"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:57:31 +00:00
parent 84d4601748
commit a725bc3074
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
55 changed files with 3653 additions and 3653 deletions

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20020212 RUS-CERT Advisory 2002-02:01: Temporary file handling in GNAT",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=101353440624007&w=2"
},
{ {
"name": "4086", "name": "4086",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/4086" "url": "http://www.securityfocus.com/bid/4086"
},
{
"name": "20020212 RUS-CERT Advisory 2002-02:01: Temporary file handling in GNAT",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=101353440624007&w=2"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20020316 [ARL02-A09] Board-TNK Cross Site Scripting Vulnerability", "name": "boardtnk-web-css(8475)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/262694" "url": "http://www.iss.net/security_center/static/8475.php"
},
{
"name" : "http://translate.google.com/translate?u=http%3A%2F%2Fwww.linux-sottises.net%2Findex.php%3Fnews_init%3D13%23newstag&langpair=fr%7Cen&hl=en&ie=UTF8&oe=UTF8&prev=%2Flanguage_tools",
"refsource" : "CONFIRM",
"url" : "http://translate.google.com/translate?u=http%3A%2F%2Fwww.linux-sottises.net%2Findex.php%3Fnews_init%3D13%23newstag&langpair=fr%7Cen&hl=en&ie=UTF8&oe=UTF8&prev=%2Flanguage_tools"
}, },
{ {
"name": "4305", "name": "4305",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/4305" "url": "http://www.securityfocus.com/bid/4305"
}, },
{ {
"name" : "boardtnk-web-css(8475)", "name": "http://translate.google.com/translate?u=http%3A%2F%2Fwww.linux-sottises.net%2Findex.php%3Fnews_init%3D13%23newstag&langpair=fr%7Cen&hl=en&ie=UTF8&oe=UTF8&prev=%2Flanguage_tools",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "http://www.iss.net/security_center/static/8475.php" "url": "http://translate.google.com/translate?u=http%3A%2F%2Fwww.linux-sottises.net%2Findex.php%3Fnews_init%3D13%23newstag&langpair=fr%7Cen&hl=en&ie=UTF8&oe=UTF8&prev=%2Flanguage_tools"
},
{
"name": "20020316 [ARL02-A09] Board-TNK Cross Site Scripting Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/262694"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20020322 Re: PHP script: Penguin Traceroute, Remote Command Execution", "name": "4353",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://marc.info/?l=bugtraq&m=101684215209558&w=2" "url": "http://www.securityfocus.com/bid/4353"
}, },
{ {
"name": "penguin-nslookup-command-execution(8601)", "name": "penguin-nslookup-command-execution(8601)",
@ -63,9 +63,9 @@
"url": "http://www.iss.net/security_center/static/8601.php" "url": "http://www.iss.net/security_center/static/8601.php"
}, },
{ {
"name" : "4353", "name": "20020322 Re: PHP script: Penguin Traceroute, Remote Command Execution",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/4353" "url": "http://marc.info/?l=bugtraq&m=101684215209558&w=2"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20021108 Technical information about unpatched MS Java vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=103682630823080&w=2"
},
{ {
"name": "20021108 Technical information about unpatched MS Java vulnerabilities", "name": "20021108 Technical information about unpatched MS Java vulnerabilities",
"refsource": "NTBUGTRAQ", "refsource": "NTBUGTRAQ",
@ -66,6 +61,11 @@
"name": "6139", "name": "6139",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/6139" "url": "http://www.securityfocus.com/bid/6139"
},
{
"name": "20021108 Technical information about unpatched MS Java vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=103682630823080&w=2"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20021014 Symantec Enterprise Firewall Secure Webserver info leak",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-10/0190.html"
},
{
"name" : "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html",
"refsource" : "CONFIRM",
"url" : "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html"
},
{ {
"name": "5959", "name": "5959",
"refsource": "BID", "refsource": "BID",
@ -71,6 +61,16 @@
"name": "simple-webserver-topology-disclosure(10363)", "name": "simple-webserver-topology-disclosure(10363)",
"refsource": "XF", "refsource": "XF",
"url": "http://www.iss.net/security_center/static/10363.php" "url": "http://www.iss.net/security_center/static/10363.php"
},
{
"name": "20021014 Symantec Enterprise Firewall Secure Webserver info leak",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0190.html"
},
{
"name": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html",
"refsource": "CONFIRM",
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html"
} }
] ]
} }

View File

@ -53,29 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20030120 Advisory 01/2003: CVS remote vulnerability", "name": "RHSA-2003:012",
"refsource" : "VULNWATCH", "refsource": "REDHAT",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0028.html" "url": "http://www.redhat.com/support/errata/RHSA-2003-012.html"
},
{
"name" : "http://security.e-matters.de/advisories/012003.html",
"refsource" : "MISC",
"url" : "http://security.e-matters.de/advisories/012003.html"
},
{
"name" : "20030124 Test program for CVS double-free.",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=104342550612736&w=2"
},
{
"name" : "20030202 Exploit for CVS double free() for Linux pserver",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=104428571204468&w=2"
},
{
"name" : "CA-2003-02",
"refsource" : "CERT",
"url" : "http://www.cert.org/advisories/CA-2003-02.html"
}, },
{ {
"name": "http://ccvs.cvshome.org/servlets/NewsItemView?newsID=51&JServSessionIdservlets=5of2iuhr14", "name": "http://ccvs.cvshome.org/servlets/NewsItemView?newsID=51&JServSessionIdservlets=5of2iuhr14",
@ -83,14 +63,9 @@
"url": "http://ccvs.cvshome.org/servlets/NewsItemView?newsID=51&JServSessionIdservlets=5of2iuhr14" "url": "http://ccvs.cvshome.org/servlets/NewsItemView?newsID=51&JServSessionIdservlets=5of2iuhr14"
}, },
{ {
"name" : "DSA-233", "name": "20030124 Test program for CVS double-free.",
"refsource" : "DEBIAN", "refsource": "BUGTRAQ",
"url" : "http://www.debian.org/security/2003/dsa-233" "url": "http://marc.info/?l=bugtraq&m=104342550612736&w=2"
},
{
"name" : "FreeBSD-SA-03:01",
"refsource" : "FREEBSD",
"url" : "http://marc.info/?l=bugtraq&m=104438807203491&w=2"
}, },
{ {
"name": "MDKSA-2003:009", "name": "MDKSA-2003:009",
@ -98,29 +73,9 @@
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:009" "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:009"
}, },
{ {
"name" : "RHSA-2003:012", "name": "FreeBSD-SA-03:01",
"refsource" : "REDHAT", "refsource": "FREEBSD",
"url" : "http://www.redhat.com/support/errata/RHSA-2003-012.html" "url": "http://marc.info/?l=bugtraq&m=104438807203491&w=2"
},
{
"name" : "RHSA-2003:013",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2003-013.html"
},
{
"name" : "20030122 [security@slackware.com: [slackware-security] New CVS packages available]",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=104333092200589&w=2"
},
{
"name" : "N-032",
"refsource" : "CIAC",
"url" : "http://www.ciac.org/ciac/bulletins/n-032.shtml"
},
{
"name" : "VU#650937",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/650937"
}, },
{ {
"name": "6650", "name": "6650",
@ -131,6 +86,51 @@
"name": "cvs-doublefree-memory-corruption(11108)", "name": "cvs-doublefree-memory-corruption(11108)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11108" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11108"
},
{
"name": "20030122 [security@slackware.com: [slackware-security] New CVS packages available]",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=104333092200589&w=2"
},
{
"name": "RHSA-2003:013",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2003-013.html"
},
{
"name": "20030202 Exploit for CVS double free() for Linux pserver",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=104428571204468&w=2"
},
{
"name": "DSA-233",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2003/dsa-233"
},
{
"name": "VU#650937",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/650937"
},
{
"name": "http://security.e-matters.de/advisories/012003.html",
"refsource": "MISC",
"url": "http://security.e-matters.de/advisories/012003.html"
},
{
"name": "CA-2003-02",
"refsource": "CERT",
"url": "http://www.cert.org/advisories/CA-2003-02.html"
},
{
"name": "N-032",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/n-032.shtml"
},
{
"name": "20030120 Advisory 01/2003: CVS remote vulnerability",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0028.html"
} }
] ]
} }

View File

@ -52,60 +52,60 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20030910 Buffer overflow in MySQL",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/337012"
},
{
"name" : "20030910 Buffer overflow in MySQL",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html"
},
{
"name" : "20030913 exploit for mysql -- [get_salt_from_password] problem",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=106364207129993&w=2"
},
{
"name" : "DSA-381",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2003/dsa-381"
},
{
"name" : "MDKSA-2003:094",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094"
},
{ {
"name": "CLA-2003:743", "name": "CLA-2003:743",
"refsource": "CONECTIVA", "refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000743" "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000743"
}, },
{
"name" : "RHSA-2003:281",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2003-281.html"
},
{ {
"name": "RHSA-2003:282", "name": "RHSA-2003:282",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2003-282.html" "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html"
}, },
{ {
"name" : "2003-0034", "name": "MDKSA-2003:094",
"refsource" : "TRUSTIX", "refsource": "MANDRAKE",
"url" : "http://marc.info/?l=bugtraq&m=106381424420775&w=2" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094"
},
{
"name": "20030913 exploit for mysql -- [get_salt_from_password] problem",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=106364207129993&w=2"
},
{
"name": "20030910 Buffer overflow in MySQL",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html"
},
{
"name": "DSA-381",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2003/dsa-381"
}, },
{ {
"name": "VU#516492", "name": "VU#516492",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/516492" "url": "http://www.kb.cert.org/vuls/id/516492"
}, },
{
"name": "RHSA-2003:281",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2003-281.html"
},
{
"name": "20030910 Buffer overflow in MySQL",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/337012"
},
{ {
"name": "9709", "name": "9709",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/9709" "url": "http://secunia.com/advisories/9709"
},
{
"name": "2003-0034",
"refsource": "TRUSTIX",
"url": "http://marc.info/?l=bugtraq&m=106381424420775&w=2"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2012-0188", "ID": "CVE-2012-0188",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21577956",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21577956"
},
{
"name" : "78329",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/78329"
},
{ {
"name": "47565", "name": "47565",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -71,6 +61,16 @@
"name": "spss-mraboutb-activex-code-execution(72118)", "name": "spss-mraboutb-activex-code-execution(72118)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72118" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72118"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21577956",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21577956"
},
{
"name": "78329",
"refsource": "OSVDB",
"url": "http://osvdb.org/78329"
} }
] ]
} }

View File

@ -57,6 +57,21 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-09.html" "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-09.html"
}, },
{
"name": "oval:org.mitre.oval:def:14670",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14670"
},
{
"name": "78741",
"refsource": "OSVDB",
"url": "http://osvdb.org/78741"
},
{
"name": "mozilla-keyhtml-info-disclosure(72869)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72869"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=716868", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=716868",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,21 +86,6 @@
"name": "openSUSE-SU-2012:0234", "name": "openSUSE-SU-2012:0234",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00011.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00011.html"
},
{
"name" : "78741",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/78741"
},
{
"name" : "oval:org.mitre.oval:def:14670",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14670"
},
{
"name" : "mozilla-keyhtml-info-disclosure(72869)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72869"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0871", "ID": "CVE-2012-0871",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "SUSE-SA:2012:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00030.html"
},
{ {
"name": "http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c", "name": "http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c" "url": "http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c"
}, },
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=747154",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=747154"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=795853", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=795853",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795853" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=795853"
}, },
{ {
"name" : "SUSE-SA:2012:001", "name": "https://bugzilla.novell.com/show_bug.cgi?id=747154",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00030.html" "url": "https://bugzilla.novell.com/show_bug.cgi?id=747154"
}, },
{ {
"name": "79768", "name": "79768",

View File

@ -62,11 +62,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.elefantcms.com/forum/discussion/39/elefant-1.0.2-and-1.1.5-security-updates-released" "url": "http://www.elefantcms.com/forum/discussion/39/elefant-1.0.2-and-1.1.5-security-updates-released"
}, },
{
"name" : "http://www.elefantcms.com/wiki/Changelog",
"refsource" : "CONFIRM",
"url" : "http://www.elefantcms.com/wiki/Changelog"
},
{ {
"name": "52143", "name": "52143",
"refsource": "BID", "refsource": "BID",
@ -77,6 +72,11 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48118" "url": "http://secunia.com/advisories/48118"
}, },
{
"name": "http://www.elefantcms.com/wiki/Changelog",
"refsource": "CONFIRM",
"url": "http://www.elefantcms.com/wiki/Changelog"
},
{ {
"name": "elefantcms-preview-xss(73421)", "name": "elefantcms-preview-xss(73421)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "79457",
"refsource": "OSVDB",
"url": "http://osvdb.org/79457"
},
{
"name": "socialcms-search-xss(73442)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73442"
},
{ {
"name": "http://packetstormsecurity.org/files/110043/SocialCMS-Cross-Site-Scripting-SQL-Injection.html", "name": "http://packetstormsecurity.org/files/110043/SocialCMS-Cross-Site-Scripting-SQL-Injection.html",
"refsource": "MISC", "refsource": "MISC",
@ -62,20 +72,10 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/52109" "url": "http://www.securityfocus.com/bid/52109"
}, },
{
"name" : "79457",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/79457"
},
{ {
"name": "48082", "name": "48082",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48082" "url": "http://secunia.com/advisories/48082"
},
{
"name" : "socialcms-search-xss(73442)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73442"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2012-1889", "ID": "CVE-2012-1889",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "TA12-192A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html"
},
{ {
"name": "http://technet.microsoft.com/security/advisory/2719615", "name": "http://technet.microsoft.com/security/advisory/2719615",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://technet.microsoft.com/security/advisory/2719615" "url": "http://technet.microsoft.com/security/advisory/2719615"
}, },
{
"name": "oval:org.mitre.oval:def:15195",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15195"
},
{ {
"name": "MS12-043", "name": "MS12-043",
"refsource": "MS", "refsource": "MS",
@ -66,16 +76,6 @@
"name": "TA12-174A", "name": "TA12-174A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA12-174A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA12-174A.html"
},
{
"name" : "TA12-192A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA12-192A.html"
},
{
"name" : "oval:org.mitre.oval:def:15195",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15195"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3504", "ID": "CVE-2012-3504",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,16 +57,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/10/02/3" "url": "http://www.openwall.com/lists/oss-security/2012/10/02/3"
}, },
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=849256",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=849256"
},
{ {
"name": "55756", "name": "55756",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/55756" "url": "http://www.securityfocus.com/bid/55756"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=849256",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=849256"
},
{ {
"name": "cryptoutils-genkey-symlink(79016)", "name": "cryptoutils-genkey-symlink(79016)",
"refsource": "XF", "refsource": "XF",

View File

@ -58,9 +58,9 @@
"url": "http://secpod.org/advisories/SecPod_LogAnalyzer_XSS_Vuln.txt" "url": "http://secpod.org/advisories/SecPod_LogAnalyzer_XSS_Vuln.txt"
}, },
{ {
"name" : "http://secpod.org/blog/?p=504", "name": "http://loganalyzer.adiscon.com/security-advisories/loganalyzer-cross-site-scripting-vulnerability-in-highlight-parameter",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "http://secpod.org/blog/?p=504" "url": "http://loganalyzer.adiscon.com/security-advisories/loganalyzer-cross-site-scripting-vulnerability-in-highlight-parameter"
}, },
{ {
"name": "http://loganalyzer.adiscon.com/downloads/loganalyzer-3-4-4-v3-stable", "name": "http://loganalyzer.adiscon.com/downloads/loganalyzer-3-4-4-v3-stable",
@ -73,9 +73,9 @@
"url": "http://loganalyzer.adiscon.com/downloads/loganalyzer-v3-5-5-v3-beta" "url": "http://loganalyzer.adiscon.com/downloads/loganalyzer-v3-5-5-v3-beta"
}, },
{ {
"name" : "http://loganalyzer.adiscon.com/security-advisories/loganalyzer-cross-site-scripting-vulnerability-in-highlight-parameter", "name": "http://secpod.org/blog/?p=504",
"refsource" : "CONFIRM", "refsource": "MISC",
"url" : "http://loganalyzer.adiscon.com/security-advisories/loganalyzer-cross-site-scripting-vulnerability-in-highlight-parameter" "url": "http://secpod.org/blog/?p=504"
} }
] ]
} }

View File

@ -52,101 +52,101 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2012/mfsa2012-86.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2012/mfsa2012-86.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=787722",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=787722"
},
{
"name" : "DSA-2569",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2569"
},
{
"name" : "DSA-2565",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2565"
},
{
"name" : "DSA-2572",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2572"
},
{
"name" : "MDVSA-2012:163",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:163"
},
{
"name" : "RHSA-2012:1351",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1351.html"
},
{
"name" : "SUSE-SU-2012:1351",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html"
},
{
"name" : "USN-1611-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1611-1"
},
{
"name" : "86096",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/86096"
},
{
"name" : "oval:org.mitre.oval:def:16964",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16964"
},
{
"name" : "50856",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50856"
},
{
"name" : "50892",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50892"
},
{ {
"name": "50904", "name": "50904",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50904" "url": "http://secunia.com/advisories/50904"
}, },
{
"name" : "50935",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50935"
},
{
"name" : "50936",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50936"
},
{ {
"name": "50984", "name": "50984",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50984" "url": "http://secunia.com/advisories/50984"
}, },
{
"name": "50935",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50935"
},
{
"name": "50856",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50856"
},
{
"name": "DSA-2565",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2565"
},
{
"name": "50892",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50892"
},
{
"name": "DSA-2572",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2572"
},
{
"name": "RHSA-2012:1351",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1351.html"
},
{
"name": "50936",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50936"
},
{
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-86.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-86.html"
},
{ {
"name": "51181", "name": "51181",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51181" "url": "http://secunia.com/advisories/51181"
}, },
{
"name": "86096",
"refsource": "OSVDB",
"url": "http://osvdb.org/86096"
},
{ {
"name": "55318", "name": "55318",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55318" "url": "http://secunia.com/advisories/55318"
}, },
{
"name": "SUSE-SU-2012:1351",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html"
},
{
"name": "MDVSA-2012:163",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:163"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=787722",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=787722"
},
{
"name": "oval:org.mitre.oval:def:16964",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16964"
},
{
"name": "USN-1611-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1611-1"
},
{
"name": "DSA-2569",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2569"
},
{ {
"name": "firefox-convolve3x3-bo(79165)", "name": "firefox-convolve3x3-bo(79165)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,86 +52,46 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2012/mfsa2012-105.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2012/mfsa2012-105.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=786142",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=786142"
},
{
"name" : "openSUSE-SU-2012:1583",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html"
},
{
"name" : "openSUSE-SU-2012:1585",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html"
},
{
"name" : "openSUSE-SU-2012:1586",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html"
},
{
"name" : "SUSE-SU-2012:1592",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html"
},
{
"name" : "openSUSE-SU-2013:0175",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html"
},
{
"name" : "USN-1638-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1638-1"
},
{ {
"name": "USN-1638-3", "name": "USN-1638-3",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1638-3" "url": "http://www.ubuntu.com/usn/USN-1638-3"
}, },
{
"name": "51370",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51370"
},
{ {
"name": "USN-1638-2", "name": "USN-1638-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1638-2" "url": "http://www.ubuntu.com/usn/USN-1638-2"
}, },
{
"name": "openSUSE-SU-2012:1586",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html"
},
{ {
"name": "USN-1636-1", "name": "USN-1636-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1636-1" "url": "http://www.ubuntu.com/usn/USN-1636-1"
}, },
{ {
"name" : "56630", "name": "openSUSE-SU-2013:0175",
"refsource" : "BID", "refsource": "SUSE",
"url" : "http://www.securityfocus.com/bid/56630" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html"
},
{
"name" : "oval:org.mitre.oval:def:15993",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15993"
},
{
"name" : "51369",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51369"
},
{
"name" : "51381",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51381"
}, },
{ {
"name": "51434", "name": "51434",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51434" "url": "http://secunia.com/advisories/51434"
}, },
{
"name": "openSUSE-SU-2012:1583",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html"
},
{ {
"name": "51439", "name": "51439",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -143,9 +103,49 @@
"url": "http://secunia.com/advisories/51440" "url": "http://secunia.com/advisories/51440"
}, },
{ {
"name" : "51370", "name": "USN-1638-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1638-1"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=786142",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=786142"
},
{
"name": "oval:org.mitre.oval:def:15993",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15993"
},
{
"name": "SUSE-SU-2012:1592",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html"
},
{
"name": "openSUSE-SU-2012:1585",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html"
},
{
"name": "51381",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/51370" "url": "http://secunia.com/advisories/51381"
},
{
"name": "51369",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51369"
},
{
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-105.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-105.html"
},
{
"name": "56630",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56630"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4548", "ID": "CVE-2012-4548",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,41 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=870713",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=870713"
},
{
"name": "51167",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51167"
},
{
"name": "56315",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56315"
},
{
"name": "http://git.zx2c4.com/cgit/commit/?id=7ea35f9f8ecf61ab42be9947aae1176ab6e089bd",
"refsource": "CONFIRM",
"url": "http://git.zx2c4.com/cgit/commit/?id=7ea35f9f8ecf61ab42be9947aae1176ab6e089bd"
},
{
"name": "openSUSE-SU-2012:1461",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00004.html"
},
{
"name": "50734",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50734"
},
{
"name": "openSUSE-SU-2012:1421",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00021.html"
},
{ {
"name": "[oss-security] 20121027 CVE Request: cgit command injection", "name": "[oss-security] 20121027 CVE Request: cgit command injection",
"refsource": "MLIST", "refsource": "MLIST",
@ -63,49 +98,9 @@
"url": "http://www.openwall.com/lists/oss-security/2012/10/28/2" "url": "http://www.openwall.com/lists/oss-security/2012/10/28/2"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=870713", "name": "cgit-syntaxhighlighting-command-exec(79665)",
"refsource" : "MISC", "refsource": "XF",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=870713" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79665"
},
{
"name" : "http://git.zx2c4.com/cgit/commit/?id=7ea35f9f8ecf61ab42be9947aae1176ab6e089bd",
"refsource" : "CONFIRM",
"url" : "http://git.zx2c4.com/cgit/commit/?id=7ea35f9f8ecf61ab42be9947aae1176ab6e089bd"
},
{
"name" : "openSUSE-SU-2012:1421",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00021.html"
},
{
"name" : "openSUSE-SU-2012:1422",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00022.html"
},
{
"name" : "openSUSE-SU-2012:1460",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00003.html"
},
{
"name" : "openSUSE-SU-2012:1461",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00004.html"
},
{
"name" : "56315",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/56315"
},
{
"name" : "50734",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50734"
},
{
"name" : "51167",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51167"
}, },
{ {
"name": "51222", "name": "51222",
@ -113,9 +108,14 @@
"url": "http://secunia.com/advisories/51222" "url": "http://secunia.com/advisories/51222"
}, },
{ {
"name" : "cgit-syntaxhighlighting-command-exec(79665)", "name": "openSUSE-SU-2012:1460",
"refsource" : "XF", "refsource": "SUSE",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/79665" "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00003.html"
},
{
"name": "openSUSE-SU-2012:1422",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00022.html"
} }
] ]
} }

View File

@ -62,15 +62,15 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/53027" "url": "http://www.securityfocus.com/bid/53027"
}, },
{
"name" : "48833",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48833"
},
{ {
"name": "packetfence-unspecified-xss(74887)", "name": "packetfence-unspecified-xss(74887)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74887" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74887"
},
{
"name": "48833",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48833"
} }
] ]
} }

View File

@ -62,19 +62,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", "name": "RHSA-2017:1221",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" "url": "https://access.redhat.com/errata/RHSA-2017:1221"
},
{
"name" : "https://source.android.com/security/bulletin/2017-07-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-07-01"
},
{
"name" : "DSA-3858",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3858"
}, },
{ {
"name": "GLSA-201705-03", "name": "GLSA-201705-03",
@ -82,44 +72,9 @@
"url": "https://security.gentoo.org/glsa/201705-03" "url": "https://security.gentoo.org/glsa/201705-03"
}, },
{ {
"name" : "GLSA-201707-01", "name": "97745",
"refsource" : "GENTOO", "refsource": "BID",
"url" : "https://security.gentoo.org/glsa/201707-01" "url": "http://www.securityfocus.com/bid/97745"
},
{
"name" : "RHSA-2017:3453",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:3453"
},
{
"name" : "RHSA-2017:1108",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1108"
},
{
"name" : "RHSA-2017:1109",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1109"
},
{
"name" : "RHSA-2017:1117",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1117"
},
{
"name" : "RHSA-2017:1118",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1118"
},
{
"name" : "RHSA-2017:1119",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1119"
},
{
"name" : "RHSA-2017:1204",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1204"
}, },
{ {
"name": "RHSA-2017:1220", "name": "RHSA-2017:1220",
@ -127,9 +82,54 @@
"url": "https://access.redhat.com/errata/RHSA-2017:1220" "url": "https://access.redhat.com/errata/RHSA-2017:1220"
}, },
{ {
"name" : "RHSA-2017:1221", "name": "RHSA-2017:1117",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1221" "url": "https://access.redhat.com/errata/RHSA-2017:1117"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
},
{
"name": "RHSA-2017:1109",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1109"
},
{
"name": "https://source.android.com/security/bulletin/2017-07-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-07-01"
},
{
"name": "1038286",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038286"
},
{
"name": "DSA-3858",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3858"
},
{
"name": "RHSA-2017:1108",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1108"
},
{
"name": "RHSA-2017:1204",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1204"
},
{
"name": "RHSA-2017:1118",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1118"
},
{
"name": "GLSA-201707-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201707-01"
}, },
{ {
"name": "RHSA-2017:1222", "name": "RHSA-2017:1222",
@ -137,14 +137,14 @@
"url": "https://access.redhat.com/errata/RHSA-2017:1222" "url": "https://access.redhat.com/errata/RHSA-2017:1222"
}, },
{ {
"name" : "97745", "name": "RHSA-2017:3453",
"refsource" : "BID", "refsource": "REDHAT",
"url" : "http://www.securityfocus.com/bid/97745" "url": "https://access.redhat.com/errata/RHSA-2017:3453"
}, },
{ {
"name" : "1038286", "name": "RHSA-2017:1119",
"refsource" : "SECTRACK", "refsource": "REDHAT",
"url" : "http://www.securitytracker.com/id/1038286" "url": "https://access.redhat.com/errata/RHSA-2017:1119"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170510-cwms", "name": "1038459",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170510-cwms" "url": "http://www.securitytracker.com/id/1038459"
}, },
{ {
"name": "98387", "name": "98387",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/98387" "url": "http://www.securityfocus.com/bid/98387"
}, },
{ {
"name" : "1038459", "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170510-cwms",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1038459" "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170510-cwms"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "http://marc.info/?t=149037004200005&r=1&w=2" "url": "http://marc.info/?t=149037004200005&r=1&w=2"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1435719", "name": "97096",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1435719" "url": "http://www.securityfocus.com/bid/97096"
}, },
{ {
"name": "https://lists.freedesktop.org/archives/dri-devel/2017-March/136814.html", "name": "https://lists.freedesktop.org/archives/dri-devel/2017-March/136814.html",
@ -68,9 +68,9 @@
"url": "https://lists.freedesktop.org/archives/dri-devel/2017-March/136814.html" "url": "https://lists.freedesktop.org/archives/dri-devel/2017-March/136814.html"
}, },
{ {
"name" : "97096", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1435719",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/97096" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1435719"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "sfowler@redhat.com", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-7465", "ID": "CVE-2017-7465",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "97480",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97480"
},
{ {
"name": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170407-0_MyBB_SSRF_vulnerability_v10.txt", "name": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170407-0_MyBB_SSRF_vulnerability_v10.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170407-0_MyBB_SSRF_vulnerability_v10.txt" "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170407-0_MyBB_SSRF_vulnerability_v10.txt"
}, },
{
"name" : "https://blog.mybb.com/2017/04/04/mybb-1-8-11-merge-system-1-8-11-release/",
"refsource" : "CONFIRM",
"url" : "https://blog.mybb.com/2017/04/04/mybb-1-8-11-merge-system-1-8-11-release/"
},
{ {
"name": "https://github.com/mybb/mybb/commit/f5de8fc2aad11e0d2583f585535ccfa2b46325db#diff-7fe6e55397c77ab9a0f5d57bc4cbe5b9R6781", "name": "https://github.com/mybb/mybb/commit/f5de8fc2aad11e0d2583f585535ccfa2b46325db#diff-7fe6e55397c77ab9a0f5d57bc4cbe5b9R6781",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/mybb/mybb/commit/f5de8fc2aad11e0d2583f585535ccfa2b46325db#diff-7fe6e55397c77ab9a0f5d57bc4cbe5b9R6781" "url": "https://github.com/mybb/mybb/commit/f5de8fc2aad11e0d2583f585535ccfa2b46325db#diff-7fe6e55397c77ab9a0f5d57bc4cbe5b9R6781"
}, },
{ {
"name" : "97480", "name": "https://blog.mybb.com/2017/04/04/mybb-1-8-11-merge-system-1-8-11-release/",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/97480" "url": "https://blog.mybb.com/2017/04/04/mybb-1-8-11-merge-system-1-8-11-release/"
} }
] ]
} }

View File

@ -53,16 +53,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1350460",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1350460"
},
{ {
"name": "https://www.mozilla.org/security/advisories/mfsa2017-18/", "name": "https://www.mozilla.org/security/advisories/mfsa2017-18/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-18/" "url": "https://www.mozilla.org/security/advisories/mfsa2017-18/"
}, },
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1350460",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1350460"
},
{ {
"name": "1039124", "name": "1039124",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "44608",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/44608/"
},
{ {
"name": "http://packetstormsecurity.com/files/147575/MyBB-Latest-Posts-On-Profile-1.1-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/147575/MyBB-Latest-Posts-On-Profile-1.1-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/147575/MyBB-Latest-Posts-On-Profile-1.1-Cross-Site-Scripting.html" "url": "http://packetstormsecurity.com/files/147575/MyBB-Latest-Posts-On-Profile-1.1-Cross-Site-Scripting.html"
},
{
"name": "44608",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44608/"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "104149",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104149"
},
{
"name": "GLSA-201810-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201810-06"
},
{ {
"name": "[debian-lts-announce] 20180525 [SECURITY] [DLA 1383-1] xen security update", "name": "[debian-lts-announce] 20180525 [SECURITY] [DLA 1383-1] xen security update",
"refsource": "MLIST", "refsource": "MLIST",
@ -67,25 +77,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://openwall.com/lists/oss-security/2018/05/08/3" "url": "http://openwall.com/lists/oss-security/2018/05/08/3"
}, },
{
"name" : "https://xenbits.xen.org/xsa/advisory-262.html",
"refsource" : "CONFIRM",
"url" : "https://xenbits.xen.org/xsa/advisory-262.html"
},
{ {
"name": "DSA-4201", "name": "DSA-4201",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4201" "url": "https://www.debian.org/security/2018/dsa-4201"
}, },
{ {
"name" : "GLSA-201810-06", "name": "https://xenbits.xen.org/xsa/advisory-262.html",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201810-06" "url": "https://xenbits.xen.org/xsa/advisory-262.html"
},
{
"name" : "104149",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104149"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://zerodayinitiative.com/advisories/ZDI-18-763",
"refsource" : "MISC",
"url" : "https://zerodayinitiative.com/advisories/ZDI-18-763"
},
{ {
"name": "https://www.foxitsoftware.com/support/security-bulletins.php", "name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php" "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://zerodayinitiative.com/advisories/ZDI-18-763",
"refsource": "MISC",
"url": "https://zerodayinitiative.com/advisories/ZDI-18-763"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "45156",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45156/"
},
{ {
"name": "http://packetstormsecurity.com/files/148836/Monstra-Dev-3.0.4-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/148836/Monstra-Dev-3.0.4-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
@ -66,6 +61,11 @@
"name": "https://indiancybersecuritysolutions.com/cve-2018-14922-cross-site-scripting/", "name": "https://indiancybersecuritysolutions.com/cve-2018-14922-cross-site-scripting/",
"refsource": "MISC", "refsource": "MISC",
"url": "https://indiancybersecuritysolutions.com/cve-2018-14922-cross-site-scripting/" "url": "https://indiancybersecuritysolutions.com/cve-2018-14922-cross-site-scripting/"
},
{
"name": "45156",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45156/"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://zerodayinitiative.com/advisories/ZDI-18-335",
"refsource" : "MISC",
"url" : "https://zerodayinitiative.com/advisories/ZDI-18-335"
},
{ {
"name": "https://www.foxitsoftware.com/support/security-bulletins.php", "name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php" "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://zerodayinitiative.com/advisories/ZDI-18-335",
"refsource": "MISC",
"url": "https://zerodayinitiative.com/advisories/ZDI-18-335"
} }
] ]
} }