"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:42:14 +00:00
parent 4fa52981b0
commit a5e4ade3e1
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3396 additions and 3396 deletions

View File

@ -52,25 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=213957",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=213957"
},
{
"name": "http://www.vuxml.org/freebsd/56971fa6-641c-11d9-a097-000854d03344.html",
"refsource": "CONFIRM",
"url": "http://www.vuxml.org/freebsd/56971fa6-641c-11d9-a097-000854d03344.html"
},
{
"name" : "8770",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/8770"
},
{
"name" : "8776",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/8776"
"name": "xshisen-xshisenlib-bo(13359)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13359"
},
{
"name": "9950",
@ -83,9 +73,19 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13358"
},
{
"name" : "xshisen-xshisenlib-bo(13359)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/13359"
"name": "8770",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/8770"
},
{
"name": "8776",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/8776"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=213957",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=213957"
}
]
}

View File

@ -52,60 +52,60 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3"
},
{
"name" : "http://bugzilla.mozilla.org/show_bug.cgi?id=235781",
"refsource" : "CONFIRM",
"url" : "http://bugzilla.mozilla.org/show_bug.cgi?id=235781"
},
{
"name" : "http://bugzilla.mozilla.org/show_bug.cgi?id=231083",
"refsource" : "CONFIRM",
"url" : "http://bugzilla.mozilla.org/show_bug.cgi?id=231083"
},
{
"name" : "GLSA-200409-26",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200409-26.xml"
},
{
"name": "RHSA-2005:323",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-323.html"
},
{
"name" : "SUSE-SA:2004:036",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2004_36_mozilla.html"
},
{
"name" : "VU#653160",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/653160"
},
{
"name" : "11192",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/11192"
},
{
"name" : "oval:org.mitre.oval:def:11668",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11668"
},
{
"name": "mozilla-insecure-file-permissions(17375)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17375"
},
{
"name": "11192",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11192"
},
{
"name": "SUSE-SA:2004:036",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2004_36_mozilla.html"
},
{
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=231083",
"refsource": "CONFIRM",
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=231083"
},
{
"name": "oval:org.mitre.oval:def:11668",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11668"
},
{
"name": "VU#653160",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/653160"
},
{
"name": "http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3"
},
{
"name": "GLSA-200409-26",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200409-26.xml"
},
{
"name": "12526",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/12526/"
},
{
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=235781",
"refsource": "CONFIRM",
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=235781"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20041018 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true"
"name": "antivirus-zip-protection-bypass(17761)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761"
},
{
"name": "VU#968818",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/11448"
},
{
"name" : "antivirus-zip-protection-bypass(17761)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761"
"name": "20041018 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability",
"refsource": "IDEFENSE",
"url": "http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "57619",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57619-1&searchclause=security"
},
{
"name": "101549",
"refsource": "SUNALERT",
@ -68,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/139504"
},
{
"name" : "oval:org.mitre.oval:def:100113",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100113"
"name": "57619",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57619-1&searchclause=security"
},
{
"name": "12257",
@ -86,6 +81,11 @@
"name": "xdm-xdmcp-dos(16940)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16940"
},
{
"name": "oval:org.mitre.oval:def:100113",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100113"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "GLSA-200408-07",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200408-07.xml"
},
{
"name" : "http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&r2=1.389.2.109&ty=h",
"refsource" : "CONFIRM",
"url" : "http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&r2=1.389.2.109&ty=h"
},
{
"name": "10845",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10845"
},
{
"name": "imp-html-viewer-xss(16866)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16866"
},
{
"name": "12202",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/12202/"
},
{
"name" : "imp-html-viewer-xss(16866)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/16866"
"name": "http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&r2=1.389.2.109&ty=h",
"refsource": "CONFIRM",
"url": "http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&r2=1.389.2.109&ty=h"
},
{
"name": "GLSA-200408-07",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200408-07.xml"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20040407 Mcafee FreeScan - Remote Buffer Overflow and Private Information Disclosure",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=108136872711898&w=2"
},
{
"name" : "20040407 Mcafee FreeScan - Remote Buffer Overflow and Private Information Disclosure",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019877.html"
},
{
"name": "20040407 Symantec, McAfee and Panda ActiveX controls",
"refsource": "FULLDISC",
@ -73,9 +63,19 @@
"url": "http://marc.info/?l=bugtraq&m=108137545531496&w=2"
},
{
"name" : "10077",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/10077"
"name": "freescan-mcfscan-info-disclosure(15782)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15782"
},
{
"name": "20040407 Mcafee FreeScan - Remote Buffer Overflow and Private Information Disclosure",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108136872711898&w=2"
},
{
"name": "20040407 Mcafee FreeScan - Remote Buffer Overflow and Private Information Disclosure",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019877.html"
},
{
"name": "11313",
@ -83,9 +83,9 @@
"url": "http://secunia.com/advisories/11313"
},
{
"name" : "freescan-mcfscan-info-disclosure(15782)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15782"
"name": "10077",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10077"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20040822 [PoC] Nasty bug(s) found in Axis Network Camera/Video Servers",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0948.html"
},
{
"name" : "20040831 Axis Network Camera and Video Server Security Advisory",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2004-08/1282.html"
},
{
"name" : "11011",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/11011"
"name": "asix-command-execution(17076)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17076"
},
{
"name": "9121",
@ -73,9 +63,14 @@
"url": "http://www.osvdb.org/9121"
},
{
"name" : "1011056",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1011056"
"name": "11011",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11011"
},
{
"name": "20040831 Axis Network Camera and Video Server Security Advisory",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-08/1282.html"
},
{
"name": "12353",
@ -83,9 +78,14 @@
"url": "http://secunia.com/advisories/12353"
},
{
"name" : "asix-command-execution(17076)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17076"
"name": "20040822 [PoC] Nasty bug(s) found in Axis Network Camera/Video Servers",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0948.html"
},
{
"name": "1011056",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1011056"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "webboard-showqanswer-sql-injection(42496)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42496"
},
{
"name": "5638",
"refsource": "EXPLOIT-DB",
@ -62,20 +67,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29263"
},
{
"name" : "ADV-2008-1565",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1565/references"
},
{
"name": "30295",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30295"
},
{
"name" : "webboard-showqanswer-sql-injection(42496)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42496"
"name": "ADV-2008-1565",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1565/references"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-2546",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-2932",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=454662"
},
{
"name" : "FEDORA-2008-7339",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html"
"name": "31106",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31106"
},
{
"name": "FEDORA-2008-7642",
@ -68,9 +68,9 @@
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00218.html"
},
{
"name" : "31106",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31106"
"name": "FEDORA-2008-7339",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00449.html"
},
{
"name": "31777",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "31391",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31391"
},
{
"name": "20080805 8e6 Technologies R3000 Internet Filter Bypass with Host Decoy",
"refsource": "BUGTRAQ",
@ -62,11 +67,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30541"
},
{
"name" : "31391",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31391"
},
{
"name": "r3000-httprequest-security-bypass(44238)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2008-3533",
"STATE": "PUBLIC"
},
@ -58,34 +58,9 @@
"url": "http://bugzilla.gnome.org/attachment.cgi?id=115890"
},
{
"name" : "http://bugzilla.gnome.org/show_bug.cgi?id=546364",
"refsource" : "CONFIRM",
"url" : "http://bugzilla.gnome.org/show_bug.cgi?id=546364"
},
{
"name" : "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860"
},
{
"name" : "FEDORA-2008-7293",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html"
},
{
"name" : "MDVSA-2008:175",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:175"
},
{
"name" : "SUSE-SR:2008:024",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html"
},
{
"name" : "USN-638-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-638-1"
"name": "31465",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31465"
},
{
"name": "30690",
@ -93,14 +68,9 @@
"url": "http://www.securityfocus.com/bid/30690"
},
{
"name" : "ADV-2008-2393",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2393"
},
{
"name" : "31465",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31465"
"name": "SUSE-SR:2008:024",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html"
},
{
"name": "31620",
@ -108,9 +78,9 @@
"url": "http://secunia.com/advisories/31620"
},
{
"name" : "31834",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31834"
"name": "USN-638-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-638-1"
},
{
"name": "32629",
@ -121,6 +91,36 @@
"name": "yelp-uri-format-string(44449)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44449"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/yelp/+bug/254860"
},
{
"name": "31834",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31834"
},
{
"name": "http://bugzilla.gnome.org/show_bug.cgi?id=546364",
"refsource": "CONFIRM",
"url": "http://bugzilla.gnome.org/show_bug.cgi?id=546364"
},
{
"name": "ADV-2008-2393",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2393"
},
{
"name": "FEDORA-2008-7293",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00222.html"
},
{
"name": "MDVSA-2008:175",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:175"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.org/0812-exploits/z1exchange-sqlxss.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/0812-exploits/z1exchange-sqlxss.txt"
},
{
"name": "32598",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "z1exchange-edit-showads-sql-injection(46938)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46938"
},
{
"name": "http://packetstormsecurity.org/0812-exploits/z1exchange-sqlxss.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0812-exploits/z1exchange-sqlxss.txt"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20080609 webTA by kronos - XSS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/493193/100/0/threaded"
},
{
"name" : "29610",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29610"
"name": "30588",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30588"
},
{
"name": "46207",
@ -68,19 +63,24 @@
"url": "http://osvdb.org/46207"
},
{
"name" : "46208",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/46208"
},
{
"name" : "30588",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30588"
"name": "29610",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29610"
},
{
"name": "webta-comthreeiswebta-xss(43056)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43056"
},
{
"name": "46208",
"refsource": "OSVDB",
"url": "http://osvdb.org/46208"
},
{
"name": "20080609 webTA by kronos - XSS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493193/100/0/threaded"
}
]
}

View File

@ -62,16 +62,16 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6301"
},
{
"name" : "30821",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30821"
},
{
"name": "31606",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31606"
},
{
"name": "30821",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30821"
},
{
"name": "ezcontents-link-file-include(44663)",
"refsource": "XF",

View File

@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://sourceforge.net/project/shownotes.php?group_id=110672&release_id=565250",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?group_id=110672&release_id=565250"
},
{
"name": "27171",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27171"
},
{
"name" : "40217",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/40217"
"name": "http://sourceforge.net/project/shownotes.php?group_id=110672&release_id=565250",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?group_id=110672&release_id=565250"
},
{
"name": "28302",
@ -76,6 +71,11 @@
"name": "shareaza-update-domain-spoofing(39484)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39484"
},
{
"name": "40217",
"refsource": "OSVDB",
"url": "http://osvdb.org/40217"
}
]
}

View File

@ -52,11 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "88184",
"refsource": "OSVDB",
"url": "http://osvdb.org/88184"
},
{
"name": "http://packetstormsecurity.com/files/118673/Achievo-1.4.5-Cross-Site-Scripting-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/118673/Achievo-1.4.5-Cross-Site-Scripting-SQL-Injection.html"
},
{
"name": "achievo-activityid-sql-injection(80570)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80570"
},
{
"name": "https://www.htbridge.com/advisory/HTB23126",
"refsource": "MISC",
@ -66,16 +76,6 @@
"name": "56858",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56858"
},
{
"name" : "88184",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/88184"
},
{
"name" : "achievo-activityid-sql-injection(80570)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/80570"
}
]
}

View File

@ -52,25 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20121219 Multiple SQL Injection Vulnerabilities in Elite Bulletin Board",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-12/0114.html"
},
{
"name": "23575",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/23575"
},
{
"name" : "http://packetstormsecurity.com/files/118962/Elite-Bulletin-Board-2.1.21-SQL-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/118962/Elite-Bulletin-Board-2.1.21-SQL-Injection.html"
},
{
"name" : "https://www.htbridge.com/advisory/HTB23133",
"refsource" : "MISC",
"url" : "https://www.htbridge.com/advisory/HTB23133"
"name": "88531",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/88531"
},
{
"name": "http://elite-board.us/Community/viewtopic.php?bid=1&tid=310",
@ -78,9 +68,19 @@
"url": "http://elite-board.us/Community/viewtopic.php?bid=1&tid=310"
},
{
"name" : "88531",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/88531"
"name": "https://www.htbridge.com/advisory/HTB23133",
"refsource": "MISC",
"url": "https://www.htbridge.com/advisory/HTB23133"
},
{
"name": "http://packetstormsecurity.com/files/118962/Elite-Bulletin-Board-2.1.21-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/118962/Elite-Bulletin-Board-2.1.21-SQL-Injection.html"
},
{
"name": "20121219 Multiple SQL Injection Vulnerabilities in Elite Bulletin Board",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-12/0114.html"
},
{
"name": "51622",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-5959",
"STATE": "PUBLIC"
},
@ -53,39 +53,34 @@
"references": {
"reference_data": [
{
"name" : "https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play",
"refsource" : "MISC",
"url" : "https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play"
"name": "20130129 Portable SDK for UPnP Devices Contains Buffer Overflow Vulnerabilities",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp"
},
{
"name": "MDVSA-2013:098",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:098"
},
{
"name": "http://tsd.dlink.com.tw/temp/PMD/12960/DSR-150N_A2_Release_Notes_FW_v1.05B64_WW.pdf",
"refsource": "CONFIRM",
"url": "http://tsd.dlink.com.tw/temp/PMD/12960/DSR-150N_A2_Release_Notes_FW_v1.05B64_WW.pdf"
},
{
"name": "https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf",
"refsource": "MISC",
"url": "https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf"
},
{
"name" : "https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb",
"refsource" : "MISC",
"url" : "https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb"
},
{
"name" : "https://www.tenable.com/security/research/tra-2017-10",
"refsource" : "MISC",
"url" : "https://www.tenable.com/security/research/tra-2017-10"
},
{
"name" : "http://pupnp.sourceforge.net/ChangeLog",
"refsource" : "CONFIRM",
"url" : "http://pupnp.sourceforge.net/ChangeLog"
},
{
"name": "http://tsd.dlink.com.tw/temp/PMD/12879/DSR-500_500N_1000_1000N_A1_Release_Notes_FW_v1.08B77_WW.pdf",
"refsource": "CONFIRM",
"url": "http://tsd.dlink.com.tw/temp/PMD/12879/DSR-500_500N_1000_1000N_A1_Release_Notes_FW_v1.08B77_WW.pdf"
},
{
"name" : "http://tsd.dlink.com.tw/temp/PMD/12960/DSR-150N_A2_Release_Notes_FW_v1.05B64_WW.pdf",
"refsource" : "CONFIRM",
"url" : "http://tsd.dlink.com.tw/temp/PMD/12960/DSR-150N_A2_Release_Notes_FW_v1.05B64_WW.pdf"
"name": "DSA-2615",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2615"
},
{
"name": "http://tsd.dlink.com.tw/temp/PMD/12966/DSR-150_A1_A2_Release_Notes_FW_v1.08B44_WW.pdf",
@ -97,35 +92,30 @@
"refsource": "CONFIRM",
"url": "http://tsd.dlink.com.tw/temp/PMD/13039/DSR-250_250N_A1_A2_Release_Notes_FW_v1.08B44_WW_RU.pdf"
},
{
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0037",
"refsource" : "CONFIRM",
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0037"
},
{
"name" : "20130129 Portable SDK for UPnP Devices Contains Buffer Overflow Vulnerabilities",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp"
},
{
"name": "DSA-2614",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2614"
},
{
"name" : "DSA-2615",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2615"
"name": "57602",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57602"
},
{
"name" : "MDVSA-2013:098",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:098"
"name": "https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb",
"refsource": "MISC",
"url": "https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb"
},
{
"name" : "openSUSE-SU-2013:0255",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-02/msg00013.html"
"name": "http://pupnp.sourceforge.net/ChangeLog",
"refsource": "CONFIRM",
"url": "http://pupnp.sourceforge.net/ChangeLog"
},
{
"name": "https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play",
"refsource": "MISC",
"url": "https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play"
},
{
"name": "VU#922681",
@ -133,9 +123,19 @@
"url": "http://www.kb.cert.org/vuls/id/922681"
},
{
"name" : "57602",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/57602"
"name": "https://www.tenable.com/security/research/tra-2017-10",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2017-10"
},
{
"name": "openSUSE-SU-2013:0255",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00013.html"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0037",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0037"
}
]
}

View File

@ -53,16 +53,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11803",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11803"
},
{
"name": "101704",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101704"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11803",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11803"
},
{
"name": "1039797",
"refsource": "SECTRACK",

View File

@ -58,15 +58,15 @@
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11833"
},
{
"name" : "101706",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101706"
},
{
"name": "1039797",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039797"
},
{
"name": "101706",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101706"
}
]
}

View File

@ -59,9 +59,9 @@
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11843"
},
{
"name" : "101740",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101740"
"name": "1039781",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039781"
},
{
"name": "1039780",
@ -69,9 +69,9 @@
"url": "http://www.securitytracker.com/id/1039780"
},
{
"name" : "1039781",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039781"
"name": "101740",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101740"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "DSA-4016",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4016"
},
{
"name": "[debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00022.html"
},
{
"name" : "http://openwall.com/lists/oss-security/2017/10/22/4",
"refsource" : "CONFIRM",
"url" : "http://openwall.com/lists/oss-security/2017/10/22/4"
},
{
"name": "https://irssi.org/security/irssi_sa_2017_10.txt",
"refsource": "CONFIRM",
"url": "https://irssi.org/security/irssi_sa_2017_10.txt"
},
{
"name" : "DSA-4016",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2017/dsa-4016"
"name": "http://openwall.com/lists/oss-security/2017/10/22/4",
"refsource": "CONFIRM",
"url": "http://openwall.com/lists/oss-security/2017/10/22/4"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-15793",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "43095",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/43095/"
},
{
"name": "https://packetstormsecurity.com/files/144082/Job-Board-Software-1.0-SQL-Injection.html",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/144082/Job-Board-Software-1.0-SQL-Injection.html"
},
{
"name": "43095",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43095/"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-3788",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8466",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8466"
},
{
"name": "98844",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "1038671",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038671"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8466",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8466"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8517"
},
{
"name" : "98895",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/98895"
},
{
"name": "1038673",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038673"
},
{
"name": "98895",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98895"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-8767",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/mruby/mruby/commit/778500563a9f7ceba996937dc886bd8cde29b42b",
"refsource" : "MISC",
"url" : "https://github.com/mruby/mruby/commit/778500563a9f7ceba996937dc886bd8cde29b42b"
},
{
"name": "https://github.com/mruby/mruby/issues/4038",
"refsource": "MISC",
"url": "https://github.com/mruby/mruby/issues/4038"
},
{
"name": "https://github.com/mruby/mruby/commit/778500563a9f7ceba996937dc886bd8cde29b42b",
"refsource": "MISC",
"url": "https://github.com/mruby/mruby/commit/778500563a9f7ceba996937dc886bd8cde29b42b"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
},
{
"name": "106162",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106162"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1195/",
"refsource" : "MISC",
"url" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1195/"
},
{
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-18-1195/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-18-1195/"
}
]
}