"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:57:31 +00:00
parent 84d4601748
commit a725bc3074
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
55 changed files with 3653 additions and 3653 deletions

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20020212 RUS-CERT Advisory 2002-02:01: Temporary file handling in GNAT",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=101353440624007&w=2"
},
{
"name": "4086",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4086"
},
{
"name": "20020212 RUS-CERT Advisory 2002-02:01: Temporary file handling in GNAT",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=101353440624007&w=2"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20020316 [ARL02-A09] Board-TNK Cross Site Scripting Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/262694"
},
{
"name" : "http://translate.google.com/translate?u=http%3A%2F%2Fwww.linux-sottises.net%2Findex.php%3Fnews_init%3D13%23newstag&langpair=fr%7Cen&hl=en&ie=UTF8&oe=UTF8&prev=%2Flanguage_tools",
"refsource" : "CONFIRM",
"url" : "http://translate.google.com/translate?u=http%3A%2F%2Fwww.linux-sottises.net%2Findex.php%3Fnews_init%3D13%23newstag&langpair=fr%7Cen&hl=en&ie=UTF8&oe=UTF8&prev=%2Flanguage_tools"
"name": "boardtnk-web-css(8475)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8475.php"
},
{
"name": "4305",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/4305"
},
{
"name" : "boardtnk-web-css(8475)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/8475.php"
"name": "http://translate.google.com/translate?u=http%3A%2F%2Fwww.linux-sottises.net%2Findex.php%3Fnews_init%3D13%23newstag&langpair=fr%7Cen&hl=en&ie=UTF8&oe=UTF8&prev=%2Flanguage_tools",
"refsource": "CONFIRM",
"url": "http://translate.google.com/translate?u=http%3A%2F%2Fwww.linux-sottises.net%2Findex.php%3Fnews_init%3D13%23newstag&langpair=fr%7Cen&hl=en&ie=UTF8&oe=UTF8&prev=%2Flanguage_tools"
},
{
"name": "20020316 [ARL02-A09] Board-TNK Cross Site Scripting Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/262694"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20020322 Re: PHP script: Penguin Traceroute, Remote Command Execution",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=101684215209558&w=2"
"name": "4353",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4353"
},
{
"name": "penguin-nslookup-command-execution(8601)",
@ -63,9 +63,9 @@
"url": "http://www.iss.net/security_center/static/8601.php"
},
{
"name" : "4353",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/4353"
"name": "20020322 Re: PHP script: Penguin Traceroute, Remote Command Execution",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=101684215209558&w=2"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20021108 Technical information about unpatched MS Java vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=103682630823080&w=2"
},
{
"name": "20021108 Technical information about unpatched MS Java vulnerabilities",
"refsource": "NTBUGTRAQ",
@ -66,6 +61,11 @@
"name": "6139",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6139"
},
{
"name": "20021108 Technical information about unpatched MS Java vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=103682630823080&w=2"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20021014 Symantec Enterprise Firewall Secure Webserver info leak",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-10/0190.html"
},
{
"name" : "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html",
"refsource" : "CONFIRM",
"url" : "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html"
},
{
"name": "5959",
"refsource": "BID",
@ -71,6 +61,16 @@
"name": "simple-webserver-topology-disclosure(10363)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10363.php"
},
{
"name": "20021014 Symantec Enterprise Firewall Secure Webserver info leak",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0190.html"
},
{
"name": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html",
"refsource": "CONFIRM",
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2002.10.11a.html"
}
]
}

View File

@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20030120 Advisory 01/2003: CVS remote vulnerability",
"refsource" : "VULNWATCH",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0028.html"
},
{
"name" : "http://security.e-matters.de/advisories/012003.html",
"refsource" : "MISC",
"url" : "http://security.e-matters.de/advisories/012003.html"
},
{
"name" : "20030124 Test program for CVS double-free.",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=104342550612736&w=2"
},
{
"name" : "20030202 Exploit for CVS double free() for Linux pserver",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=104428571204468&w=2"
},
{
"name" : "CA-2003-02",
"refsource" : "CERT",
"url" : "http://www.cert.org/advisories/CA-2003-02.html"
"name": "RHSA-2003:012",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2003-012.html"
},
{
"name": "http://ccvs.cvshome.org/servlets/NewsItemView?newsID=51&JServSessionIdservlets=5of2iuhr14",
@ -83,14 +63,9 @@
"url": "http://ccvs.cvshome.org/servlets/NewsItemView?newsID=51&JServSessionIdservlets=5of2iuhr14"
},
{
"name" : "DSA-233",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2003/dsa-233"
},
{
"name" : "FreeBSD-SA-03:01",
"refsource" : "FREEBSD",
"url" : "http://marc.info/?l=bugtraq&m=104438807203491&w=2"
"name": "20030124 Test program for CVS double-free.",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=104342550612736&w=2"
},
{
"name": "MDKSA-2003:009",
@ -98,29 +73,9 @@
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:009"
},
{
"name" : "RHSA-2003:012",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2003-012.html"
},
{
"name" : "RHSA-2003:013",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2003-013.html"
},
{
"name" : "20030122 [security@slackware.com: [slackware-security] New CVS packages available]",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=104333092200589&w=2"
},
{
"name" : "N-032",
"refsource" : "CIAC",
"url" : "http://www.ciac.org/ciac/bulletins/n-032.shtml"
},
{
"name" : "VU#650937",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/650937"
"name": "FreeBSD-SA-03:01",
"refsource": "FREEBSD",
"url": "http://marc.info/?l=bugtraq&m=104438807203491&w=2"
},
{
"name": "6650",
@ -131,6 +86,51 @@
"name": "cvs-doublefree-memory-corruption(11108)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11108"
},
{
"name": "20030122 [security@slackware.com: [slackware-security] New CVS packages available]",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=104333092200589&w=2"
},
{
"name": "RHSA-2003:013",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2003-013.html"
},
{
"name": "20030202 Exploit for CVS double free() for Linux pserver",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=104428571204468&w=2"
},
{
"name": "DSA-233",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2003/dsa-233"
},
{
"name": "VU#650937",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/650937"
},
{
"name": "http://security.e-matters.de/advisories/012003.html",
"refsource": "MISC",
"url": "http://security.e-matters.de/advisories/012003.html"
},
{
"name": "CA-2003-02",
"refsource": "CERT",
"url": "http://www.cert.org/advisories/CA-2003-02.html"
},
{
"name": "N-032",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/n-032.shtml"
},
{
"name": "20030120 Advisory 01/2003: CVS remote vulnerability",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0028.html"
}
]
}

View File

@ -52,60 +52,60 @@
},
"references": {
"reference_data": [
{
"name" : "20030910 Buffer overflow in MySQL",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/337012"
},
{
"name" : "20030910 Buffer overflow in MySQL",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html"
},
{
"name" : "20030913 exploit for mysql -- [get_salt_from_password] problem",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=106364207129993&w=2"
},
{
"name" : "DSA-381",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2003/dsa-381"
},
{
"name" : "MDKSA-2003:094",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094"
},
{
"name": "CLA-2003:743",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000743"
},
{
"name" : "RHSA-2003:281",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2003-281.html"
},
{
"name": "RHSA-2003:282",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2003-282.html"
},
{
"name" : "2003-0034",
"refsource" : "TRUSTIX",
"url" : "http://marc.info/?l=bugtraq&m=106381424420775&w=2"
"name": "MDKSA-2003:094",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094"
},
{
"name": "20030913 exploit for mysql -- [get_salt_from_password] problem",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=106364207129993&w=2"
},
{
"name": "20030910 Buffer overflow in MySQL",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html"
},
{
"name": "DSA-381",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2003/dsa-381"
},
{
"name": "VU#516492",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/516492"
},
{
"name": "RHSA-2003:281",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2003-281.html"
},
{
"name": "20030910 Buffer overflow in MySQL",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/337012"
},
{
"name": "9709",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/9709"
},
{
"name": "2003-0034",
"refsource": "TRUSTIX",
"url": "http://marc.info/?l=bugtraq&m=106381424420775&w=2"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2012-0188",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21577956",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21577956"
},
{
"name" : "78329",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/78329"
},
{
"name": "47565",
"refsource": "SECUNIA",
@ -71,6 +61,16 @@
"name": "spss-mraboutb-activex-code-execution(72118)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72118"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21577956",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21577956"
},
{
"name": "78329",
"refsource": "OSVDB",
"url": "http://osvdb.org/78329"
}
]
}

View File

@ -57,6 +57,21 @@
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-09.html"
},
{
"name": "oval:org.mitre.oval:def:14670",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14670"
},
{
"name": "78741",
"refsource": "OSVDB",
"url": "http://osvdb.org/78741"
},
{
"name": "mozilla-keyhtml-info-disclosure(72869)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72869"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=716868",
"refsource": "CONFIRM",
@ -71,21 +86,6 @@
"name": "openSUSE-SU-2012:0234",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00011.html"
},
{
"name" : "78741",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/78741"
},
{
"name" : "oval:org.mitre.oval:def:14670",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14670"
},
{
"name" : "mozilla-keyhtml-info-disclosure(72869)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72869"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0871",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "SUSE-SA:2012:001",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00030.html"
},
{
"name": "http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c",
"refsource": "CONFIRM",
"url": "http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c"
},
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=747154",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=747154"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=795853",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795853"
},
{
"name" : "SUSE-SA:2012:001",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00030.html"
"name": "https://bugzilla.novell.com/show_bug.cgi?id=747154",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=747154"
},
{
"name": "79768",

View File

@ -62,11 +62,6 @@
"refsource": "CONFIRM",
"url": "http://www.elefantcms.com/forum/discussion/39/elefant-1.0.2-and-1.1.5-security-updates-released"
},
{
"name" : "http://www.elefantcms.com/wiki/Changelog",
"refsource" : "CONFIRM",
"url" : "http://www.elefantcms.com/wiki/Changelog"
},
{
"name": "52143",
"refsource": "BID",
@ -77,6 +72,11 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48118"
},
{
"name": "http://www.elefantcms.com/wiki/Changelog",
"refsource": "CONFIRM",
"url": "http://www.elefantcms.com/wiki/Changelog"
},
{
"name": "elefantcms-preview-xss(73421)",
"refsource": "XF",

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "79457",
"refsource": "OSVDB",
"url": "http://osvdb.org/79457"
},
{
"name": "socialcms-search-xss(73442)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73442"
},
{
"name": "http://packetstormsecurity.org/files/110043/SocialCMS-Cross-Site-Scripting-SQL-Injection.html",
"refsource": "MISC",
@ -62,20 +72,10 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52109"
},
{
"name" : "79457",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/79457"
},
{
"name": "48082",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48082"
},
{
"name" : "socialcms-search-xss(73442)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/73442"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2012-1889",
"STATE": "PUBLIC"
},
@ -52,11 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "TA12-192A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html"
},
{
"name": "http://technet.microsoft.com/security/advisory/2719615",
"refsource": "CONFIRM",
"url": "http://technet.microsoft.com/security/advisory/2719615"
},
{
"name": "oval:org.mitre.oval:def:15195",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15195"
},
{
"name": "MS12-043",
"refsource": "MS",
@ -66,16 +76,6 @@
"name": "TA12-174A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA12-174A.html"
},
{
"name" : "TA12-192A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA12-192A.html"
},
{
"name" : "oval:org.mitre.oval:def:15195",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15195"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3504",
"STATE": "PUBLIC"
},
@ -57,16 +57,16 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/10/02/3"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=849256",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=849256"
},
{
"name": "55756",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/55756"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=849256",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=849256"
},
{
"name": "cryptoutils-genkey-symlink(79016)",
"refsource": "XF",

View File

@ -58,9 +58,9 @@
"url": "http://secpod.org/advisories/SecPod_LogAnalyzer_XSS_Vuln.txt"
},
{
"name" : "http://secpod.org/blog/?p=504",
"refsource" : "MISC",
"url" : "http://secpod.org/blog/?p=504"
"name": "http://loganalyzer.adiscon.com/security-advisories/loganalyzer-cross-site-scripting-vulnerability-in-highlight-parameter",
"refsource": "CONFIRM",
"url": "http://loganalyzer.adiscon.com/security-advisories/loganalyzer-cross-site-scripting-vulnerability-in-highlight-parameter"
},
{
"name": "http://loganalyzer.adiscon.com/downloads/loganalyzer-3-4-4-v3-stable",
@ -73,9 +73,9 @@
"url": "http://loganalyzer.adiscon.com/downloads/loganalyzer-v3-5-5-v3-beta"
},
{
"name" : "http://loganalyzer.adiscon.com/security-advisories/loganalyzer-cross-site-scripting-vulnerability-in-highlight-parameter",
"refsource" : "CONFIRM",
"url" : "http://loganalyzer.adiscon.com/security-advisories/loganalyzer-cross-site-scripting-vulnerability-in-highlight-parameter"
"name": "http://secpod.org/blog/?p=504",
"refsource": "MISC",
"url": "http://secpod.org/blog/?p=504"
}
]
}

View File

@ -52,101 +52,101 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2012/mfsa2012-86.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2012/mfsa2012-86.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=787722",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=787722"
},
{
"name" : "DSA-2569",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2569"
},
{
"name" : "DSA-2565",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2565"
},
{
"name" : "DSA-2572",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2572"
},
{
"name" : "MDVSA-2012:163",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:163"
},
{
"name" : "RHSA-2012:1351",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1351.html"
},
{
"name" : "SUSE-SU-2012:1351",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html"
},
{
"name" : "USN-1611-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1611-1"
},
{
"name" : "86096",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/86096"
},
{
"name" : "oval:org.mitre.oval:def:16964",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16964"
},
{
"name" : "50856",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50856"
},
{
"name" : "50892",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50892"
},
{
"name": "50904",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50904"
},
{
"name" : "50935",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50935"
},
{
"name" : "50936",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50936"
},
{
"name": "50984",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50984"
},
{
"name": "50935",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50935"
},
{
"name": "50856",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50856"
},
{
"name": "DSA-2565",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2565"
},
{
"name": "50892",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50892"
},
{
"name": "DSA-2572",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2572"
},
{
"name": "RHSA-2012:1351",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1351.html"
},
{
"name": "50936",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50936"
},
{
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-86.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-86.html"
},
{
"name": "51181",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51181"
},
{
"name": "86096",
"refsource": "OSVDB",
"url": "http://osvdb.org/86096"
},
{
"name": "55318",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55318"
},
{
"name": "SUSE-SU-2012:1351",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html"
},
{
"name": "MDVSA-2012:163",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:163"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=787722",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=787722"
},
{
"name": "oval:org.mitre.oval:def:16964",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16964"
},
{
"name": "USN-1611-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1611-1"
},
{
"name": "DSA-2569",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2569"
},
{
"name": "firefox-convolve3x3-bo(79165)",
"refsource": "XF",

View File

@ -52,86 +52,46 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2012/mfsa2012-105.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2012/mfsa2012-105.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=786142",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=786142"
},
{
"name" : "openSUSE-SU-2012:1583",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html"
},
{
"name" : "openSUSE-SU-2012:1585",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html"
},
{
"name" : "openSUSE-SU-2012:1586",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html"
},
{
"name" : "SUSE-SU-2012:1592",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html"
},
{
"name" : "openSUSE-SU-2013:0175",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html"
},
{
"name" : "USN-1638-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1638-1"
},
{
"name": "USN-1638-3",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1638-3"
},
{
"name": "51370",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51370"
},
{
"name": "USN-1638-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1638-2"
},
{
"name": "openSUSE-SU-2012:1586",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html"
},
{
"name": "USN-1636-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1636-1"
},
{
"name" : "56630",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/56630"
},
{
"name" : "oval:org.mitre.oval:def:15993",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15993"
},
{
"name" : "51369",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51369"
},
{
"name" : "51381",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51381"
"name": "openSUSE-SU-2013:0175",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html"
},
{
"name": "51434",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51434"
},
{
"name": "openSUSE-SU-2012:1583",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html"
},
{
"name": "51439",
"refsource": "SECUNIA",
@ -143,9 +103,49 @@
"url": "http://secunia.com/advisories/51440"
},
{
"name" : "51370",
"name": "USN-1638-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1638-1"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=786142",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=786142"
},
{
"name": "oval:org.mitre.oval:def:15993",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15993"
},
{
"name": "SUSE-SU-2012:1592",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html"
},
{
"name": "openSUSE-SU-2012:1585",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html"
},
{
"name": "51381",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/51370"
"url": "http://secunia.com/advisories/51381"
},
{
"name": "51369",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51369"
},
{
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-105.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-105.html"
},
{
"name": "56630",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56630"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-4548",
"STATE": "PUBLIC"
},
@ -52,6 +52,41 @@
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=870713",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=870713"
},
{
"name": "51167",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51167"
},
{
"name": "56315",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56315"
},
{
"name": "http://git.zx2c4.com/cgit/commit/?id=7ea35f9f8ecf61ab42be9947aae1176ab6e089bd",
"refsource": "CONFIRM",
"url": "http://git.zx2c4.com/cgit/commit/?id=7ea35f9f8ecf61ab42be9947aae1176ab6e089bd"
},
{
"name": "openSUSE-SU-2012:1461",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00004.html"
},
{
"name": "50734",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50734"
},
{
"name": "openSUSE-SU-2012:1421",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00021.html"
},
{
"name": "[oss-security] 20121027 CVE Request: cgit command injection",
"refsource": "MLIST",
@ -63,49 +98,9 @@
"url": "http://www.openwall.com/lists/oss-security/2012/10/28/2"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=870713",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=870713"
},
{
"name" : "http://git.zx2c4.com/cgit/commit/?id=7ea35f9f8ecf61ab42be9947aae1176ab6e089bd",
"refsource" : "CONFIRM",
"url" : "http://git.zx2c4.com/cgit/commit/?id=7ea35f9f8ecf61ab42be9947aae1176ab6e089bd"
},
{
"name" : "openSUSE-SU-2012:1421",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00021.html"
},
{
"name" : "openSUSE-SU-2012:1422",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00022.html"
},
{
"name" : "openSUSE-SU-2012:1460",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00003.html"
},
{
"name" : "openSUSE-SU-2012:1461",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00004.html"
},
{
"name" : "56315",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/56315"
},
{
"name" : "50734",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50734"
},
{
"name" : "51167",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51167"
"name": "cgit-syntaxhighlighting-command-exec(79665)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79665"
},
{
"name": "51222",
@ -113,9 +108,14 @@
"url": "http://secunia.com/advisories/51222"
},
{
"name" : "cgit-syntaxhighlighting-command-exec(79665)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/79665"
"name": "openSUSE-SU-2012:1460",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00003.html"
},
{
"name": "openSUSE-SU-2012:1422",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00022.html"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53027"
},
{
"name" : "48833",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48833"
},
{
"name": "packetfence-unspecified-xss(74887)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74887"
},
{
"name": "48833",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48833"
}
]
}

View File

@ -62,19 +62,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
},
{
"name" : "https://source.android.com/security/bulletin/2017-07-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-07-01"
},
{
"name" : "DSA-3858",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3858"
"name": "RHSA-2017:1221",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1221"
},
{
"name": "GLSA-201705-03",
@ -82,44 +72,9 @@
"url": "https://security.gentoo.org/glsa/201705-03"
},
{
"name" : "GLSA-201707-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201707-01"
},
{
"name" : "RHSA-2017:3453",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:3453"
},
{
"name" : "RHSA-2017:1108",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1108"
},
{
"name" : "RHSA-2017:1109",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1109"
},
{
"name" : "RHSA-2017:1117",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1117"
},
{
"name" : "RHSA-2017:1118",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1118"
},
{
"name" : "RHSA-2017:1119",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1119"
},
{
"name" : "RHSA-2017:1204",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1204"
"name": "97745",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97745"
},
{
"name": "RHSA-2017:1220",
@ -127,9 +82,54 @@
"url": "https://access.redhat.com/errata/RHSA-2017:1220"
},
{
"name" : "RHSA-2017:1221",
"name": "RHSA-2017:1117",
"refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1221"
"url": "https://access.redhat.com/errata/RHSA-2017:1117"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
},
{
"name": "RHSA-2017:1109",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1109"
},
{
"name": "https://source.android.com/security/bulletin/2017-07-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-07-01"
},
{
"name": "1038286",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038286"
},
{
"name": "DSA-3858",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3858"
},
{
"name": "RHSA-2017:1108",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1108"
},
{
"name": "RHSA-2017:1204",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1204"
},
{
"name": "RHSA-2017:1118",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1118"
},
{
"name": "GLSA-201707-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201707-01"
},
{
"name": "RHSA-2017:1222",
@ -137,14 +137,14 @@
"url": "https://access.redhat.com/errata/RHSA-2017:1222"
},
{
"name" : "97745",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/97745"
"name": "RHSA-2017:3453",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3453"
},
{
"name" : "1038286",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038286"
"name": "RHSA-2017:1119",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1119"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170510-cwms",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170510-cwms"
"name": "1038459",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038459"
},
{
"name": "98387",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/98387"
},
{
"name" : "1038459",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038459"
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170510-cwms",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170510-cwms"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "http://marc.info/?t=149037004200005&r=1&w=2"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1435719",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1435719"
"name": "97096",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97096"
},
{
"name": "https://lists.freedesktop.org/archives/dri-devel/2017-March/136814.html",
@ -68,9 +68,9 @@
"url": "https://lists.freedesktop.org/archives/dri-devel/2017-March/136814.html"
},
{
"name" : "97096",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/97096"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1435719",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1435719"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "sfowler@redhat.com",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-7465",
"STATE": "PUBLIC"
},

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "97480",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97480"
},
{
"name": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170407-0_MyBB_SSRF_vulnerability_v10.txt",
"refsource": "MISC",
"url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170407-0_MyBB_SSRF_vulnerability_v10.txt"
},
{
"name" : "https://blog.mybb.com/2017/04/04/mybb-1-8-11-merge-system-1-8-11-release/",
"refsource" : "CONFIRM",
"url" : "https://blog.mybb.com/2017/04/04/mybb-1-8-11-merge-system-1-8-11-release/"
},
{
"name": "https://github.com/mybb/mybb/commit/f5de8fc2aad11e0d2583f585535ccfa2b46325db#diff-7fe6e55397c77ab9a0f5d57bc4cbe5b9R6781",
"refsource": "CONFIRM",
"url": "https://github.com/mybb/mybb/commit/f5de8fc2aad11e0d2583f585535ccfa2b46325db#diff-7fe6e55397c77ab9a0f5d57bc4cbe5b9R6781"
},
{
"name" : "97480",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/97480"
"name": "https://blog.mybb.com/2017/04/04/mybb-1-8-11-merge-system-1-8-11-release/",
"refsource": "CONFIRM",
"url": "https://blog.mybb.com/2017/04/04/mybb-1-8-11-merge-system-1-8-11-release/"
}
]
}

View File

@ -53,16 +53,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1350460",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1350460"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-18/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-18/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1350460",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1350460"
},
{
"name": "1039124",
"refsource": "SECTRACK",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "44608",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/44608/"
},
{
"name": "http://packetstormsecurity.com/files/147575/MyBB-Latest-Posts-On-Profile-1.1-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/147575/MyBB-Latest-Posts-On-Profile-1.1-Cross-Site-Scripting.html"
},
{
"name": "44608",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44608/"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "104149",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104149"
},
{
"name": "GLSA-201810-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"name": "[debian-lts-announce] 20180525 [SECURITY] [DLA 1383-1] xen security update",
"refsource": "MLIST",
@ -67,25 +77,15 @@
"refsource": "CONFIRM",
"url": "http://openwall.com/lists/oss-security/2018/05/08/3"
},
{
"name" : "https://xenbits.xen.org/xsa/advisory-262.html",
"refsource" : "CONFIRM",
"url" : "https://xenbits.xen.org/xsa/advisory-262.html"
},
{
"name": "DSA-4201",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4201"
},
{
"name" : "GLSA-201810-06",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201810-06"
},
{
"name" : "104149",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104149"
"name": "https://xenbits.xen.org/xsa/advisory-262.html",
"refsource": "CONFIRM",
"url": "https://xenbits.xen.org/xsa/advisory-262.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://zerodayinitiative.com/advisories/ZDI-18-763",
"refsource" : "MISC",
"url" : "https://zerodayinitiative.com/advisories/ZDI-18-763"
},
{
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://zerodayinitiative.com/advisories/ZDI-18-763",
"refsource": "MISC",
"url": "https://zerodayinitiative.com/advisories/ZDI-18-763"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "45156",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45156/"
},
{
"name": "http://packetstormsecurity.com/files/148836/Monstra-Dev-3.0.4-Cross-Site-Scripting.html",
"refsource": "MISC",
@ -66,6 +61,11 @@
"name": "https://indiancybersecuritysolutions.com/cve-2018-14922-cross-site-scripting/",
"refsource": "MISC",
"url": "https://indiancybersecuritysolutions.com/cve-2018-14922-cross-site-scripting/"
},
{
"name": "45156",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45156/"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://zerodayinitiative.com/advisories/ZDI-18-335",
"refsource" : "MISC",
"url" : "https://zerodayinitiative.com/advisories/ZDI-18-335"
},
{
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://zerodayinitiative.com/advisories/ZDI-18-335",
"refsource": "MISC",
"url": "https://zerodayinitiative.com/advisories/ZDI-18-335"
}
]
}