"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:06:31 +00:00
parent 0482f7d83e
commit a23adb74d9
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 3402 additions and 3402 deletions

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20020129 Xoops SQL fragment disclosure and SQL injection vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://online.securityfocus.com/archive/1/252827"
},
{
"name": "3977",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "xoops-userinfo-information-disclosure(8028)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8028.php"
},
{
"name": "20020129 Xoops SQL fragment disclosure and SQL injection vulnerability",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/252827"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-03/0206.html"
},
{
"name": "14145",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14145"
},
{
"name": "http://translate.google.com/translate?u=http%3A%2F%2Fwww.linux-sottises.net%2Findex.php%3Fnews_init%3D13%23newstag&langpair=fr%7Cen&hl=en&ie=UTF8&oe=UTF8&prev=%2Flanguage_tools",
"refsource": "CONFIRM",
@ -67,11 +72,6 @@
"refsource": "CONFIRM",
"url": "http://www.linux-sottises.net/software/news-tnk/CHANGES"
},
{
"name" : "14145",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/14145"
},
{
"name": "newstnk-web-css(8477)",
"refsource": "XF",

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-05/0168.html"
},
{
"name" : "http://www.hostingcontroller.com/english/patches/ForAll/download/drivebrowse.zip",
"refsource" : "CONFIRM",
"url" : "http://www.hostingcontroller.com/english/patches/ForAll/download/drivebrowse.zip"
},
{
"name": "http://hostingcontroller.com/english/logs/sp2log.html",
"refsource": "CONFIRM",
"url": "http://hostingcontroller.com/english/logs/sp2log.html"
},
{
"name": "http://www.hostingcontroller.com/english/patches/ForAll/download/drivebrowse.zip",
"refsource": "CONFIRM",
"url": "http://www.hostingcontroller.com/english/patches/ForAll/download/drivebrowse.zip"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20020530 [[ TH 026 Inc. ]] SA #3 - Shambala Server 4.5, Directory Traversal and DoS",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-05/0282.html"
"name": "shambala-dotdot-directory-traversal(9224)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9224.php"
},
{
"name": "4896",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/4896"
},
{
"name" : "shambala-dotdot-directory-traversal(9224)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/9224.php"
"name": "20020530 [[ TH 026 Inc. ]] SA #3 - Shambala Server 4.5, Directory Traversal and DoS",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-05/0282.html"
}
]
}

View File

@ -52,26 +52,26 @@
},
"references": {
"reference_data": [
{
"name" : "20020801 code injection in gallery",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-07/0471.html"
},
{
"name" : "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=50&mode=thread&order=0&thold=0",
"refsource" : "CONFIRM",
"url" : "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=50&mode=thread&order=0&thold=0"
},
{
"name": "DSA-138",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2002/dsa-138"
},
{
"name": "20020801 code injection in gallery",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0471.html"
},
{
"name": "5375",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5375"
},
{
"name": "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=50&mode=thread&order=0&thold=0",
"refsource": "CONFIRM",
"url": "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=50&mode=thread&order=0&thold=0"
},
{
"name": "gallery-basedir-execute-commands(9737)",
"refsource": "XF",

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "DSA-164",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2002/dsa-164"
},
{
"name": "20020903 Cacti security issues",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0028.html"
},
{
"name" : "http://www.knights-of-the-routing-table.org/advisories/krt_001_20020903_cacti.txt",
"refsource" : "MISC",
"url" : "http://www.knights-of-the-routing-table.org/advisories/krt_001_20020903_cacti.txt"
},
{
"name" : "DSA-164",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2002/dsa-164"
"name": "5630",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5630"
},
{
"name": "cacti-console-mode-commands(10050)",
@ -73,9 +73,9 @@
"url": "http://www.iss.net/security_center/static/10050.php"
},
{
"name" : "5630",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/5630"
"name": "http://www.knights-of-the-routing-table.org/advisories/krt_001_20020903_cacti.txt",
"refsource": "MISC",
"url": "http://www.knights-of-the-routing-table.org/advisories/krt_001_20020903_cacti.txt"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "SuSE-SA:2002:047",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html"
"name": "openldap-acl-slapd-bo(11288)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/11288.php"
},
{
"name": "RHSA-2003:040",
@ -63,9 +63,9 @@
"url": "http://www.redhat.com/support/errata/RHSA-2003-040.html"
},
{
"name" : "DSA-227",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2003/dsa-227"
"name": "SuSE-SA:2002:047",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2002_047_openldap2.html"
},
{
"name": "MDKSA-2003:006",
@ -73,9 +73,9 @@
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:006"
},
{
"name" : "openldap-acl-slapd-bo(11288)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/11288.php"
"name": "DSA-227",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2003/dsa-227"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "20030121 iDEFENSE Security Advisory 01.21.03: Buffer Overflows in Mandrake Linux printer-drivers Package",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/307608/30/26270/threaded"
},
{
"name" : "http://www.idefense.com/advisory/01.21.03.txt",
"refsource" : "MISC",
"url" : "http://www.idefense.com/advisory/01.21.03.txt"
},
{
"name": "20030121 iDEFENSE Security Advisory 01.21.03: Buffer Overflows in Mandrake Linux printer-drivers Package",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0029.html"
},
{
"name": "1005959",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1005959"
},
{
"name": "MDKSA-2003:010",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:010"
},
{
"name" : "1005959",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1005959"
"name": "20030121 iDEFENSE Security Advisory 01.21.03: Buffer Overflows in Mandrake Linux printer-drivers Package",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/307608/30/26270/threaded"
},
{
"name": "http://www.idefense.com/advisory/01.21.03.txt",
"refsource": "MISC",
"url": "http://www.idefense.com/advisory/01.21.03.txt"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20030224 Terminal Emulator Security Issues",
"refsource" : "VULNWATCH",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html"
},
{
"name": "20030224 Terminal Emulator Security Issues",
"refsource": "BUGTRAQ",
@ -67,6 +62,11 @@
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/11414.php"
},
{
"name": "20030224 Terminal Emulator Security Issues",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html"
},
{
"name": "8347",
"refsource": "OSVDB",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20040810 Corsaire Security Advisory - Port80 Software ServerMask inconsistencies",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=109215441332682&w=2"
"name": "servermask-header-obtain-info(16947)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16947"
},
{
"name": "http://www.corsaire.com/advisories/c030224-001.txt",
@ -63,9 +63,9 @@
"url": "http://www.corsaire.com/advisories/c030224-001.txt"
},
{
"name" : "servermask-header-obtain-info(16947)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/16947"
"name": "20040810 Corsaire Security Advisory - Port80 Software ServerMask inconsistencies",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=109215441332682&w=2"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=104429340817718&w=2"
},
{
"name" : "MS03-015",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-015"
},
{
"name": "oval:org.mitre.oval:def:963",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A963"
},
{
"name": "MS03-015",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-015"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20030513 [SNS Advisory No.64] IP Messenger for Win Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=105283843417610&w=2"
},
{
"name": "http://www.lac.co.jp/security/english/snsadv_e/64_e.html",
"refsource": "MISC",
"url": "http://www.lac.co.jp/security/english/snsadv_e/64_e.html"
},
{
"name": "20030513 [SNS Advisory No.64] IP Messenger for Win Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=105283843417610&w=2"
},
{
"name": "7566",
"refsource": "BID",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.hastymail.org/security/",
"refsource" : "CONFIRM",
"url" : "http://www.hastymail.org/security/"
},
{
"name": "hastymail2-cookie-weak-security(64891)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64891"
},
{
"name": "http://www.hastymail.org/security/",
"refsource": "CONFIRM",
"url": "http://www.hastymail.org/security/"
}
]
}

View File

@ -52,25 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2012/mfsa2012-06.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2012/mfsa2012-06.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=710079",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=710079"
},
{
"name" : "MDVSA-2012:013",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:013"
},
{
"name" : "openSUSE-SU-2012:0234",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00011.html"
"name": "mozilla-mimagebuffersize-info-disclosure(72856)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72856"
},
{
"name": "oval:org.mitre.oval:def:14912",
@ -83,9 +73,19 @@
"url": "http://secunia.com/advisories/49055"
},
{
"name" : "mozilla-mimagebuffersize-info-disclosure(72856)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72856"
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-06.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-06.html"
},
{
"name": "MDVSA-2012:013",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:013"
},
{
"name": "openSUSE-SU-2012:0234",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00011.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-0496",
"STATE": "PUBLIC"
},
@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
"name": "USN-1397-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1397-1"
},
{
"name": "53372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53372"
},
{
"name": "GLSA-201308-06",
@ -63,20 +68,15 @@
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"name" : "USN-1397-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1397-1"
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
},
{
"name": "78371",
"refsource": "OSVDB",
"url": "http://osvdb.org/78371"
},
{
"name" : "53372",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/53372"
},
{
"name": "mysql-server-cve20120496(72518)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-0564",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
},
{
"name" : "MDVSA-2013:150",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
"name": "48882",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48882"
},
{
"name": "53051",
@ -73,9 +68,14 @@
"url": "http://www.securitytracker.com/id?1026954"
},
{
"name" : "48882",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48882"
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
},
{
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2012-0586",
"STATE": "PUBLIC"
},
@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "APPLE-SA-2012-03-07-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html"
"name": "1026774",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026774"
},
{
"name": "48377",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48377"
},
{
"name": "APPLE-SA-2012-03-12-1",
@ -67,20 +72,15 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/79965"
},
{
"name" : "1026774",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1026774"
},
{
"name": "48288",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48288"
},
{
"name" : "48377",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48377"
"name": "APPLE-SA-2012-03-07-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2012-0599",
"STATE": "PUBLIC"
},
@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "APPLE-SA-2012-03-07-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html"
},
{
"name" : "APPLE-SA-2012-03-07-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html"
},
{
"name" : "APPLE-SA-2012-03-12-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
},
{
"name" : "52365",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/52365"
"name": "oval:org.mitre.oval:def:17204",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17204"
},
{
"name": "79921",
@ -78,9 +63,9 @@
"url": "http://osvdb.org/79921"
},
{
"name" : "oval:org.mitre.oval:def:17204",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17204"
"name": "52365",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52365"
},
{
"name": "1026774",
@ -88,14 +73,9 @@
"url": "http://www.securitytracker.com/id?1026774"
},
{
"name" : "48274",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48274"
},
{
"name" : "48288",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48288"
"name": "apple-webkit-cve20120599-code-execution(73818)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73818"
},
{
"name": "48377",
@ -103,9 +83,29 @@
"url": "http://secunia.com/advisories/48377"
},
{
"name" : "apple-webkit-cve20120599-code-execution(73818)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73818"
"name": "APPLE-SA-2012-03-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html"
},
{
"name": "48274",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48274"
},
{
"name": "APPLE-SA-2012-03-07-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html"
},
{
"name": "48288",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48288"
},
{
"name": "APPLE-SA-2012-03-07-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0807",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20120119 Advisory 01/2012: Suhosin PHP Extension Transparent Cookie Encryption Stack Buffer Overflow",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0296.html"
},
{
"name" : "[oss-security] 20120124 CVE requests: Suhosin extension / as31",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/01/24/7"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=783350",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=783350"
},
{
"name": "[oss-security] 20120124 Re: CVE requests: Suhosin extension / as31",
@ -68,14 +63,9 @@
"url": "http://www.openwall.com/lists/oss-security/2012/01/24/11"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=783350",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=783350"
},
{
"name" : "https://github.com/stefanesser/suhosin/commit/73b1968ee30f6d9d2dae497544b910e68e114bfa",
"refsource" : "CONFIRM",
"url" : "https://github.com/stefanesser/suhosin/commit/73b1968ee30f6d9d2dae497544b910e68e114bfa"
"name": "SUSE-SU-2012:0411",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html"
},
{
"name": "openSUSE-SU-2012:0426",
@ -83,9 +73,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html"
},
{
"name" : "SUSE-SU-2012:0411",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html"
"name": "[oss-security] 20120124 CVE requests: Suhosin extension / as31",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/01/24/7"
},
{
"name": "SUSE-SU-2012:0472",
@ -96,6 +86,16 @@
"name": "48668",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48668"
},
{
"name": "20120119 Advisory 01/2012: Suhosin PHP Extension Transparent Cookie Encryption Stack Buffer Overflow",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0296.html"
},
{
"name": "https://github.com/stefanesser/suhosin/commit/73b1968ee30f6d9d2dae497544b910e68e114bfa",
"refsource": "CONFIRM",
"url": "https://github.com/stefanesser/suhosin/commit/73b1968ee30f6d9d2dae497544b910e68e114bfa"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "forkcms-base-xss(73393)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73393"
},
{
"name": "https://github.com/forkcms/forkcms/commit/df75e0797a6540c4d656969a2e7df7689603b2cf",
"refsource": "CONFIRM",
"url": "https://github.com/forkcms/forkcms/commit/df75e0797a6540c4d656969a2e7df7689603b2cf"
},
{
"name": "http://www.fork-cms.com/blog/detail/fork-cms-3-2-5-released",
"refsource": "CONFIRM",
@ -61,16 +71,6 @@
"name": "https://github.com/forkcms/forkcms/commit/c8ec9c58a6b3c46cdd924532c1de99bcda6072ed",
"refsource": "CONFIRM",
"url": "https://github.com/forkcms/forkcms/commit/c8ec9c58a6b3c46cdd924532c1de99bcda6072ed"
},
{
"name" : "https://github.com/forkcms/forkcms/commit/df75e0797a6540c4d656969a2e7df7689603b2cf",
"refsource" : "CONFIRM",
"url" : "https://github.com/forkcms/forkcms/commit/df75e0797a6540c4d656969a2e7df7689603b2cf"
},
{
"name" : "forkcms-base-xss(73393)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73393"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-1813",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "eoscada-eosfailoverservice-dos(79755)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79755"
},
{
"name": "51171",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51171"
},
{
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-271-01.pdf",
"refsource": "MISC",
@ -61,16 +71,6 @@
"name": "56364",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56364"
},
{
"name" : "51171",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51171"
},
{
"name" : "eoscada-eosfailoverservice-dos(79755)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/79755"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-3197",
"STATE": "PUBLIC"
},
@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html"
},
{
"name" : "DSA-2581",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2581"
},
{
"name" : "GLSA-201308-06",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"name" : "MDVSA-2013:150",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
"name": "51177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51177"
},
{
"name": "RHSA-2012:1462",
@ -78,29 +63,44 @@
"url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html"
},
{
"name" : "USN-1621-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1621-1"
"name": "53372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53372"
},
{
"name": "GLSA-201308-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"name": "DSA-2581",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2581"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html"
},
{
"name": "51309",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51309"
},
{
"name" : "51177",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51177"
},
{
"name" : "53372",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/53372"
},
{
"name": "mysqlserver-serverreplication-dos(79393)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79393"
},
{
"name": "USN-1621-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1621-1"
},
{
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2012-3667",
"STATE": "PUBLIC"
},
@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT5400",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5400"
},
{
"name": "http://support.apple.com/kb/HT5485",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5485"
},
{
"name": "APPLE-SA-2012-09-19-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT5503",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5503"
},
{
"name" : "APPLE-SA-2012-07-25-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
},
{
"name": "APPLE-SA-2012-09-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html"
},
{
"name" : "APPLE-SA-2012-09-19-1",
"name": "APPLE-SA-2012-07-25-1",
"refsource": "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
"url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT5400",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5400"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4433",
"STATE": "PUBLIC"
},
@ -52,65 +52,65 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20121106 gegl: Integer overflow, leading to heap-based buffer overflow by parsing PPM image headers",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/11/06/1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=856300",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=856300"
},
{
"name" : "http://git.gnome.org/browse/gegl/commit/?id=1e92e5235ded0415d555aa86066b8e4041ee5a53",
"refsource" : "CONFIRM",
"url" : "http://git.gnome.org/browse/gegl/commit/?id=1e92e5235ded0415d555aa86066b8e4041ee5a53"
},
{
"name": "http://git.gnome.org/browse/gegl/commit/?id=4757cdf73d3675478d645a3ec8250ba02168a230",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/gegl/commit/?id=4757cdf73d3675478d645a3ec8250ba02168a230"
},
{
"name" : "MDVSA-2013:081",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:081"
},
{
"name" : "RHSA-2012:1455",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1455.html"
},
{
"name": "openSUSE-SU-2013:0159",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00054.html"
},
{
"name" : "56404",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/56404"
},
{
"name" : "1027754",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1027754"
},
{
"name": "51114",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51114"
},
{
"name": "56404",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56404"
},
{
"name": "51274",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51274"
},
{
"name": "http://git.gnome.org/browse/gegl/commit/?id=1e92e5235ded0415d555aa86066b8e4041ee5a53",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/browse/gegl/commit/?id=1e92e5235ded0415d555aa86066b8e4041ee5a53"
},
{
"name": "RHSA-2012:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1455.html"
},
{
"name": "gegl-ppm-bo(79822)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79822"
},
{
"name": "MDVSA-2013:081",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:081"
},
{
"name": "[oss-security] 20121106 gegl: Integer overflow, leading to heap-based buffer overflow by parsing PPM image headers",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/11/06/1"
},
{
"name": "1027754",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027754"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4496",
"STATE": "PUBLIC"
},
@ -57,20 +57,15 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/10/04/6"
},
{
"name" : "[oss-security] 20121007 Re: CVE Request for Drupal Contributed Modules",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/10/07/1"
},
{
"name": "http://www.madirish.net/538",
"refsource": "MISC",
"url": "http://www.madirish.net/538"
},
{
"name" : "https://drupal.org/node/1732980",
"refsource" : "MISC",
"url" : "https://drupal.org/node/1732980"
"name": "50256",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50256"
},
{
"name": "http://drupal.org/node/1730766",
@ -83,9 +78,14 @@
"url": "http://www.securityfocus.com/bid/55037"
},
{
"name" : "50256",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50256"
"name": "[oss-security] 20121007 Re: CVE Request for Drupal Contributed Modules",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/10/07/1"
},
{
"name": "https://drupal.org/node/1732980",
"refsource": "MISC",
"url": "https://drupal.org/node/1732980"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2012-4726",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-2080",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "97137",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97137"
},
{
"name": "https://support.apple.com/HT207601",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207601"
},
{
"name" : "https://support.apple.com/HT207602",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207602"
},
{
"name": "https://support.apple.com/HT207615",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207615"
},
{
"name" : "https://support.apple.com/HT207617",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT207617"
},
{
"name" : "97137",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/97137"
},
{
"name": "1038138",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038138"
},
{
"name": "https://support.apple.com/HT207602",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207602"
},
{
"name": "https://support.apple.com/HT207617",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207617"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "41511",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/41511/"
},
{
"name": "http://packetstormsecurity.com/files/141456/FTPShell-Client-6.53-Buffer-Overflow.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/141456/FTPShell-Client-6.53-Buffer-Overflow.html"
},
{
"name": "41511",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41511/"
},
{
"name": "96570",
"refsource": "BID",

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430"
},
{
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=9f3bc84b7e7e435c50b8b68f0fc526d0f5676cbf",
"refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=9f3bc84b7e7e435c50b8b68f0fc526d0f5676cbf"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430"
},
{
"name": "https://www.wireshark.org/security/wnpa-sec-2017-08.html",
"refsource": "CONFIRM",
"url": "https://www.wireshark.org/security/wnpa-sec-2017-08.html"
},
{
"name" : "DSA-3811",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3811"
},
{
"name": "96569",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96569"
},
{
"name": "DSA-3811",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3811"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@microfocus.com",
"ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2017-08-19T00:00:00",
"ID": "CVE-2017-7424",
"STATE": "PUBLIC"

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-151-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-151-01"
},
{
"name": "104375",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104375"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-151-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-151-01"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://zerodayinitiative.com/advisories/ZDI-18-727",
"refsource" : "MISC",
"url" : "https://zerodayinitiative.com/advisories/ZDI-18-727"
},
{
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://zerodayinitiative.com/advisories/ZDI-18-727",
"refsource": "MISC",
"url": "https://zerodayinitiative.com/advisories/ZDI-18-727"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://s3browser.com/news.aspx",
"refsource" : "MISC",
"url" : "https://s3browser.com/news.aspx"
},
{
"name": "https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-34/",
"refsource": "MISC",
"url": "https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-34/"
},
{
"name": "https://s3browser.com/news.aspx",
"refsource": "MISC",
"url": "https://s3browser.com/news.aspx"
}
]
}