"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:02:32 +00:00
parent 19a3d22c86
commit a55f6b67db
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
52 changed files with 3614 additions and 3614 deletions

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20050325 phpMyDirectory 10.1.3-rel Cross site scripting",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=111176904423360&w=2"
},
{
"name": "12900",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12900"
},
{
"name": "20050325 phpMyDirectory 10.1.3-rel Cross site scripting",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111176904423360&w=2"
},
{
"name": "14692",
"refsource": "SECUNIA",

View File

@ -52,16 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "20050406 IBM Lotus Domino Server Web Service DoS Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://www.idefense.com/application/poi/display?id=224&type=vulnerabilities"
},
{
"name": "http://www-1.ibm.com/support/docview.wss?uid=swg21202446",
"refsource": "MISC",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21202446"
},
{
"name": "14858",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14858"
},
{
"name": "20050406 IBM Lotus Domino Server Web Service DoS Vulnerability",
"refsource": "IDEFENSE",
"url": "http://www.idefense.com/application/poi/display?id=224&type=vulnerabilities"
},
{
"name": "http://news.zdnet.co.uk/software/applications/0,39020384,39194293,00.htm",
"refsource": "MISC",
@ -71,11 +76,6 @@
"name": "ADV-2005-0322",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/0322"
},
{
"name" : "14858",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/14858"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "15830",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15830"
},
{
"name": "http://dark-assassins.com/forum/viewtopic.php?t=145",
"refsource": "MISC",
@ -66,11 +71,6 @@
"name": "ADV-2005-0888",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/0888"
},
{
"name" : "15830",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/15830"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20050915 Secunia Research: Ahnlab V3 Antivirus Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=112680062609377&w=2"
},
{
"name": "http://secunia.com/secunia_research/2005-17/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2005-17/advisory/"
},
{
"name": "20050915 Secunia Research: Ahnlab V3 Antivirus Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112680062609377&w=2"
},
{
"name": "http://info.ahnlab.com/english/advisory/01.html",
"refsource": "CONFIRM",

View File

@ -52,26 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20051011 Secunia Research: WinRAR Format String and Buffer Overflow Vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0266.html"
},
{
"name" : "http://secunia.com/secunia_research/2005-53/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2005-53/advisory/"
},
{
"name" : "http://www.rarlabs.com/rarnew.htm",
"refsource" : "CONFIRM",
"url" : "http://www.rarlabs.com/rarnew.htm"
},
{
"name": "15062",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15062"
},
{
"name": "20051011 Secunia Research: WinRAR Format String and Buffer Overflow Vulnerabilities",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0266.html"
},
{
"name": "19915",
"refsource": "OSVDB",
@ -81,6 +71,16 @@
"name": "16973",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16973/"
},
{
"name": "http://www.rarlabs.com/rarnew.htm",
"refsource": "CONFIRM",
"url": "http://www.rarlabs.com/rarnew.htm"
},
{
"name": "http://secunia.com/secunia_research/2005-53/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2005-53/advisory/"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "20051102 Multiple vulnerabilities in Scorched 3D 39.1",
"refsource" : "FULLDISC",
"url" : "http://marc.info/?l=full-disclosure&m=113095941031946&w=2"
},
{
"name": "http://aluigi.altervista.org/adv/scorchbugs-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/scorchbugs-adv.txt"
},
{
"name" : "GLSA-200511-12",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200511-12.xml"
},
{
"name": "15292",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15292"
},
{
"name" : "ADV-2005-2288",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2288"
"name": "GLSA-200511-12",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200511-12.xml"
},
{
"name": "17423",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17423"
},
{
"name": "ADV-2005-2288",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2288"
},
{
"name": "20051102 Multiple vulnerabilities in Scorched 3D 39.1",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=113095941031946&w=2"
}
]
}

View File

@ -62,11 +62,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15672"
},
{
"name" : "ADV-2005-2683",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2683"
},
{
"name": "21338",
"refsource": "OSVDB",
@ -76,6 +71,11 @@
"name": "17793",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17793"
},
{
"name": "ADV-2005-2683",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2683"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "20051209 [KAPDA::#16] - SMF SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/419068/100/0/threaded"
},
{
"name" : "20051210 Re: [KAPDA::#16] - SMF SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/419105/100/0/threaded"
},
{
"name" : "20051211 Re: Re: [KAPDA::#16] - SMF SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/419250/100/0/threaded"
},
{
"name": "20051213 Re: Re: Re: [KAPDA::#16] - SMF SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/419535/100/0/threaded"
},
{
"name" : "20051209 SMF SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2005-12/0090.html"
},
{
"name": "15791",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15791"
},
{
"name": "20051211 Re: Re: [KAPDA::#16] - SMF SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/419250/100/0/threaded"
},
{
"name": "smf-memberlist-sql-injection(23546)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23546"
},
{
"name": "20051209 [KAPDA::#16] - SMF SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/419068/100/0/threaded"
},
{
"name": "20051209 SMF SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2005-12/0090.html"
},
{
"name": "20051210 Re: [KAPDA::#16] - SMF SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/419105/100/0/threaded"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ingate.com/relnote-434.php",
"refsource" : "CONFIRM",
"url" : "http://www.ingate.com/relnote-434.php"
},
{
"name": "16023",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16023"
},
{
"name": "18138",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18138"
},
{
"name": "ADV-2005-3011",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/3011"
},
{
"name" : "18138",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18138"
"name": "http://www.ingate.com/relnote-434.php",
"refsource": "CONFIRM",
"url": "http://www.ingate.com/relnote-434.php"
}
]
}

View File

@ -53,64 +53,64 @@
"references": {
"reference_data": [
{
"name" : "http://www.trapkit.de/advisories/TKADV2005-11-002.txt",
"refsource" : "MISC",
"url" : "http://www.trapkit.de/advisories/TKADV2005-11-002.txt"
"name": "18481",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18481"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963"
},
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963"
},
{
"name" : "DSA-944",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-944"
},
{
"name" : "GLSA-200512-12",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200512-12.xml"
},
{
"name": "16046",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16046/"
},
{
"name" : "ADV-2005-3064",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/3064"
},
{
"name" : "22051",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22051"
},
{
"name" : "22052",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/22052"
},
{
"name": "18181",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18181/"
},
{
"name": "ADV-2005-3064",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/3064"
},
{
"name": "22052",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22052"
},
{
"name": "18221",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18221"
},
{
"name" : "18481",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18481"
"name": "22051",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22051"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963"
},
{
"name": "GLSA-200512-12",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200512-12.xml"
},
{
"name": "http://www.trapkit.de/advisories/TKADV2005-11-002.txt",
"refsource": "MISC",
"url": "http://www.trapkit.de/advisories/TKADV2005-11-002.txt"
},
{
"name": "DSA-944",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-944"
}
]
}

View File

@ -52,26 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "21298",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21298"
},
{
"name": "http://pridels0.blogspot.com/2005/11/xss-in-hydrobb.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2005/11/xss-in-hydrobb.html"
},
{
"name" : "ADV-2005-2562",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2562"
},
{
"name" : "21293",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21293"
},
{
"name" : "21294",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21294"
},
{
"name": "21295",
"refsource": "OSVDB",
@ -83,34 +73,44 @@
"url": "http://www.osvdb.org/21296"
},
{
"name" : "21297",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21297"
},
{
"name" : "21298",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21298"
},
{
"name" : "21299",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21299"
},
{
"name" : "21300",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21300"
"name": "ADV-2005-2562",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2562"
},
{
"name": "21301",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21301"
},
{
"name": "21294",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21294"
},
{
"name": "21300",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21300"
},
{
"name": "21297",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21297"
},
{
"name": "hydrobb-multiple-xss(23299)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23299"
},
{
"name": "21293",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21293"
},
{
"name": "21299",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21299"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://launchpad.net/bugs/191299",
"refsource" : "CONFIRM",
"url" : "https://launchpad.net/bugs/191299"
},
{
"name" : "USN-708-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-708-1"
"name": "33539",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33539"
},
{
"name": "33249",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/33249"
},
{
"name" : "33539",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33539"
"name": "USN-708-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-708-1"
},
{
"name": "https://launchpad.net/bugs/191299",
"refsource": "CONFIRM",
"url": "https://launchpad.net/bugs/191299"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "7878",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7878"
"name": "33460",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33460"
},
{
"name": "9236",
@ -63,19 +63,19 @@
"url": "https://www.exploit-db.com/exploits/9236"
},
{
"name" : "33460",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33460"
"name": "33649",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33649"
},
{
"name": "7878",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7878"
},
{
"name": "51628",
"refsource": "OSVDB",
"url": "http://osvdb.org/51628"
},
{
"name" : "33649",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33649"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "9331",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/9331"
},
{
"name": "35919",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35919"
},
{
"name": "9331",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/9331"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT3937",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3937"
},
{
"name" : "APPLE-SA-2009-11-09-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
"name": "36956",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36956"
},
{
"name": "APPLE-SA-2010-03-30-1",
@ -68,9 +63,9 @@
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00002.html"
},
{
"name" : "36956",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/36956"
"name": "ADV-2009-3184",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "oval:org.mitre.oval:def:6707",
@ -78,9 +73,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6707"
},
{
"name" : "ADV-2009-3184",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/3184"
"name": "APPLE-SA-2009-11-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT3937",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3937"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2009-3399",
"STATE": "PUBLIC"
},
@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
"name": "1023062",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023062"
},
{
"name": "TA09-294A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"name": "36769",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36769"
},
{
"name" : "1023062",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1023062"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.org/0909-exploits/alibaba30-sql.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/0909-exploits/alibaba30-sql.txt"
},
{
"name": "36845",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36845"
},
{
"name": "http://packetstormsecurity.org/0909-exploits/alibaba30-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0909-exploits/alibaba30-sql.txt"
},
{
"name": "ADV-2009-2737",
"refsource": "VUPEN",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.org/0909-exploits/ardguest-xss.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/0909-exploits/ardguest-xss.txt"
},
{
"name": "36630",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36630"
},
{
"name": "http://packetstormsecurity.org/0909-exploits/ardguest-xss.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0909-exploits/ardguest-xss.txt"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2009-4195",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20091203 Adobe Illustrator CS4 (V14.0.0) Encapsulated Postscript (.eps) Overlong DSC Comment Buffer Overflow Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/508175/100/0/threaded"
},
{
"name" : "http://blogs.adobe.com/psirt/2009/12/potential_adobe_illustrator_cs.html",
"refsource" : "MISC",
"url" : "http://blogs.adobe.com/psirt/2009/12/potential_adobe_illustrator_cs.html"
"name": "60632",
"refsource": "OSVDB",
"url": "http://osvdb.org/60632"
},
{
"name": "http://retrogod.altervista.org/9sg_adobe_illuso.html",
@ -68,39 +63,44 @@
"url": "http://retrogod.altervista.org/9sg_adobe_illuso.html"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-01.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-01.html"
"name": "37563",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37563"
},
{
"name" : "37192",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37192"
},
{
"name" : "60632",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/60632"
"name": "http://blogs.adobe.com/psirt/2009/12/potential_adobe_illustrator_cs.html",
"refsource": "MISC",
"url": "http://blogs.adobe.com/psirt/2009/12/potential_adobe_illustrator_cs.html"
},
{
"name": "1023276",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023276"
},
{
"name" : "37563",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37563"
},
{
"name": "ADV-2009-3396",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3396"
},
{
"name": "37192",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37192"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-01.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-01.html"
},
{
"name": "adobe-illustrator-eps-bo(54521)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54521"
},
{
"name": "20091203 Adobe Illustrator CS4 (V14.0.0) Encapsulated Postscript (.eps) Overlong DSC Comment Buffer Overflow Exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/508175/100/0/threaded"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "http://lostmon.blogspot.com/2009/10/wowd-search-client-multiple-variable.html"
},
{
"name" : "http://packetstormsecurity.org/0910-exploits/wowd-xss.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/0910-exploits/wowd-xss.txt"
},
{
"name": "ADV-2009-3071",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3071"
},
{
"name": "http://packetstormsecurity.org/0910-exploits/wowd-xss.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0910-exploits/wowd-xss.txt"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20120621 CORE-2012-0530 - Lattice Diamond Programmer Buffer Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-06/0136.html"
},
{
"name": "19340",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/19340"
},
{
"name" : "http://www.coresecurity.com/content/lattice-diamond-programmer-buffer-overflow",
"refsource" : "MISC",
"url" : "http://www.coresecurity.com/content/lattice-diamond-programmer-buffer-overflow"
"name": "20120621 CORE-2012-0530 - Lattice Diamond Programmer Buffer Overflow",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-06/0136.html"
},
{
"name": "48431",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48431"
},
{
"name": "http://www.coresecurity.com/content/lattice-diamond-programmer-buffer-overflow",
"refsource": "MISC",
"url": "http://www.coresecurity.com/content/lattice-diamond-programmer-buffer-overflow"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-0219",
"STATE": "PUBLIC"
},
@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://www.djangoproject.com/weblog/2015/jan/13/security/",
"refsource" : "CONFIRM",
"url" : "https://www.djangoproject.com/weblog/2015/jan/13/security/"
},
{
"name" : "http://advisories.mageia.org/MGASA-2015-0026.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2015-0026.html"
},
{
"name" : "FEDORA-2015-0714",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html"
},
{
"name" : "FEDORA-2015-0790",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html"
"name": "62718",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62718"
},
{
"name": "FEDORA-2015-0804",
@ -83,39 +68,54 @@
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036"
},
{
"name" : "MDVSA-2015:109",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109"
},
{
"name" : "openSUSE-SU-2015:0643",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html"
},
{
"name" : "openSUSE-SU-2015:1598",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html"
},
{
"name" : "USN-2469-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2469-1"
"name": "FEDORA-2015-0790",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html"
},
{
"name": "62285",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62285"
},
{
"name": "openSUSE-SU-2015:1598",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html"
},
{
"name": "https://www.djangoproject.com/weblog/2015/jan/13/security/",
"refsource": "CONFIRM",
"url": "https://www.djangoproject.com/weblog/2015/jan/13/security/"
},
{
"name": "USN-2469-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2469-1"
},
{
"name": "openSUSE-SU-2015:0643",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html"
},
{
"name": "62309",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62309"
},
{
"name" : "62718",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62718"
"name": "MDVSA-2015:109",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109"
},
{
"name": "http://advisories.mageia.org/MGASA-2015-0026.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2015-0026.html"
},
{
"name": "FEDORA-2015-0714",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-0789",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-0962",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/",
"refsource" : "CONFIRM",
"url" : "https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/"
"name": "VU#534407",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/534407"
},
{
"name": "https://techlib.barracuda.com/BWF/UpdateSSLCerts",
@ -68,9 +68,9 @@
"url": "https://www.barracuda.com/support/techalerts"
},
{
"name" : "VU#534407",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/534407"
"name": "https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/",
"refsource": "CONFIRM",
"url": "https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2015-1213",
"STATE": "PUBLIC"
},
@ -53,20 +53,20 @@
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
"name": "USN-2521-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2521-1"
},
{
"name": "72901",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72901"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=448423",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=448423"
},
{
"name" : "https://skia.googlesource.com/skia/+/6af314724f51ad79a640844536c667bb83de5690",
"refsource" : "CONFIRM",
"url" : "https://skia.googlesource.com/skia/+/6af314724f51ad79a640844536c667bb83de5690"
},
{
"name": "GLSA-201503-12",
"refsource": "GENTOO",
@ -78,14 +78,14 @@
"url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html"
},
{
"name" : "USN-2521-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2521-1"
"name": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
},
{
"name" : "72901",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/72901"
"name": "https://skia.googlesource.com/skia/+/6af314724f51ad79a640844536c667bb83de5690",
"refsource": "CONFIRM",
"url": "https://skia.googlesource.com/skia/+/6af314724f51ad79a640844536c667bb83de5690"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2015-1292",
"STATE": "PUBLIC"
},
@ -52,26 +52,46 @@
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2015:1873",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00013.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=522791",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=522791"
},
{
"name": "https://codereview.chromium.org/1307883002/",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/1307883002/"
},
{
"name": "RHSA-2015:1712",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1712.html"
},
{
"name": "1033472",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033472"
},
{
"name": "https://src.chromium.org/viewvc/blink?revision=201055&view=revision",
"refsource": "CONFIRM",
"url": "https://src.chromium.org/viewvc/blink?revision=201055&view=revision"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=522791",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=522791"
},
{
"name": "openSUSE-SU-2015:1586",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00029.html"
},
{
"name": "DSA-3351",
"refsource": "DEBIAN",
@ -81,26 +101,6 @@
"name": "GLSA-201603-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-09"
},
{
"name" : "RHSA-2015:1712",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1712.html"
},
{
"name" : "openSUSE-SU-2015:1873",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-11/msg00013.html"
},
{
"name" : "openSUSE-SU-2015:1586",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-09/msg00029.html"
},
{
"name" : "1033472",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033472"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2015-1295",
"STATE": "PUBLIC"
},
@ -52,40 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2015:1873",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00013.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=502562",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=502562"
},
{
"name" : "https://codereview.chromium.org/1228693002/",
"refsource" : "CONFIRM",
"url" : "https://codereview.chromium.org/1228693002/"
},
{
"name" : "DSA-3351",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3351"
},
{
"name" : "GLSA-201603-09",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201603-09"
},
{
"name": "RHSA-2015:1712",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1712.html"
},
{
"name" : "openSUSE-SU-2015:1873",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-11/msg00013.html"
"name": "1033472",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033472"
},
{
"name": "https://codereview.chromium.org/1228693002/",
"refsource": "CONFIRM",
"url": "https://codereview.chromium.org/1228693002/"
},
{
"name": "openSUSE-SU-2015:1586",
@ -93,9 +83,19 @@
"url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00029.html"
},
{
"name" : "1033472",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033472"
"name": "DSA-3351",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3351"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=502562",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=502562"
},
{
"name": "GLSA-201603-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-09"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20150203 My Little Forum Multiple XSS Security Vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Feb/15"
},
{
"name": "http://tetraph.com/security/xss-vulnerability/my-little-forum-multiple-xss-security-vulnerabilities/",
"refsource": "MISC",
@ -67,6 +62,11 @@
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/130220/My-Little-Forum-2.3.3-2.2-1.7-Cross-Site-Scripting.html"
},
{
"name": "20150203 My Little Forum Multiple XSS Security Vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Feb/15"
},
{
"name": "mylittleforum-multiple-xss(100616)",
"refsource": "XF",

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "FEDORA-2015-3944",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html"
},
{
"name": "1031663",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031663"
},
{
"name": "[oss-security] 20150129 Xen Security Advisory 118 - arm: vgic: incorrect rate limiting of guest triggered logging",
"refsource": "MLIST",
@ -62,20 +72,10 @@
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-118.html"
},
{
"name" : "FEDORA-2015-3944",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html"
},
{
"name": "72766",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72766"
},
{
"name" : "1031663",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1031663"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2015-5404",
"STATE": "PUBLIC"
},

View File

@ -57,25 +57,25 @@
"refsource": "CONFIRM",
"url": "https://rt.perl.org/Public/Bug/Display.html?id=132063"
},
{
"name" : "DSA-4172",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4172"
},
{
"name": "RHSA-2018:1192",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1192"
},
{
"name": "1040681",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040681"
},
{
"name": "USN-3625-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3625-1/"
},
{
"name" : "1040681",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040681"
"name": "DSA-4172",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4172"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20180409 [SECURITY] [DLA 1343-1] ming security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/04/msg00008.html"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892260",
"refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892260"
},
{
"name": "[debian-lts-announce] 20180409 [SECURITY] [DLA 1343-1] ming security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00008.html"
},
{
"name": "https://github.com/libming/libming/issues/114",
"refsource": "MISC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8453",
"STATE": "PUBLIC"
},
@ -212,6 +212,11 @@
},
"references": {
"reference_data": [
{
"name": "1041828",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041828"
},
{
"name": "https://securelist.com/cve-2018-8453-used-in-targeted-attack",
"refsource": "MISC",
@ -226,11 +231,6 @@
"name": "105467",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105467"
},
{
"name" : "1041828",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041828"
}
]
}