mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
19a3d22c86
commit
a55f6b67db
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050325 phpMyDirectory 10.1.3-rel Cross site scripting",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=111176904423360&w=2"
|
||||
},
|
||||
{
|
||||
"name": "12900",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/12900"
|
||||
},
|
||||
{
|
||||
"name": "20050325 phpMyDirectory 10.1.3-rel Cross site scripting",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111176904423360&w=2"
|
||||
},
|
||||
{
|
||||
"name": "14692",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050406 IBM Lotus Domino Server Web Service DoS Vulnerability",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "http://www.idefense.com/application/poi/display?id=224&type=vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name": "http://www-1.ibm.com/support/docview.wss?uid=swg21202446",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21202446"
|
||||
},
|
||||
{
|
||||
"name": "14858",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14858"
|
||||
},
|
||||
{
|
||||
"name": "20050406 IBM Lotus Domino Server Web Service DoS Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://www.idefense.com/application/poi/display?id=224&type=vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name": "http://news.zdnet.co.uk/software/applications/0,39020384,39194293,00.htm",
|
||||
"refsource": "MISC",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "ADV-2005-0322",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/0322"
|
||||
},
|
||||
{
|
||||
"name" : "14858",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/14858"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "15830",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15830"
|
||||
},
|
||||
{
|
||||
"name": "http://dark-assassins.com/forum/viewtopic.php?t=145",
|
||||
"refsource": "MISC",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "ADV-2005-0888",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/0888"
|
||||
},
|
||||
{
|
||||
"name" : "15830",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/15830"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050915 Secunia Research: Ahnlab V3 Antivirus Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=112680062609377&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2005-17/advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2005-17/advisory/"
|
||||
},
|
||||
{
|
||||
"name": "20050915 Secunia Research: Ahnlab V3 Antivirus Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=112680062609377&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://info.ahnlab.com/english/advisory/01.html",
|
||||
"refsource": "CONFIRM",
|
||||
|
@ -52,26 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20051011 Secunia Research: WinRAR Format String and Buffer Overflow Vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0266.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://secunia.com/secunia_research/2005-53/advisory/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secunia.com/secunia_research/2005-53/advisory/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.rarlabs.com/rarnew.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.rarlabs.com/rarnew.htm"
|
||||
},
|
||||
{
|
||||
"name": "15062",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15062"
|
||||
},
|
||||
{
|
||||
"name": "20051011 Secunia Research: WinRAR Format String and Buffer Overflow Vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0266.html"
|
||||
},
|
||||
{
|
||||
"name": "19915",
|
||||
"refsource": "OSVDB",
|
||||
@ -81,6 +71,16 @@
|
||||
"name": "16973",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/16973/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.rarlabs.com/rarnew.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.rarlabs.com/rarnew.htm"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2005-53/advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2005-53/advisory/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20051102 Multiple vulnerabilities in Scorched 3D 39.1",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://marc.info/?l=full-disclosure&m=113095941031946&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://aluigi.altervista.org/adv/scorchbugs-adv.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://aluigi.altervista.org/adv/scorchbugs-adv.txt"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200511-12",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200511-12.xml"
|
||||
},
|
||||
{
|
||||
"name": "15292",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15292"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2005-2288",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2005/2288"
|
||||
"name": "GLSA-200511-12",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200511-12.xml"
|
||||
},
|
||||
{
|
||||
"name": "17423",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17423"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-2288",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2288"
|
||||
},
|
||||
{
|
||||
"name": "20051102 Multiple vulnerabilities in Scorched 3D 39.1",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://marc.info/?l=full-disclosure&m=113095941031946&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,11 +62,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15672"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2005-2683",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2005/2683"
|
||||
},
|
||||
{
|
||||
"name": "21338",
|
||||
"refsource": "OSVDB",
|
||||
@ -76,6 +71,11 @@
|
||||
"name": "17793",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/17793"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-2683",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2683"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20051209 [KAPDA::#16] - SMF SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/419068/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20051210 Re: [KAPDA::#16] - SMF SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/419105/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20051211 Re: Re: [KAPDA::#16] - SMF SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/419250/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20051213 Re: Re: Re: [KAPDA::#16] - SMF SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/419535/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20051209 SMF SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2005-12/0090.html"
|
||||
},
|
||||
{
|
||||
"name": "15791",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15791"
|
||||
},
|
||||
{
|
||||
"name": "20051211 Re: Re: [KAPDA::#16] - SMF SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/419250/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "smf-memberlist-sql-injection(23546)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23546"
|
||||
},
|
||||
{
|
||||
"name": "20051209 [KAPDA::#16] - SMF SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/419068/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20051209 SMF SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0090.html"
|
||||
},
|
||||
{
|
||||
"name": "20051210 Re: [KAPDA::#16] - SMF SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/419105/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ingate.com/relnote-434.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ingate.com/relnote-434.php"
|
||||
},
|
||||
{
|
||||
"name": "16023",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16023"
|
||||
},
|
||||
{
|
||||
"name": "18138",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18138"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-3011",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/3011"
|
||||
},
|
||||
{
|
||||
"name" : "18138",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18138"
|
||||
"name": "http://www.ingate.com/relnote-434.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ingate.com/relnote-434.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,64 +53,64 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.trapkit.de/advisories/TKADV2005-11-002.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.trapkit.de/advisories/TKADV2005-11-002.txt"
|
||||
"name": "18481",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18481"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963"
|
||||
},
|
||||
{
|
||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-944",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2005/dsa-944"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200512-12",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200512-12.xml"
|
||||
},
|
||||
{
|
||||
"name": "16046",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16046/"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2005-3064",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2005/3064"
|
||||
},
|
||||
{
|
||||
"name" : "22051",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/22051"
|
||||
},
|
||||
{
|
||||
"name" : "22052",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/22052"
|
||||
},
|
||||
{
|
||||
"name": "18181",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18181/"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-3064",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/3064"
|
||||
},
|
||||
{
|
||||
"name": "22052",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/22052"
|
||||
},
|
||||
{
|
||||
"name": "18221",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18221"
|
||||
},
|
||||
{
|
||||
"name" : "18481",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/18481"
|
||||
"name": "22051",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/22051"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200512-12",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200512-12.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://www.trapkit.de/advisories/TKADV2005-11-002.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.trapkit.de/advisories/TKADV2005-11-002.txt"
|
||||
},
|
||||
{
|
||||
"name": "DSA-944",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2005/dsa-944"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "21298",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21298"
|
||||
},
|
||||
{
|
||||
"name": "http://pridels0.blogspot.com/2005/11/xss-in-hydrobb.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://pridels0.blogspot.com/2005/11/xss-in-hydrobb.html"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2005-2562",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2005/2562"
|
||||
},
|
||||
{
|
||||
"name" : "21293",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/21293"
|
||||
},
|
||||
{
|
||||
"name" : "21294",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/21294"
|
||||
},
|
||||
{
|
||||
"name": "21295",
|
||||
"refsource": "OSVDB",
|
||||
@ -83,34 +73,44 @@
|
||||
"url": "http://www.osvdb.org/21296"
|
||||
},
|
||||
{
|
||||
"name" : "21297",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/21297"
|
||||
},
|
||||
{
|
||||
"name" : "21298",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/21298"
|
||||
},
|
||||
{
|
||||
"name" : "21299",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/21299"
|
||||
},
|
||||
{
|
||||
"name" : "21300",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/21300"
|
||||
"name": "ADV-2005-2562",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2562"
|
||||
},
|
||||
{
|
||||
"name": "21301",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21301"
|
||||
},
|
||||
{
|
||||
"name": "21294",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21294"
|
||||
},
|
||||
{
|
||||
"name": "21300",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21300"
|
||||
},
|
||||
{
|
||||
"name": "21297",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21297"
|
||||
},
|
||||
{
|
||||
"name": "hydrobb-multiple-xss(23299)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23299"
|
||||
},
|
||||
{
|
||||
"name": "21293",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21293"
|
||||
},
|
||||
{
|
||||
"name": "21299",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21299"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://launchpad.net/bugs/191299",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://launchpad.net/bugs/191299"
|
||||
},
|
||||
{
|
||||
"name" : "USN-708-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/usn-708-1"
|
||||
"name": "33539",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33539"
|
||||
},
|
||||
{
|
||||
"name": "33249",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/33249"
|
||||
},
|
||||
{
|
||||
"name" : "33539",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33539"
|
||||
"name": "USN-708-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/usn-708-1"
|
||||
},
|
||||
{
|
||||
"name": "https://launchpad.net/bugs/191299",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://launchpad.net/bugs/191299"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7878",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7878"
|
||||
"name": "33460",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33460"
|
||||
},
|
||||
{
|
||||
"name": "9236",
|
||||
@ -63,19 +63,19 @@
|
||||
"url": "https://www.exploit-db.com/exploits/9236"
|
||||
},
|
||||
{
|
||||
"name" : "33460",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/33460"
|
||||
"name": "33649",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33649"
|
||||
},
|
||||
{
|
||||
"name": "7878",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7878"
|
||||
},
|
||||
{
|
||||
"name": "51628",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/51628"
|
||||
},
|
||||
{
|
||||
"name" : "33649",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33649"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "9331",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/9331"
|
||||
},
|
||||
{
|
||||
"name": "35919",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/35919"
|
||||
},
|
||||
{
|
||||
"name": "9331",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/9331"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3937",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT3937"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2009-11-09-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
|
||||
"name": "36956",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/36956"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2010-03-30-1",
|
||||
@ -68,9 +63,9 @@
|
||||
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "36956",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/36956"
|
||||
"name": "ADV-2009-3184",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3184"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:6707",
|
||||
@ -78,9 +73,14 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6707"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-3184",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/3184"
|
||||
"name": "APPLE-SA-2009-11-09-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT3937",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT3937"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2009-3399",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
|
||||
"name": "1023062",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1023062"
|
||||
},
|
||||
{
|
||||
"name": "TA09-294A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
|
||||
},
|
||||
{
|
||||
"name": "36769",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/36769"
|
||||
},
|
||||
{
|
||||
"name" : "1023062",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1023062"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/0909-exploits/alibaba30-sql.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/0909-exploits/alibaba30-sql.txt"
|
||||
},
|
||||
{
|
||||
"name": "36845",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36845"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/0909-exploits/alibaba30-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0909-exploits/alibaba30-sql.txt"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-2737",
|
||||
"refsource": "VUPEN",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/0909-exploits/ardguest-xss.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/0909-exploits/ardguest-xss.txt"
|
||||
},
|
||||
{
|
||||
"name": "36630",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/36630"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/0909-exploits/ardguest-xss.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0909-exploits/ardguest-xss.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2009-4195",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20091203 Adobe Illustrator CS4 (V14.0.0) Encapsulated Postscript (.eps) Overlong DSC Comment Buffer Overflow Exploit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/508175/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://blogs.adobe.com/psirt/2009/12/potential_adobe_illustrator_cs.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blogs.adobe.com/psirt/2009/12/potential_adobe_illustrator_cs.html"
|
||||
"name": "60632",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/60632"
|
||||
},
|
||||
{
|
||||
"name": "http://retrogod.altervista.org/9sg_adobe_illuso.html",
|
||||
@ -68,39 +63,44 @@
|
||||
"url": "http://retrogod.altervista.org/9sg_adobe_illuso.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-01.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-01.html"
|
||||
"name": "37563",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37563"
|
||||
},
|
||||
{
|
||||
"name" : "37192",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/37192"
|
||||
},
|
||||
{
|
||||
"name" : "60632",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/60632"
|
||||
"name": "http://blogs.adobe.com/psirt/2009/12/potential_adobe_illustrator_cs.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blogs.adobe.com/psirt/2009/12/potential_adobe_illustrator_cs.html"
|
||||
},
|
||||
{
|
||||
"name": "1023276",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1023276"
|
||||
},
|
||||
{
|
||||
"name" : "37563",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/37563"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-3396",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3396"
|
||||
},
|
||||
{
|
||||
"name": "37192",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/37192"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb10-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb10-01.html"
|
||||
},
|
||||
{
|
||||
"name": "adobe-illustrator-eps-bo(54521)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54521"
|
||||
},
|
||||
{
|
||||
"name": "20091203 Adobe Illustrator CS4 (V14.0.0) Encapsulated Postscript (.eps) Overlong DSC Comment Buffer Overflow Exploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/508175/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://lostmon.blogspot.com/2009/10/wowd-search-client-multiple-variable.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/0910-exploits/wowd-xss.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/0910-exploits/wowd-xss.txt"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-3071",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3071"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/0910-exploits/wowd-xss.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0910-exploits/wowd-xss.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20120621 CORE-2012-0530 - Lattice Diamond Programmer Buffer Overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-06/0136.html"
|
||||
},
|
||||
{
|
||||
"name": "19340",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/19340"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.coresecurity.com/content/lattice-diamond-programmer-buffer-overflow",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.coresecurity.com/content/lattice-diamond-programmer-buffer-overflow"
|
||||
"name": "20120621 CORE-2012-0530 - Lattice Diamond Programmer Buffer Overflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-06/0136.html"
|
||||
},
|
||||
{
|
||||
"name": "48431",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48431"
|
||||
},
|
||||
{
|
||||
"name": "http://www.coresecurity.com/content/lattice-diamond-programmer-buffer-overflow",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.coresecurity.com/content/lattice-diamond-programmer-buffer-overflow"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2015-0219",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.djangoproject.com/weblog/2015/jan/13/security/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.djangoproject.com/weblog/2015/jan/13/security/"
|
||||
},
|
||||
{
|
||||
"name" : "http://advisories.mageia.org/MGASA-2015-0026.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://advisories.mageia.org/MGASA-2015-0026.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2015-0714",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2015-0790",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html"
|
||||
"name": "62718",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62718"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2015-0804",
|
||||
@ -83,39 +68,54 @@
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2015:109",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:0643",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1598",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2469-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2469-1"
|
||||
"name": "FEDORA-2015-0790",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html"
|
||||
},
|
||||
{
|
||||
"name": "62285",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62285"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1598",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.djangoproject.com/weblog/2015/jan/13/security/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.djangoproject.com/weblog/2015/jan/13/security/"
|
||||
},
|
||||
{
|
||||
"name": "USN-2469-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2469-1"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:0643",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "62309",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/62309"
|
||||
},
|
||||
{
|
||||
"name" : "62718",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/62718"
|
||||
"name": "MDVSA-2015:109",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109"
|
||||
},
|
||||
{
|
||||
"name": "http://advisories.mageia.org/MGASA-2015-0026.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://advisories.mageia.org/MGASA-2015-0026.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2015-0714",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2015-0789",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2015-0962",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/"
|
||||
"name": "VU#534407",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/534407"
|
||||
},
|
||||
{
|
||||
"name": "https://techlib.barracuda.com/BWF/UpdateSSLCerts",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "https://www.barracuda.com/support/techalerts"
|
||||
},
|
||||
{
|
||||
"name" : "VU#534407",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/534407"
|
||||
"name": "https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2015-1213",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,20 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
|
||||
"name": "USN-2521-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-2521-1"
|
||||
},
|
||||
{
|
||||
"name": "72901",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72901"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=448423",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=448423"
|
||||
},
|
||||
{
|
||||
"name" : "https://skia.googlesource.com/skia/+/6af314724f51ad79a640844536c667bb83de5690",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://skia.googlesource.com/skia/+/6af314724f51ad79a640844536c667bb83de5690"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201503-12",
|
||||
"refsource": "GENTOO",
|
||||
@ -78,14 +78,14 @@
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-2521-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-2521-1"
|
||||
"name": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name" : "72901",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/72901"
|
||||
"name": "https://skia.googlesource.com/skia/+/6af314724f51ad79a640844536c667bb83de5690",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://skia.googlesource.com/skia/+/6af314724f51ad79a640844536c667bb83de5690"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2015-1292",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,26 +52,46 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1873",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=522791",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=522791"
|
||||
},
|
||||
{
|
||||
"name": "https://codereview.chromium.org/1307883002/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://codereview.chromium.org/1307883002/"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1712",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1712.html"
|
||||
},
|
||||
{
|
||||
"name": "1033472",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033472"
|
||||
},
|
||||
{
|
||||
"name": "https://src.chromium.org/viewvc/blink?revision=201055&view=revision",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://src.chromium.org/viewvc/blink?revision=201055&view=revision"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=522791",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=522791"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1586",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00029.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-3351",
|
||||
"refsource": "DEBIAN",
|
||||
@ -81,26 +101,6 @@
|
||||
"name": "GLSA-201603-09",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201603-09"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2015:1712",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1712.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1873",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-11/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1586",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-09/msg00029.html"
|
||||
},
|
||||
{
|
||||
"name" : "1033472",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033472"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2015-1295",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,40 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1873",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://code.google.com/p/chromium/issues/detail?id=502562",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://code.google.com/p/chromium/issues/detail?id=502562"
|
||||
},
|
||||
{
|
||||
"name" : "https://codereview.chromium.org/1228693002/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://codereview.chromium.org/1228693002/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3351",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2015/dsa-3351"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201603-09",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201603-09"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2015:1712",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1712.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2015:1873",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2015-11/msg00013.html"
|
||||
"name": "1033472",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033472"
|
||||
},
|
||||
{
|
||||
"name": "https://codereview.chromium.org/1228693002/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://codereview.chromium.org/1228693002/"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2015:1586",
|
||||
@ -93,9 +83,19 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00029.html"
|
||||
},
|
||||
{
|
||||
"name" : "1033472",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033472"
|
||||
"name": "DSA-3351",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2015/dsa-3351"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=502562",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://code.google.com/p/chromium/issues/detail?id=502562"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201603-09",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201603-09"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150203 My Little Forum Multiple XSS Security Vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Feb/15"
|
||||
},
|
||||
{
|
||||
"name": "http://tetraph.com/security/xss-vulnerability/my-little-forum-multiple-xss-security-vulnerabilities/",
|
||||
"refsource": "MISC",
|
||||
@ -67,6 +62,11 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/130220/My-Little-Forum-2.3.3-2.2-1.7-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "20150203 My Little Forum Multiple XSS Security Vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2015/Feb/15"
|
||||
},
|
||||
{
|
||||
"name": "mylittleforum-multiple-xss(100616)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "FEDORA-2015-3944",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html"
|
||||
},
|
||||
{
|
||||
"name": "1031663",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1031663"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150129 Xen Security Advisory 118 - arm: vgic: incorrect rate limiting of guest triggered logging",
|
||||
"refsource": "MLIST",
|
||||
@ -62,20 +72,10 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://xenbits.xen.org/xsa/advisory-118.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2015-3944",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html"
|
||||
},
|
||||
{
|
||||
"name": "72766",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/72766"
|
||||
},
|
||||
{
|
||||
"name" : "1031663",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1031663"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2015-5404",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -57,25 +57,25 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://rt.perl.org/Public/Bug/Display.html?id=132063"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4172",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4172"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:1192",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:1192"
|
||||
},
|
||||
{
|
||||
"name": "1040681",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040681"
|
||||
},
|
||||
{
|
||||
"name": "USN-3625-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3625-1/"
|
||||
},
|
||||
{
|
||||
"name" : "1040681",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040681"
|
||||
"name": "DSA-4172",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4172"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20180409 [SECURITY] [DLA 1343-1] ming security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/04/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892260",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892260"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180409 [SECURITY] [DLA 1343-1] ming security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/libming/libming/issues/114",
|
||||
"refsource": "MISC",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "Secure@Microsoft.com",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2018-8453",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -212,6 +212,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1041828",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041828"
|
||||
},
|
||||
{
|
||||
"name": "https://securelist.com/cve-2018-8453-used-in-targeted-attack",
|
||||
"refsource": "MISC",
|
||||
@ -226,11 +231,6 @@
|
||||
"name": "105467",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105467"
|
||||
},
|
||||
{
|
||||
"name" : "1041828",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041828"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user