mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
bf69a7dd1f
commit
aa2d54b905
@ -57,11 +57,6 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=107833097705486&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.s-quadra.com/advisories/Adv-20040303.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.s-quadra.com/advisories/Adv-20040303.txt"
|
||||
},
|
||||
{
|
||||
"name": "spidersales-userid-sql-injection(15371)",
|
||||
"refsource": "XF",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "9799",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/9799"
|
||||
},
|
||||
{
|
||||
"name": "http://www.s-quadra.com/advisories/Adv-20040303.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.s-quadra.com/advisories/Adv-20040303.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2004/dsa-523"
|
||||
},
|
||||
{
|
||||
"name" : "wwwsql-cgi-command-execution(16455)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/16455"
|
||||
},
|
||||
{
|
||||
"name": "10577",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/10577"
|
||||
},
|
||||
{
|
||||
"name": "wwwsql-cgi-command-execution(16455)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16455"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "13863",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/13863/"
|
||||
},
|
||||
{
|
||||
"name": "DSA-639",
|
||||
"refsource": "DEBIAN",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "midnight-commander-memory-allocation(18904)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18904"
|
||||
},
|
||||
{
|
||||
"name" : "13863",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/13863/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20041126 phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=110149207123510&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20041126 phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029499.html"
|
||||
},
|
||||
{
|
||||
"name": "phpcms-parser-xss(18272)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18272"
|
||||
},
|
||||
{
|
||||
"name": "http://www.phpcms.de/download/index.en.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.phpcms.de/download/index.en.html"
|
||||
},
|
||||
{
|
||||
"name": "20041126 phpCMS <= 1.2.1 Xss Vulnerability, Information disclosure",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=110149207123510&w=2"
|
||||
},
|
||||
{
|
||||
"name": "11765",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11765"
|
||||
},
|
||||
{
|
||||
"name" : "phpcms-parser-xss(18272)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18272"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/11651"
|
||||
},
|
||||
{
|
||||
"name" : "13164",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/13164"
|
||||
},
|
||||
{
|
||||
"name": "webcalendar-img-src-xss(18026)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18026"
|
||||
},
|
||||
{
|
||||
"name": "13164",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/13164"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040406 GNU Sharutils buffer overflow vulnerability.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/359639"
|
||||
"name": "OpenPKG-SA-2004.011",
|
||||
"refsource": "OPENPKG",
|
||||
"url": "http://marc.info/?l=bugtraq&m=108137386310299&w=2"
|
||||
},
|
||||
{
|
||||
"name": "FLSA:2155",
|
||||
@ -63,29 +63,29 @@
|
||||
"url": "https://bugzilla.fedora.us/show_bug.cgi?id=2155"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2005:377",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-377.html"
|
||||
},
|
||||
{
|
||||
"name" : "OpenPKG-SA-2004.011",
|
||||
"refsource" : "OPENPKG",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=108137386310299&w=2"
|
||||
"name": "oval:org.mitre.oval:def:11722",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11722"
|
||||
},
|
||||
{
|
||||
"name": "10066",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/10066"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:11722",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11722"
|
||||
},
|
||||
{
|
||||
"name": "sharutils-shar-bo(15759)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15759"
|
||||
},
|
||||
{
|
||||
"name": "20040406 GNU Sharutils buffer overflow vulnerability.",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/359639"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2005:377",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-377.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040128 SRT2004-01-17-0227 - BlackICE allows local users to become SYSTEM",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=107530966524193&w=2"
|
||||
},
|
||||
{
|
||||
"name": "9513",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/9513"
|
||||
},
|
||||
{
|
||||
"name": "20040128 SRT2004-01-17-0227 - BlackICE allows local users to become SYSTEM",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=107530966524193&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://sourceforge.net/project/shownotes.php?group_id=74605&release_id=603922",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/project/shownotes.php?group_id=74605&release_id=603922"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.limesurvey.org/content/view/102/1/lang,en/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.limesurvey.org/content/view/102/1/lang,en/"
|
||||
},
|
||||
{
|
||||
"name": "29506",
|
||||
"refsource": "BID",
|
||||
@ -76,6 +66,16 @@
|
||||
"name": "limesurvey-modifyquotaaction-csrf(42807)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42807"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?group_id=74605&release_id=603922",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?group_id=74605&release_id=603922"
|
||||
},
|
||||
{
|
||||
"name": "http://www.limesurvey.org/content/view/102/1/lang,en/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.limesurvey.org/content/view/102/1/lang,en/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "5766",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/5766"
|
||||
"name": "realm-kwrd-sql-injection(42952)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42952"
|
||||
},
|
||||
{
|
||||
"name": "http://bugreport.ir/index.php?/40",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://bugreport.ir/index.php?/40"
|
||||
},
|
||||
{
|
||||
"name" : "29616",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29616"
|
||||
"name": "5766",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5766"
|
||||
},
|
||||
{
|
||||
"name": "30583",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://secunia.com/advisories/30583"
|
||||
},
|
||||
{
|
||||
"name" : "realm-kwrd-sql-injection(42952)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42952"
|
||||
"name": "29616",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29616"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=207002",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=207002"
|
||||
"name": "linux-kernel-utrace-dos(43556)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43556"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=449359",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=449359"
|
||||
},
|
||||
{
|
||||
"name" : "linux-kernel-utrace-dos(43556)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43556"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=207002",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=207002"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6221",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6221"
|
||||
},
|
||||
{
|
||||
"name": "30626",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30626"
|
||||
},
|
||||
{
|
||||
"name": "vacationrental-index-sql-injection(44375)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44375"
|
||||
},
|
||||
{
|
||||
"name": "31421",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31421"
|
||||
},
|
||||
{
|
||||
"name" : "vacationrental-index-sql-injection(44375)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44375"
|
||||
"name": "6221",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6221"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080826 ZoneMinder Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/495745/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "30843",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30843"
|
||||
},
|
||||
{
|
||||
"name": "zoneminder-htmlviewevents-command-execution(44728)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44728"
|
||||
},
|
||||
{
|
||||
"name": "31636",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31636"
|
||||
},
|
||||
{
|
||||
"name" : "zoneminder-htmlviewevents-command-execution(44728)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44728"
|
||||
"name": "20080826 ZoneMinder Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/495745/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6313",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6313"
|
||||
},
|
||||
{
|
||||
"name": "4220",
|
||||
"refsource": "SREASON",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "cmme-admin-csrf(44686)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44686"
|
||||
},
|
||||
{
|
||||
"name": "6313",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6313"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7186",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7186"
|
||||
},
|
||||
{
|
||||
"name": "32425",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32425"
|
||||
},
|
||||
{
|
||||
"name" : "32784",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32784"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-3247",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3247"
|
||||
},
|
||||
{
|
||||
"name": "7186",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7186"
|
||||
},
|
||||
{
|
||||
"name": "32784",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32784"
|
||||
},
|
||||
{
|
||||
"name": "vlogsystem-note-sql-injection(46783)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7028",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7028"
|
||||
"name": "entertainmentportal-cookie-security-bypass(46422)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46422"
|
||||
},
|
||||
{
|
||||
"name": "32535",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32535"
|
||||
},
|
||||
{
|
||||
"name": "32174",
|
||||
@ -68,14 +73,9 @@
|
||||
"url": "http://osvdb.org/49749"
|
||||
},
|
||||
{
|
||||
"name" : "32535",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32535"
|
||||
},
|
||||
{
|
||||
"name" : "entertainmentportal-cookie-security-bypass(46422)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46422"
|
||||
"name": "7028",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7028"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/28164.html"
|
||||
},
|
||||
{
|
||||
"name" : "28164",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28164"
|
||||
},
|
||||
{
|
||||
"name": "easyimagecatalogue-multiple-xss(41187)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41187"
|
||||
},
|
||||
{
|
||||
"name": "28164",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28164"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,55 +53,25 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMA02133",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061201",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "TA08-017A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
|
||||
"name": "1019218",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1019218"
|
||||
},
|
||||
{
|
||||
"name": "27229",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27229"
|
||||
},
|
||||
{
|
||||
"name": "TA08-017A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
|
||||
},
|
||||
{
|
||||
"name": "40285",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/40285"
|
||||
},
|
||||
{
|
||||
"name" : "40287",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/40287"
|
||||
},
|
||||
{
|
||||
"name" : "1019218",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1019218"
|
||||
},
|
||||
{
|
||||
"name" : "28518",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28518"
|
||||
},
|
||||
{
|
||||
"name" : "28556",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28556"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0150",
|
||||
"refsource": "VUPEN",
|
||||
@ -111,6 +81,36 @@
|
||||
"name": "ADV-2008-0180",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0180"
|
||||
},
|
||||
{
|
||||
"name": "SSRT061201",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||
},
|
||||
{
|
||||
"name": "40287",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/40287"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMA02133",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||
},
|
||||
{
|
||||
"name": "28556",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28556"
|
||||
},
|
||||
{
|
||||
"name": "28518",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28518"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2013-2697",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://wordpress.org/extend/plugins/wp-downloadmanager/changelog/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://wordpress.org/extend/plugins/wp-downloadmanager/changelog/"
|
||||
},
|
||||
{
|
||||
"name": "52863",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/52863"
|
||||
},
|
||||
{
|
||||
"name": "http://wordpress.org/extend/plugins/wp-downloadmanager/changelog/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wordpress.org/extend/plugins/wp-downloadmanager/changelog/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "http://hg.code.sf.net/p/graphicsmagick/code/rev/b4139088b49a",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://hg.code.sf.net/p/graphicsmagick/code/rev/b4139088b49a"
|
||||
},
|
||||
{
|
||||
"name": "99503",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99503"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4321",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4321"
|
||||
},
|
||||
{
|
||||
"name" : "99503",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/99503"
|
||||
"name": "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20181129 [SECURITY] [DLA 1600-1] libarchive security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html"
|
||||
},
|
||||
{
|
||||
"name": "https://blogs.gentoo.org/ago/2017/09/06/libarchive-heap-based-buffer-overflow-in-xml_data-archive_read_support_format_xar-c/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://blogs.gentoo.org/ago/2017/09/06/libarchive-heap-based-buffer-overflow-in-xml_data-archive_read_support_format_xar-c/"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/libarchive/libarchive/commit/fa7438a0ff4033e4741c807394a9af6207940d71",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/libarchive/libarchive/commit/fa7438a0ff4033e4741c807394a9af6207940d71"
|
||||
"name": "[debian-lts-announce] 20181129 [SECURITY] [DLA 1600-1] libarchive security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4360",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4360"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/libarchive/libarchive/commit/fa7438a0ff4033e4741c807394a9af6207940d71",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/libarchive/libarchive/commit/fa7438a0ff4033e4741c807394a9af6207940d71"
|
||||
},
|
||||
{
|
||||
"name": "USN-3736-1",
|
||||
"refsource": "UBUNTU",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "101050",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101050"
|
||||
},
|
||||
{
|
||||
"name": "https://packetstormsecurity.com/files/144261/WordPress-2kb-Amazon-Affiliates-Store-2.1.0-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "https://wordpress.org/plugins/2kb-amazon-affiliates-store/#developers",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wordpress.org/plugins/2kb-amazon-affiliates-store/#developers"
|
||||
},
|
||||
{
|
||||
"name" : "101050",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/101050"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-15443",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://blogs.gentoo.org/ago/2017/05/07/lrzip-heap-based-buffer-overflow-write-in-read_1g-stream-c/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://blogs.gentoo.org/ago/2017/05/07/lrzip-heap-based-buffer-overflow-write-in-read_1g-stream-c/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/ckolivas/lrzip/issues/70",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/ckolivas/lrzip/issues/70"
|
||||
},
|
||||
{
|
||||
"name": "https://blogs.gentoo.org/ago/2017/05/07/lrzip-heap-based-buffer-overflow-write-in-read_1g-stream-c/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://blogs.gentoo.org/ago/2017/05/07/lrzip-heap-based-buffer-overflow-write-in-read_1g-stream-c/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20170519 CVE-2017-9060 Qemu: virtio-gpu: host memory leakage in Virtio GPU device",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2017/05/19/1"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1452597",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1452597"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.qemu.org/?p=qemu.git;a=commit;h=dd248ed7e204ee8a1873914e02b8b526e8f1b80d",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.qemu.org/?p=qemu.git;a=commit;h=dd248ed7e204ee8a1873914e02b8b526e8f1b80d"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201706-03",
|
||||
"refsource": "GENTOO",
|
||||
@ -76,6 +61,21 @@
|
||||
"name": "98632",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/98632"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20170519 CVE-2017-9060 Qemu: virtio-gpu: host memory leakage in Virtio GPU device",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/05/19/1"
|
||||
},
|
||||
{
|
||||
"name": "http://git.qemu.org/?p=qemu.git;a=commit;h=dd248ed7e204ee8a1873914e02b8b526e8f1b80d",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=dd248ed7e204ee8a1873914e02b8b526e8f1b80d"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1452597",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452597"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-08-02T16:41:53.505150",
|
||||
"DATE_REQUESTED": "2018-07-23T16:30:00",
|
||||
"ID": "CVE-2018-1000215",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "cJSON",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.7.6 and earlier"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Dave Gamble"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-772"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-11-27T13:54:33.461361",
|
||||
"DATE_REQUESTED": "2018-10-28T03:43:03",
|
||||
"ID": "CVE-2018-1000823",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "exist",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "<= 5.0.0-RC4"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "exist"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "XML External Entity (XXE)"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://sysdream.com/news/lab/2018-09-21-cve-2018-13140-antidote-remote-code-execution-against-the-update-component/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://sysdream.com/news/lab/2018-09-21-cve-2018-13140-antidote-remote-code-execution-against-the-update-component/"
|
||||
},
|
||||
{
|
||||
"name": "20180921 [CVE-2018-13140] Antidote Remote Code Execution against the update component",
|
||||
"refsource": "FULLDISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://packetstormsecurity.com/files/149468/Antidote-9.5.1-Code-Execution.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/149468/Antidote-9.5.1-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://sysdream.com/news/lab/2018-09-21-cve-2018-13140-antidote-remote-code-execution-against-the-update-component/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://sysdream.com/news/lab/2018-09-21-cve-2018-13140-antidote-remote-code-execution-against-the-update-component/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20181003 [SECURITY] [DLA 1530-1] imagemagick security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/10/msg00002.html"
|
||||
"name": "https://github.com/ImageMagick/ImageMagick/issues/1199",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/ImageMagick/ImageMagick/issues/1199"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/ImageMagick/ImageMagick/commit/6b6bff054d569a77973f2140c0e86366e6168a6c",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "https://github.com/ImageMagick/ImageMagick/commit/6b6bff054d569a77973f2140c0e86366e6168a6c"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/ImageMagick/ImageMagick/issues/1199",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/ImageMagick/ImageMagick/issues/1199"
|
||||
"name": "[debian-lts-announce] 20181003 [SECURITY] [DLA 1530-1] imagemagick security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-3785-1",
|
||||
|
Loading…
x
Reference in New Issue
Block a user