBrain/status/951850534985662464"
|
||||
},
|
||||
{
|
||||
"name": "45044",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45044/"
|
||||
},
|
||||
{
|
||||
"name": "44638",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/44638/"
|
||||
},
|
||||
{
|
||||
"name": "https://reversebrain.github.io/2018/02/01/Claymore-Dual-Miner-Remote-Code-Execution/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://reversebrain.github.io/2018/02/01/Claymore-Dual-Miner-Remote-Code-Execution/"
|
||||
},
|
||||
{
|
||||
"name" : "https://twitter.com/ReverseBrain/status/951850534985662464",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://twitter.com/ReverseBrain/status/951850534985662464"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html"
|
||||
"name": "1041809",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041809"
|
||||
},
|
||||
{
|
||||
"name": "105439",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/105439"
|
||||
},
|
||||
{
|
||||
"name" : "1041809",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041809"
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/GSI",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/GSI"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/PVE",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/PVE"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/MVGcoin",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/MVGcoin"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "sfowler@redhat.com",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2018-16852",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -62,16 +62,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852"
|
||||
},
|
||||
{
|
||||
"name": "https://www.samba.org/samba/security/CVE-2018-16852.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.samba.org/samba/security/CVE-2018-16852.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852"
|
||||
},
|
||||
{
|
||||
"name": "https://security.netapp.com/advisory/ntap-20181127-0001/",
|
||||
"refsource": "CONFIRM",
|
||||
|
Loading…
x
Reference in New Issue
Block a user