mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
8a44456dc4
commit
a5acd57c0f
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2008-0112",
|
"ID": "CVE-2008-0112",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,14 +53,19 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "HPSBST02320",
|
"name": "1019583",
|
||||||
"refsource" : "HP",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
|
"url": "http://www.securitytracker.com/id?1019583"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "SSRT080028",
|
"name": "TA08-071A",
|
||||||
"refsource" : "HP",
|
"refsource": "CERT",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA08-071A.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "oval:org.mitre.oval:def:5284",
|
||||||
|
"refsource": "OVAL",
|
||||||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5284"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "MS08-014",
|
"name": "MS08-014",
|
||||||
@ -68,9 +73,14 @@
|
|||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "TA08-071A",
|
"name": "SSRT080028",
|
||||||
"refsource" : "CERT",
|
"refsource": "HP",
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-071A.html"
|
"url": "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBST02320",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "28095",
|
"name": "28095",
|
||||||
@ -81,16 +91,6 @@
|
|||||||
"name": "ADV-2008-0846",
|
"name": "ADV-2008-0846",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/0846/references"
|
"url": "http://www.vupen.com/english/advisories/2008/0846/references"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "oval:org.mitre.oval:def:5284",
|
|
||||||
"refsource" : "OVAL",
|
|
||||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5284"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1019583",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1019583"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,44 +53,44 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080104 Some DoS in some telnet servers",
|
"name": "3525",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/485812/100/0/threaded"
|
"url": "http://securityreason.com/securityalert/3525"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20080219 Two heap overflow in Foxit WAC Server 2.0 Build 3503",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/488366/100/200/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://aluigi.altervista.org/adv/waccaz-adv.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://aluigi.altervista.org/adv/waccaz-adv.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://aluigi.altervista.org/adv/wachof-adv.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://aluigi.altervista.org/adv/wachof-adv.txt"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "27142",
|
"name": "27142",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/27142"
|
"url": "http://www.securityfocus.com/bid/27142"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "wacserver-option-dos(39427)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39427"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://aluigi.altervista.org/adv/waccaz-adv.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://aluigi.altervista.org/adv/waccaz-adv.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080219 Two heap overflow in Foxit WAC Server 2.0 Build 3503",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/488366/100/200/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080104 Some DoS in some telnet servers",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/485812/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "28272",
|
"name": "28272",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/28272"
|
"url": "http://secunia.com/advisories/28272"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3525",
|
"name": "http://aluigi.altervista.org/adv/wachof-adv.txt",
|
||||||
"refsource" : "SREASON",
|
"refsource": "MISC",
|
||||||
"url" : "http://securityreason.com/securityalert/3525"
|
"url": "http://aluigi.altervista.org/adv/wachof-adv.txt"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "wacserver-option-dos(39427)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39427"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080124 Pre Dynamic Institution bypass",
|
"name": "predynamic-login-sql-injection(39942)",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "XF",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/487054/100/0/threaded"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39942"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "27451",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/27451"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "28651",
|
"name": "28651",
|
||||||
@ -73,9 +68,14 @@
|
|||||||
"url": "http://securityreason.com/securityalert/3603"
|
"url": "http://securityreason.com/securityalert/3603"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "predynamic-login-sql-injection(39942)",
|
"name": "20080124 Pre Dynamic Institution bypass",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39942"
|
"url": "http://www.securityfocus.com/archive/1/487054/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27451",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/27451"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20080205 dBpowerAMP Audio Player Release 2 Remote Buffer Overflow",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/487605/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "5067",
|
"name": "5067",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
@ -67,20 +62,25 @@
|
|||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/5069"
|
"url": "https://www.exploit-db.com/exploits/5069"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "27635",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/27635"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "27639",
|
"name": "27639",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/27639"
|
"url": "http://www.securityfocus.com/bid/27639"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20080205 dBpowerAMP Audio Player Release 2 Remote Buffer Overflow",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/487605/100/0/threaded"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "3623",
|
"name": "3623",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/3623"
|
"url": "http://securityreason.com/securityalert/3623"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "27635",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/27635"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2008-1092",
|
"ID": "CVE-2008-1092",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,24 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "HPSBST02336",
|
"name": "1019686",
|
||||||
"refsource" : "HP",
|
"refsource": "SECTRACK",
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=121129490723574&w=2"
|
"url": "http://www.securitytracker.com/id?1019686"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT080071",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=121129490723574&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "MS08-028",
|
|
||||||
"refsource" : "MS",
|
|
||||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-028"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "950627",
|
|
||||||
"refsource" : "MSKB",
|
|
||||||
"url" : "http://www.microsoft.com/technet/security/advisory/950627.mspx"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "VU#936529",
|
"name": "VU#936529",
|
||||||
@ -78,14 +63,29 @@
|
|||||||
"url": "http://www.kb.cert.org/vuls/id/936529"
|
"url": "http://www.kb.cert.org/vuls/id/936529"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1019686",
|
"name": "MS08-028",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "MS",
|
||||||
"url" : "http://www.securitytracker.com/id?1019686"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-028"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "microsoft-jet-msjet40-bo(41380)",
|
"name": "microsoft-jet-msjet40-bo(41380)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41380"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41380"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT080071",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=121129490723574&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBST02336",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=121129490723574&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "950627",
|
||||||
|
"refsource": "MSKB",
|
||||||
|
"url": "http://www.microsoft.com/technet/security/advisory/950627.mspx"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,16 +52,16 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "5204",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/5204"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html",
|
"name": "http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html"
|
"url": "http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "5204",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/5204"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "28022",
|
"name": "28022",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
|
@ -53,39 +53,39 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2008-07-11",
|
"name": "ipod-iphone-certificate-info-disclosure(43734)",
|
||||||
"refsource" : "APPLE",
|
"refsource": "XF",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43734"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "JVN#88676089",
|
|
||||||
"refsource" : "JVN",
|
|
||||||
"url" : "http://jvn.jp/en/jp/JVN88676089/index.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "JVNDB-2008-000039",
|
|
||||||
"refsource" : "JVNDB",
|
|
||||||
"url" : "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000039.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "30186",
|
"name": "30186",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/30186"
|
"url": "http://www.securityfocus.com/bid/30186"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "JVN#88676089",
|
||||||
|
"refsource": "JVN",
|
||||||
|
"url": "http://jvn.jp/en/jp/JVN88676089/index.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2008-07-11",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-2094",
|
"name": "ADV-2008-2094",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/2094/references"
|
"url": "http://www.vupen.com/english/advisories/2008/2094/references"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "JVNDB-2008-000039",
|
||||||
|
"refsource": "JVNDB",
|
||||||
|
"url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000039.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "31074",
|
"name": "31074",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/31074"
|
"url": "http://secunia.com/advisories/31074"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ipod-iphone-certificate-info-disclosure(43734)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43734"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,24 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080404 KwsPHP Module ConcoursPhoto XSS",
|
"name": "3809",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SREASON",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/490470/100/0/threaded"
|
"url": "http://securityreason.com/securityalert/3809"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "28612",
|
"name": "28612",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/28612"
|
"url": "http://www.securityfocus.com/bid/28612"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "3809",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/3809"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "concoursphoto-index-xss(41814)",
|
"name": "concoursphoto-index-xss(41814)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41814"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41814"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080404 KwsPHP Module ConcoursPhoto XSS",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/490470/100/0/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://packetstorm.linuxsecurity.com/0808-exploits/atmail542-xss.txt",
|
"name": "atmail-parse-showmail-abook-xss(44860)",
|
||||||
"refsource" : "MISC",
|
"refsource": "XF",
|
||||||
"url" : "http://packetstorm.linuxsecurity.com/0808-exploits/atmail542-xss.txt"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44860"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "31720",
|
"name": "31720",
|
||||||
@ -68,9 +68,9 @@
|
|||||||
"url": "http://secunia.com/advisories/31727"
|
"url": "http://secunia.com/advisories/31727"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "atmail-parse-showmail-abook-xss(44860)",
|
"name": "http://packetstorm.linuxsecurity.com/0808-exploits/atmail542-xss.txt",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44860"
|
"url": "http://packetstorm.linuxsecurity.com/0808-exploits/atmail542-xss.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,30 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "6388",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/6388"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://z0rlu.blogspot.com/2008/09/vastal-i-tech-dating-zone-fage-sql.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://z0rlu.blogspot.com/2008/09/vastal-i-tech-dating-zone-fage-sql.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "31043",
|
"name": "31043",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/31043"
|
"url": "http://www.securityfocus.com/bid/31043"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "datingzone-advancedsearch-sql-injection(44946)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44946"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "6388",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/6388"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "31747",
|
"name": "31747",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/31747"
|
"url": "http://secunia.com/advisories/31747"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "datingzone-advancedsearch-sql-injection(44946)",
|
"name": "http://z0rlu.blogspot.com/2008/09/vastal-i-tech-dating-zone-fage-sql.html",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44946"
|
"url": "http://z0rlu.blogspot.com/2008/09/vastal-i-tech-dating-zone-fage-sql.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,24 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20081015 CVE request: jhead",
|
"name": "31921",
|
||||||
"refsource" : "MLIST",
|
"refsource": "BID",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2008/10/15/5"
|
"url": "http://www.securityfocus.com/bid/31921"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20081015 Re: CVE request: jhead",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2008/10/15/6"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20081016 Re: CVE request: jhead",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2008/10/16/3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20081127 Re: CVE request: jhead",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2008/11/26/4"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/271020",
|
"name": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/271020",
|
||||||
@ -78,9 +63,24 @@
|
|||||||
"url": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/271020"
|
"url": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/271020"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "31921",
|
"name": "[oss-security] 20081015 CVE request: jhead",
|
||||||
"refsource" : "BID",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.securityfocus.com/bid/31921"
|
"url": "http://www.openwall.com/lists/oss-security/2008/10/15/5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20081127 Re: CVE request: jhead",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2008/11/26/4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20081016 Re: CVE request: jhead",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2008/10/16/3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20081015 Re: CVE request: jhead",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2008/10/15/6"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,21 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "4721",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/4721"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "32702",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/32702"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20081208 DoS attacks on MIME-capable software via complex MIME emails",
|
"name": "20081208 DoS attacks on MIME-capable software via complex MIME emails",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
@ -61,21 +76,6 @@
|
|||||||
"name": "20081209 Re: DoS attacks on MIME-capable software via complex MIME emails",
|
"name": "20081209 Re: DoS attacks on MIME-capable software via complex MIME emails",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/499045/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/499045/100/0/threaded"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "32702",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/32702"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "4721",
|
|
||||||
"refsource" : "SREASON",
|
|
||||||
"url" : "http://securityreason.com/securityalert/4721"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secure@microsoft.com",
|
||||||
"ID": "CVE-2013-3194",
|
"ID": "CVE-2013-3194",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,15 +57,15 @@
|
|||||||
"refsource": "MS",
|
"refsource": "MS",
|
||||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-059"
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-059"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "TA13-225A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-225A"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "oval:org.mitre.oval:def:18267",
|
"name": "oval:org.mitre.oval:def:18267",
|
||||||
"refsource": "OVAL",
|
"refsource": "OVAL",
|
||||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18267"
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18267"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "TA13-225A",
|
||||||
|
"refsource": "CERT",
|
||||||
|
"url": "http://www.us-cert.gov/ncas/alerts/TA13-225A"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,9 +58,9 @@
|
|||||||
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000228.html"
|
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000228.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "[rt-announce] 20130522 RT 4.0.13 released",
|
"name": "93610",
|
||||||
"refsource" : "MLIST",
|
"refsource": "OSVDB",
|
||||||
"url" : "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000227.html"
|
"url": "http://www.osvdb.org/93610"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "[rt-announce] 20130522 Security vulnerabilities in RT",
|
"name": "[rt-announce] 20130522 Security vulnerabilities in RT",
|
||||||
@ -68,20 +68,20 @@
|
|||||||
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000226.html"
|
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000226.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "DSA-2670",
|
"name": "[rt-announce] 20130522 RT 4.0.13 released",
|
||||||
"refsource" : "DEBIAN",
|
"refsource": "MLIST",
|
||||||
"url" : "http://www.debian.org/security/2012/dsa-2670"
|
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000227.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "93610",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/93610"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "53505",
|
"name": "53505",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/53505"
|
"url": "http://secunia.com/advisories/53505"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-2670",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2012/dsa-2670"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "53522",
|
"name": "53522",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
|
@ -52,40 +52,40 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20130402 NGS00248 Patch Notification: Virtual Access Monitor Multiple SQL Injection Vulnerabilities",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-04/0011.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://packetstormsecurity.com/files/121051/Virtual-Access-Monitor-SQL-Injection.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://packetstormsecurity.com/files/121051/Virtual-Access-Monitor-SQL-Injection.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://www.nccgroup.com/media/244196/patch_notificatio_virtual_access_monitor_multiple_sql_injection_vulnerabilities.pdf",
|
"name": "http://www.nccgroup.com/media/244196/patch_notificatio_virtual_access_monitor_multiple_sql_injection_vulnerabilities.pdf",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.nccgroup.com/media/244196/patch_notificatio_virtual_access_monitor_multiple_sql_injection_vulnerabilities.pdf"
|
"url": "http://www.nccgroup.com/media/244196/patch_notificatio_virtual_access_monitor_multiple_sql_injection_vulnerabilities.pdf"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20130402 NGS00248 Patch Notification: Virtual Access Monitor Multiple SQL Injection Vulnerabilities",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0011.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "58816",
|
"name": "58816",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/58816"
|
"url": "http://www.securityfocus.com/bid/58816"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "http://packetstormsecurity.com/files/121051/Virtual-Access-Monitor-SQL-Injection.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://packetstormsecurity.com/files/121051/Virtual-Access-Monitor-SQL-Injection.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "91887",
|
"name": "91887",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/91887"
|
"url": "http://osvdb.org/91887"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "52801",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/52801"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "virtualaccess-unspecified-sql-injection(83179)",
|
"name": "virtualaccess-unspecified-sql-injection(83179)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83179"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83179"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "52801",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/52801"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-4344",
|
"ID": "CVE-2013-4344",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,50 +52,50 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20131002 Xen Security Advisory 65 (CVE-2013-4344) - qemu SCSI REPORT LUNS buffer overflow",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2013/10/02/2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[qemu-devel] 20131009 [ANNOUNCE] QEMU 1.6.1 Stable released",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://article.gmane.org/gmane.comp.emulators.qemu/237191"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2013:1553",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1553.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHSA-2013:1754",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1754.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2014:1279",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2014:1281",
|
"name": "openSUSE-SU-2014:1281",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "USN-2092-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-2092-1"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "62773",
|
"name": "62773",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/62773"
|
"url": "http://www.securityfocus.com/bid/62773"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "[qemu-devel] 20131009 [ANNOUNCE] QEMU 1.6.1 Stable released",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://article.gmane.org/gmane.comp.emulators.qemu/237191"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2014:1279",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20131002 Xen Security Advisory 65 (CVE-2013-4344) - qemu SCSI REPORT LUNS buffer overflow",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2013/10/02/2"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "98028",
|
"name": "98028",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/98028"
|
"url": "http://osvdb.org/98028"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2013:1754",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1754.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHSA-2013:1553",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "http://rhn.redhat.com/errata/RHSA-2013-1553.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-2092-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-2092-1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-4421",
|
"ID": "CVE-2013-4421",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "[oss-security] 20131010 Re: CVE Request: dropbear sshd daemon 2013.59 release",
|
"name": "55173",
|
||||||
"refsource" : "MLIST",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.openwall.com/lists/oss-security/2013/10/11/4"
|
"url": "http://secunia.com/advisories/55173"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://matt.ucc.asn.au/dropbear/CHANGES",
|
"name": "https://matt.ucc.asn.au/dropbear/CHANGES",
|
||||||
@ -67,26 +67,11 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://secure.ucc.asn.au/hg/dropbear/rev/0bf76f54de6f"
|
"url": "https://secure.ucc.asn.au/hg/dropbear/rev/0bf76f54de6f"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://support.citrix.com/article/CTX216642",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://support.citrix.com/article/CTX216642"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "FEDORA-2013-18593",
|
"name": "FEDORA-2013-18593",
|
||||||
"refsource": "FEDORA",
|
"refsource": "FEDORA",
|
||||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119323.html"
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119323.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "FEDORA-2013-18606",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119300.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "openSUSE-SU-2013:1616",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-10/msg00061.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1696",
|
"name": "openSUSE-SU-2013:1696",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
@ -98,9 +83,24 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/62958"
|
"url": "http://www.securityfocus.com/bid/62958"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "55173",
|
"name": "https://support.citrix.com/article/CTX216642",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/55173"
|
"url": "https://support.citrix.com/article/CTX216642"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2013-18606",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119300.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "openSUSE-SU-2013:1616",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00061.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20131010 Re: CVE Request: dropbear sshd daemon 2013.59 release",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2013/10/11/4"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-6395",
|
"ID": "CVE-2013-6395",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -57,25 +57,20 @@
|
|||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://seclists.org/oss-sec/2013/q4/346"
|
"url": "http://seclists.org/oss-sec/2013/q4/346"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.rusty-ice.de/advisory/advisory_2013002.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.rusty-ice.de/advisory/advisory_2013002.txt"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/ganglia/ganglia-web/issues/218",
|
"name": "https://github.com/ganglia/ganglia-web/issues/218",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://github.com/ganglia/ganglia-web/issues/218"
|
"url": "https://github.com/ganglia/ganglia-web/issues/218"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "100380",
|
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "MISC",
|
||||||
"url" : "http://osvdb.org/100380"
|
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "gangliaweb-cve20136395-xss(89272)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89272"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "55854",
|
"name": "55854",
|
||||||
@ -83,9 +78,14 @@
|
|||||||
"url": "http://secunia.com/advisories/55854"
|
"url": "http://secunia.com/advisories/55854"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "gangliaweb-cve20136395-xss(89272)",
|
"name": "http://www.rusty-ice.de/advisory/advisory_2013002.txt",
|
||||||
"refsource" : "XF",
|
"refsource": "MISC",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/89272"
|
"url": "http://www.rusty-ice.de/advisory/advisory_2013002.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "100380",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/100380"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2013-6533",
|
"ID": "CVE-2013-6533",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2013-6586",
|
"ID": "CVE-2013-6586",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -53,34 +53,34 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://blog.rack911.com/security-advisories/hostbill-xss-admin-hijack-security-vulnerability-r911-0099",
|
"name": "56124",
|
||||||
"refsource" : "MISC",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://blog.rack911.com/security-advisories/hostbill-xss-admin-hijack-security-vulnerability-r911-0099"
|
"url": "http://secunia.com/advisories/56124"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://extras.hostbillapp.com/security-advisory-hostbill-version-2013-12-14/",
|
"name": "http://extras.hostbillapp.com/security-advisory-hostbill-version-2013-12-14/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://extras.hostbillapp.com/security-advisory-hostbill-version-2013-12-14/"
|
"url": "http://extras.hostbillapp.com/security-advisory-hostbill-version-2013-12-14/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://hostbillapp.com/changelog",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://hostbillapp.com/changelog"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "101030",
|
"name": "101030",
|
||||||
"refsource": "OSVDB",
|
"refsource": "OSVDB",
|
||||||
"url": "http://osvdb.org/101030"
|
"url": "http://osvdb.org/101030"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "56124",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/56124"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "hostbill-unspecified-xss(89750)",
|
"name": "hostbill-unspecified-xss(89750)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89750"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://hostbillapp.com/changelog",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://hostbillapp.com/changelog"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://blog.rack911.com/security-advisories/hostbill-xss-admin-hijack-security-vulnerability-r911-0099",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://blog.rack911.com/security-advisories/hostbill-xss-admin-hijack-security-vulnerability-r911-0099"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -86,15 +86,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "101332",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/101332"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1039592",
|
"name": "1039592",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1039592"
|
"url": "http://www.securitytracker.com/id/1039592"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "101332",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/101332"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"DATE_PUBLIC": "2018-01-02T00:00:00",
|
"DATE_PUBLIC": "2018-01-02T00:00:00",
|
||||||
"ID": "CVE-2017-13184",
|
"ID": "CVE-2017-13184",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
@ -61,15 +61,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.android.com/security/bulletin/2018-01-01"
|
"url": "https://source.android.com/security/bulletin/2018-01-01"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "102414",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/102414"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1040106",
|
"name": "1040106",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1040106"
|
"url": "http://www.securitytracker.com/id/1040106"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "102414",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/102414"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://twitter.com/silascutler/status/938052460328968192",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://twitter.com/silascutler/status/938052460328968192"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20171212 Three exploits for Zivif Web Cameras (may impact others)",
|
"name": "20171212 Three exploits for Zivif Web Cameras (may impact others)",
|
||||||
"refsource": "FULLDISC",
|
"refsource": "FULLDISC",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html",
|
"name": "http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html"
|
"url": "http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://twitter.com/silascutler/status/938052460328968192",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://twitter.com/silascutler/status/938052460328968192"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -58,15 +58,35 @@
|
|||||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f659a03a0ba9289b9aeb9b4470e6fb263d6f483"
|
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f659a03a0ba9289b9aeb9b4470e6fb263d6f483"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/torvalds/linux/commit/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483",
|
"name": "USN-3582-1",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "UBUNTU",
|
||||||
"url" : "https://github.com/torvalds/linux/commit/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483"
|
"url": "https://usn.ubuntu.com/3582-1/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://source.android.com/security/bulletin/pixel/2018-04-01",
|
"name": "https://source.android.com/security/bulletin/pixel/2018-04-01",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.android.com/security/bulletin/pixel/2018-04-01"
|
"url": "https://source.android.com/security/bulletin/pixel/2018-04-01"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/torvalds/linux/commit/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/torvalds/linux/commit/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-3581-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "https://usn.ubuntu.com/3581-1/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-3581-3",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "https://usn.ubuntu.com/3581-3/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-3581-2",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "https://usn.ubuntu.com/3581-2/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "DSA-4073",
|
"name": "DSA-4073",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
@ -77,26 +97,6 @@
|
|||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2018:0502"
|
"url": "https://access.redhat.com/errata/RHSA-2018:0502"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "USN-3581-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "https://usn.ubuntu.com/3581-1/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-3581-2",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "https://usn.ubuntu.com/3581-2/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-3581-3",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "https://usn.ubuntu.com/3581-3/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-3582-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "https://usn.ubuntu.com/3582-1/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-3582-2",
|
"name": "USN-3582-2",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://docs.wixstatic.com/ugd/28ba71_6ecc3158975a484d827e935edda4fa17.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://docs.wixstatic.com/ugd/28ba71_6ecc3158975a484d827e935edda4fa17.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://www.trustworks.at/publications",
|
"name": "https://www.trustworks.at/publications",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://www.trustworks.at/publications"
|
"url": "https://www.trustworks.at/publications"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://docs.wixstatic.com/ugd/28ba71_6ecc3158975a484d827e935edda4fa17.pdf",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://docs.wixstatic.com/ugd/28ba71_6ecc3158975a484d827e935edda4fa17.pdf"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=cfde94be1d4286bc47633c6e6eaf4e659bd78066",
|
"name": "GLSA-201811-12",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=cfde94be1d4286bc47633c6e6eaf4e659bd78066"
|
"url": "https://security.gentoo.org/glsa/201811-12"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugs.ghostscript.com/show_bug.cgi?id=697985",
|
"name": "https://bugs.ghostscript.com/show_bug.cgi?id=697985",
|
||||||
@ -67,15 +67,15 @@
|
|||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2017/dsa-3986"
|
"url": "http://www.debian.org/security/2017/dsa-3986"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "GLSA-201811-12",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "https://security.gentoo.org/glsa/201811-12"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "99991",
|
"name": "99991",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/99991"
|
"url": "http://www.securityfocus.com/bid/99991"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=cfde94be1d4286bc47633c6e6eaf4e659bd78066",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=cfde94be1d4286bc47633c6e6eaf4e659bd78066"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@qnapsecurity.com.tw",
|
"ASSIGNER": "security@qnap.com",
|
||||||
"ID": "CVE-2018-0716",
|
"ID": "CVE-2018-0716",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2018-1208",
|
"ID": "CVE-2018-1208",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -56,11 +56,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "45400",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/45400/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://syncope.apache.org/security.html#CVE-2018-1322:_Information_disclosure_via_FIQL_and_ORDER_BY_sorting",
|
"name": "http://syncope.apache.org/security.html#CVE-2018-1322:_Information_disclosure_via_FIQL_and_ORDER_BY_sorting",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
@ -70,6 +65,11 @@
|
|||||||
"name": "103507",
|
"name": "103507",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/103507"
|
"url": "http://www.securityfocus.com/bid/103507"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "45400",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/45400/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -100,15 +100,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10719841",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10719841"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ibm-dng-cve20181610-xss(143931)",
|
"name": "ibm-dng-cve20181610-xss(143931)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/143931"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/143931"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.ibm.com/support/docview.wss?uid=ibm10719841",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10719841"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -76,15 +76,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10737069",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10737069"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ibm-guardium-cve20181817-xss(150021)",
|
"name": "ibm-guardium-cve20181817-xss(150021)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150021"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150021"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10737069",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10737069"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user