"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 21:43:29 +00:00
parent 118a9bbe54
commit b35c538208
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
46 changed files with 2934 additions and 2934 deletions

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20001201 Fixed local AIX V43 vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=97569466809056&w=2"
},
{
"name" : "IY08812",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/search.wss?rs=0&q=IY08812&apar=only"
"name": "2032",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2032"
},
{
"name": "IY10721",
@ -68,19 +63,24 @@
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY10721&apar=only"
},
{
"name" : "2032",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2032"
"name": "IY08812",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY08812&apar=only"
},
{
"name" : "aix-setsenv-bo(5621)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5621"
"name": "20001201 Fixed local AIX V43 vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=97569466809056&w=2"
},
{
"name": "1676",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1676"
},
{
"name": "aix-setsenv-bo(5621)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5621"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@debian.org",
"ID": "CVE-2005-2761",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://savannah.gnu.org/bugs/?func=detailitem&item_id=13863",
"refsource" : "MISC",
"url" : "http://savannah.gnu.org/bugs/?func=detailitem&item_id=13863"
},
{
"name" : "DSA-798",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-798"
"name": "16558",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16558"
},
{
"name": "1014832",
@ -68,9 +63,14 @@
"url": "http://securitytracker.com/id?1014832"
},
{
"name" : "16558",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/16558"
"name": "DSA-798",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-798"
},
{
"name": "http://savannah.gnu.org/bugs/?func=detailitem&item_id=13863",
"refsource": "MISC",
"url": "http://savannah.gnu.org/bugs/?func=detailitem&item_id=13863"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "20051102 Buffer-overflow and crash in FlatFrag 0.3",
"refsource" : "FULLDISC",
"url" : "http://marc.info/?l=full-disclosure&m=113096078606274&w=2"
},
{
"name" : "20051102 Buffer-overflow and crash in FlatFrag 0.3",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/415636/30/0/threaded"
},
{
"name": "http://aluigi.altervista.org/adv/flatfragz-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/flatfragz-adv.txt"
},
{
"name" : "15287",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15287"
},
{
"name": "ADV-2005-2285",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2285"
},
{
"name": "15287",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15287"
},
{
"name": "20770",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/20770"
},
{
"name": "20051102 Buffer-overflow and crash in FlatFrag 0.3",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/415636/30/0/threaded"
},
{
"name": "20051102 Buffer-overflow and crash in FlatFrag 0.3",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=113096078606274&w=2"
}
]
}

View File

@ -52,11 +52,111 @@
},
"references": {
"reference_data": [
{
"name": "19167",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19167"
},
{
"name": "USN-242-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-242-1"
},
{
"name": "18503",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18503"
},
{
"name": "ADV-2005-2404",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2404"
},
{
"name": "20060401-01-U",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U"
},
{
"name": "2006-0012",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2006/0012/"
},
{
"name": "RHSA-2006:0204",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0204.html"
},
{
"name": "oval:org.mitre.oval:def:10038",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10038"
},
{
"name": "20819",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/20819"
},
{
"name": "mailman-utf8-scrubber-dos(23139)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23139"
},
{
"name": "18456",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18456"
},
{
"name": "1015735",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015735"
},
{
"name": "SUSE-SR:2006:001",
"refsource": "SUSE",
"url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0003.html"
},
{
"name": "17874",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17874"
},
{
"name": "19532",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19532"
},
{
"name": "MDKSA-2005:222",
"refsource": "MANDRIVA",
"url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222"
},
{
"name": "15408",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15408"
},
{
"name": "18612",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18612"
},
{
"name": "17511",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17511"
},
{
"name": "[Mailman-Users] 20050912 Uncaught runner exception: 'utf8' codeccan'tdecode bytes in position 1-4: invalid data",
"refsource": "MLIST",
"url": "http://mail.python.org/pipermail/mailman-users/2005-September/046523.html"
},
{
"name": "19196",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19196"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327732",
"refsource": "CONFIRM",
@ -66,106 +166,6 @@
"name": "DSA-955",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-955"
},
{
"name" : "MDKSA-2005:222",
"refsource" : "MANDRIVA",
"url" : "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222"
},
{
"name" : "RHSA-2006:0204",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0204.html"
},
{
"name" : "20060401-01-U",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U"
},
{
"name" : "SUSE-SR:2006:001",
"refsource" : "SUSE",
"url" : "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0003.html"
},
{
"name" : "2006-0012",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2006/0012/"
},
{
"name" : "USN-242-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-242-1"
},
{
"name" : "15408",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15408"
},
{
"name" : "oval:org.mitre.oval:def:10038",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10038"
},
{
"name" : "ADV-2005-2404",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2404"
},
{
"name" : "20819",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/20819"
},
{
"name" : "1015735",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015735"
},
{
"name" : "17511",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17511"
},
{
"name" : "17874",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17874"
},
{
"name" : "18503",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18503"
},
{
"name" : "18612",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18612"
},
{
"name" : "19167",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19167"
},
{
"name" : "19196",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19196"
},
{
"name" : "18456",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18456"
},
{
"name" : "19532",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19532"
},
{
"name" : "mailman-utf8-scrubber-dos(23139)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23139"
}
]
}

View File

@ -52,55 +52,55 @@
},
"references": {
"reference_data": [
{
"name" : "20070924 Google Urchin password theft madness",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/480469/100/0/threaded"
},
{
"name" : "20071010 Vulnerabilities digest",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
},
{
"name" : "http://ha.ckers.org/blog/20070823/xss-and-possible-information-disclosure-in-urchin/",
"refsource" : "MISC",
"url" : "http://ha.ckers.org/blog/20070823/xss-and-possible-information-disclosure-in-urchin/"
},
{
"name" : "http://hackademix.net/2007/09/24/googhole-xss-pwning-gmail-picasa-and-almost-200k-customers/",
"refsource" : "MISC",
"url" : "http://hackademix.net/2007/09/24/googhole-xss-pwning-gmail-picasa-and-almost-200k-customers/"
},
{
"name" : "http://websecurity.com.ua/1283/",
"refsource" : "MISC",
"url" : "http://websecurity.com.ua/1283/"
},
{
"name" : "http://www.gnucitizen.org/blog/google-urchin-password-theft-madness",
"refsource" : "MISC",
"url" : "http://www.gnucitizen.org/blog/google-urchin-password-theft-madness"
},
{
"name": "http://securityvulns.ru/Sdocument90.html",
"refsource": "MISC",
"url": "http://securityvulns.ru/Sdocument90.html"
},
{
"name" : "25788",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/25788"
},
{
"name": "38578",
"refsource": "OSVDB",
"url": "http://osvdb.org/38578"
},
{
"name": "http://ha.ckers.org/blog/20070823/xss-and-possible-information-disclosure-in-urchin/",
"refsource": "MISC",
"url": "http://ha.ckers.org/blog/20070823/xss-and-possible-information-disclosure-in-urchin/"
},
{
"name": "20070924 Google Urchin password theft madness",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/480469/100/0/threaded"
},
{
"name": "http://www.gnucitizen.org/blog/google-urchin-password-theft-madness",
"refsource": "MISC",
"url": "http://www.gnucitizen.org/blog/google-urchin-password-theft-madness"
},
{
"name": "http://websecurity.com.ua/1283/",
"refsource": "MISC",
"url": "http://websecurity.com.ua/1283/"
},
{
"name": "20071010 Vulnerabilities digest",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
},
{
"name": "3177",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3177"
},
{
"name": "http://hackademix.net/2007/09/24/googhole-xss-pwning-gmail-picasa-and-almost-200k-customers/",
"refsource": "MISC",
"url": "http://hackademix.net/2007/09/24/googhole-xss-pwning-gmail-picasa-and-almost-200k-customers/"
},
{
"name": "25788",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25788"
}
]
}

View File

@ -52,30 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "20070925 JSPWiki Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/480570/100/0/threaded"
},
{
"name" : "20070924 JSPWiki Multiple Input Validation Vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/066096.html"
},
{
"name" : "http://www.ecyrd.com/~jalkanen/JSPWiki/2.4.104/ChangeLog",
"refsource" : "CONFIRM",
"url" : "http://www.ecyrd.com/~jalkanen/JSPWiki/2.4.104/ChangeLog"
},
{
"name": "25803",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25803"
},
{
"name" : "26961",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/26961"
"name": "20070925 JSPWiki Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/480570/100/0/threaded"
},
{
"name": "http://www.ecyrd.com/~jalkanen/JSPWiki/2.4.104/ChangeLog",
"refsource": "CONFIRM",
"url": "http://www.ecyrd.com/~jalkanen/JSPWiki/2.4.104/ChangeLog"
},
{
"name": "3167",
@ -86,6 +76,16 @@
"name": "jspwiki-multiple-xss(36766)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36766"
},
{
"name": "20070924 JSPWiki Multiple Input Validation Vulnerabilities",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/066096.html"
},
{
"name": "26961",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26961"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20090615 [waraxe-2009-SA#074] - Multiple Vulnerabilities in TorrentTrader Classic 1.09",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/504294/100/0/threaded"
},
{
"name" : "8958",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/8958"
},
{
"name" : "http://www.waraxe.us/advisory-74.html",
"refsource" : "MISC",
"url" : "http://www.waraxe.us/advisory-74.html"
},
{
"name" : "35369",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35369"
"name": "torrenttrader-multiplescripts-xss(51145)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51145"
},
{
"name": "35456",
@ -78,14 +63,29 @@
"url": "http://secunia.com/advisories/35456"
},
{
"name" : "torrenttrader-multiplescripts-xss(51145)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51145"
"name": "35369",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35369"
},
{
"name": "8958",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/8958"
},
{
"name": "20090615 [waraxe-2009-SA#074] - Multiple Vulnerabilities in TorrentTrader Classic 1.09",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/504294/100/0/threaded"
},
{
"name": "torrenttrader-viewrequests-xss(51144)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51144"
},
{
"name": "http://www.waraxe.us/advisory-74.html",
"refsource": "MISC",
"url": "http://www.waraxe.us/advisory-74.html"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/504574/100/0/threaded"
},
{
"name" : "http://websec.id3as.com/aardvark-topsites-php-521-security-vulnerabilities-disclosure/",
"refsource" : "MISC",
"url" : "http://websec.id3as.com/aardvark-topsites-php-521-security-vulnerabilities-disclosure/"
},
{
"name": "aardvarktopsitesphp-index-info-disclosure(51392)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51392"
},
{
"name": "http://websec.id3as.com/aardvark-topsites-php-521-security-vulnerabilities-disclosure/",
"refsource": "MISC",
"url": "http://websec.id3as.com/aardvark-topsites-php-521-security-vulnerabilities-disclosure/"
}
]
}

View File

@ -58,39 +58,39 @@
"url": "http://www.openwall.com/lists/oss-security/2009/07/21/1"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=278492",
"refsource" : "CONFIRM",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=278492"
},
{
"name" : "http://wordpress.org/development/2009/07/wordpress-2-8-2/",
"refsource" : "CONFIRM",
"url" : "http://wordpress.org/development/2009/07/wordpress-2-8-2/"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=512900",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=512900"
"name": "FEDORA-2009-8114",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01253.html"
},
{
"name": "DSA-1871",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1871"
},
{
"name": "http://wordpress.org/development/2009/07/wordpress-2-8-2/",
"refsource": "CONFIRM",
"url": "http://wordpress.org/development/2009/07/wordpress-2-8-2/"
},
{
"name": "FEDORA-2009-8109",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01241.html"
},
{
"name" : "FEDORA-2009-8114",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01253.html"
},
{
"name": "1022589",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1022589"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=278492",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=278492"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=512900",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512900"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2009-3685",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "ftp://download2.boulder.ibm.com/ecc/sar/CMA/XSA/00pj6/0/ibm_fw_amm_bbet50g_anyos_noarch.chg",
"refsource" : "CONFIRM",
"url" : "ftp://download2.boulder.ibm.com/ecc/sar/CMA/XSA/00pj6/0/ibm_fw_amm_bbet50g_anyos_noarch.chg"
},
{
"name": "36970",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "ADV-2009-3188",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3188"
},
{
"name": "ftp://download2.boulder.ibm.com/ecc/sar/CMA/XSA/00pj6/0/ibm_fw_amm_bbet50g_anyos_noarch.chg",
"refsource": "CONFIRM",
"url": "ftp://download2.boulder.ibm.com/ecc/sar/CMA/XSA/00pj6/0/ibm_fw_amm_bbet50g_anyos_noarch.chg"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-0008",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.jasadvisors.com/additonal-jasbug-security-exploit-info/",
"refsource" : "MISC",
"url" : "https://www.jasadvisors.com/additonal-jasbug-security-exploit-info/"
},
{
"name" : "http://blogs.technet.com/b/srd/archive/2015/02/10/ms15-011-amp-ms15-014-hardening-group-policy.aspx",
"refsource" : "CONFIRM",
"url" : "http://blogs.technet.com/b/srd/archive/2015/02/10/ms15-011-amp-ms15-014-hardening-group-policy.aspx"
},
{
"name": "MS15-011",
"refsource": "MS",
@ -73,9 +63,14 @@
"url": "http://www.kb.cert.org/vuls/id/787252"
},
{
"name" : "72477",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/72477"
"name": "ms-grouppolicy-cve20150008-code-exec(100426)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100426"
},
{
"name": "http://blogs.technet.com/b/srd/archive/2015/02/10/ms15-011-amp-ms15-014-hardening-group-policy.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/b/srd/archive/2015/02/10/ms15-011-amp-ms15-014-hardening-group-policy.aspx"
},
{
"name": "1031719",
@ -83,9 +78,14 @@
"url": "http://www.securitytracker.com/id/1031719"
},
{
"name" : "ms-grouppolicy-cve20150008-code-exec(100426)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/100426"
"name": "72477",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72477"
},
{
"name": "https://www.jasadvisors.com/additonal-jasbug-security-exploit-info/",
"refsource": "MISC",
"url": "https://www.jasadvisors.com/additonal-jasbug-security-exploit-info/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-0873",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2015-0980",
"STATE": "PUBLIC"
},

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "20150824 Dell SonicWall NetExtender Unquoted Autorun Privilege Escalation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/536303/100/0/threaded"
},
{
"name": "http://packetstormsecurity.com/files/133302/Dell-SonicWall-NetExtender-7.5.215-Privilege-Escalation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/133302/Dell-SonicWall-NetExtender-7.5.215-Privilege-Escalation.html"
},
{
"name" : "https://support.software.dell.com/product-notification/157537",
"refsource" : "CONFIRM",
"url" : "https://support.software.dell.com/product-notification/157537"
"name": "20150824 Dell SonicWall NetExtender Unquoted Autorun Privilege Escalation",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/536303/100/0/threaded"
},
{
"name": "1033417",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033417"
},
{
"name": "https://support.software.dell.com/product-notification/157537",
"refsource": "CONFIRM",
"url": "https://support.software.dell.com/product-notification/157537"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-4851",
"STATE": "PUBLIC"
},
@ -53,20 +53,20 @@
"references": {
"reference_data": [
{
"name" : "20151029 [ERPSCAN-15-030] Oracle E-Business Suite - XXE injection Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/536790/100/0/threaded"
},
{
"name" : "20151030 [ERPSCAN-15-030] Oracle E-Business Suite - XXE injection Vulnerability",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Oct/113"
"name": "1033877",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033877"
},
{
"name": "https://erpscan.io/advisories/erpscan-15-030-oracle-e-business-suite-xxe/",
"refsource": "MISC",
"url": "https://erpscan.io/advisories/erpscan-15-030-oracle-e-business-suite-xxe/"
},
{
"name": "20151030 [ERPSCAN-15-030] Oracle E-Business Suite - XXE injection Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Oct/113"
},
{
"name": "http://packetstormsecurity.com/files/134119/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html",
"refsource": "MISC",
@ -83,9 +83,9 @@
"url": "http://www.securityfocus.com/bid/77244"
},
{
"name" : "1033877",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033877"
"name": "20151029 [ERPSCAN-15-030] Oracle E-Business Suite - XXE injection Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/536790/100/0/threaded"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-4880",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-4900",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
},
{
"name": "1033883",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033883"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-8132",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "DSA-3528",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3528"
},
{
"name": "SUSE-SU-2016:0912",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00095.html"
},
{
"name": "[OTR-users] 20160309 New releases of libotr (4.1.1) and pidgin-otr (4.0.2) available",
"refsource": "MLIST",
"url": "https://lists.cypherpunks.ca/pipermail/otr-users/2016-March/002582.html"
},
{
"name" : "[oss-security] 20160309 Heap use after free in Pidgin-OTR plugin",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/03/09/8"
},
{
"name" : "[oss-security] 20160309 Re: Heap use after free in Pidgin-OTR plugin",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/03/09/13"
},
{
"name" : "https://blog.fuzzing-project.org/39-Heap-use-after-free-in-Pidgin-OTR-plugin-CVE-2015-8833.html",
"refsource" : "MISC",
"url" : "https://blog.fuzzing-project.org/39-Heap-use-after-free-in-Pidgin-OTR-plugin-CVE-2015-8833.html"
"name": "https://bugs.otr.im/projects/pidgin-otr/repository/revisions/aaf551b9dd5cbba8c4abaa3d4dc7ead860efef94",
"refsource": "CONFIRM",
"url": "https://bugs.otr.im/projects/pidgin-otr/repository/revisions/aaf551b9dd5cbba8c4abaa3d4dc7ead860efef94"
},
{
"name": "https://bugs.otr.im/issues/128",
@ -83,34 +83,34 @@
"url": "https://bugs.otr.im/issues/88"
},
{
"name" : "https://bugs.otr.im/projects/pidgin-otr/repository/revisions/aaf551b9dd5cbba8c4abaa3d4dc7ead860efef94",
"refsource" : "CONFIRM",
"url" : "https://bugs.otr.im/projects/pidgin-otr/repository/revisions/aaf551b9dd5cbba8c4abaa3d4dc7ead860efef94"
},
{
"name" : "DSA-3528",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3528"
"name": "https://blog.fuzzing-project.org/39-Heap-use-after-free-in-Pidgin-OTR-plugin-CVE-2015-8833.html",
"refsource": "MISC",
"url": "https://blog.fuzzing-project.org/39-Heap-use-after-free-in-Pidgin-OTR-plugin-CVE-2015-8833.html"
},
{
"name": "GLSA-201701-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-10"
},
{
"name" : "SUSE-SU-2016:0912",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00095.html"
},
{
"name": "openSUSE-SU-2016:0878",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00109.html"
},
{
"name": "[oss-security] 20160309 Re: Heap use after free in Pidgin-OTR plugin",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/03/09/13"
},
{
"name": "84295",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/84295"
},
{
"name": "[oss-security] 20160309 Heap use after free in Pidgin-OTR plugin",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/03/09/8"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160420 various vulnerabilities in Node.js packages",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/04/20/11"
"name": "96410",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96410"
},
{
"name": "https://nodesecurity.io/advisories/39",
@ -63,9 +63,9 @@
"url": "https://nodesecurity.io/advisories/39"
},
{
"name" : "96410",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96410"
"name": "[oss-security] 20160420 various vulnerabilities in Node.js packages",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/20/11"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-5699",
"STATE": "PUBLIC"
},
@ -53,14 +53,39 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20160614 CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/14/7"
"name": "http://www.splunk.com/view/SP-CAAAPUE",
"refsource": "CONFIRM",
"url": "http://www.splunk.com/view/SP-CAAAPUE"
},
{
"name" : "[oss-security] 20160615 Re: CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/15/12"
"name": "https://hg.python.org/cpython/rev/1c45047c5102",
"refsource": "CONFIRM",
"url": "https://hg.python.org/cpython/rev/1c45047c5102"
},
{
"name": "RHSA-2016:1630",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1630.html"
},
{
"name": "RHSA-2016:1627",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1627.html"
},
{
"name": "https://hg.python.org/cpython/rev/bf3e1c9b80e9",
"refsource": "CONFIRM",
"url": "https://hg.python.org/cpython/rev/bf3e1c9b80e9"
},
{
"name": "RHSA-2016:1629",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1629.html"
},
{
"name": "http://www.splunk.com/view/SP-CAAAPSV",
"refsource": "CONFIRM",
"url": "http://www.splunk.com/view/SP-CAAAPSV"
},
{
"name": "[oss-security] 20160616 Re: CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client",
@ -73,14 +98,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html"
},
{
"name" : "http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html",
"refsource" : "MISC",
"url" : "http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html"
},
{
"name" : "https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4",
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url" : "https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4"
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name": "https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS",
@ -88,39 +108,29 @@
"url": "https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS"
},
{
"name" : "https://hg.python.org/cpython/rev/1c45047c5102",
"name": "https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4",
"refsource": "CONFIRM",
"url" : "https://hg.python.org/cpython/rev/1c45047c5102"
"url": "https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4"
},
{
"name" : "https://hg.python.org/cpython/rev/bf3e1c9b80e9",
"refsource" : "CONFIRM",
"url" : "https://hg.python.org/cpython/rev/bf3e1c9b80e9"
"name": "[oss-security] 20160615 Re: CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/15/12"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
"name": "http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html",
"refsource": "MISC",
"url": "http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html"
},
{
"name" : "http://www.splunk.com/view/SP-CAAAPSV",
"refsource" : "CONFIRM",
"url" : "http://www.splunk.com/view/SP-CAAAPSV"
"name": "[oss-security] 20160614 CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/06/14/7"
},
{
"name" : "http://www.splunk.com/view/SP-CAAAPUE",
"refsource" : "CONFIRM",
"url" : "http://www.splunk.com/view/SP-CAAAPUE"
},
{
"name" : "RHSA-2016:1626",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1626.html"
},
{
"name" : "RHSA-2016:1627",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1627.html"
"name": "91226",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91226"
},
{
"name": "RHSA-2016:1628",
@ -128,19 +138,9 @@
"url": "http://rhn.redhat.com/errata/RHSA-2016-1628.html"
},
{
"name" : "RHSA-2016:1629",
"name": "RHSA-2016:1626",
"refsource": "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1629.html"
},
{
"name" : "RHSA-2016:1630",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1630.html"
},
{
"name" : "91226",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/91226"
"url": "http://rhn.redhat.com/errata/RHSA-2016-1626.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-07-20T20:44:32.985224",
"DATE_REQUESTED": "2018-07-17T04:00:28",
"ID": "CVE-2018-1999018",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "Pydio",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "8.2.1 and prior"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Pydio"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "Unvalidated user input leading to Remote Code Execution (RCE)"
"value": "n/a"
}
]
}

View File

@ -58,15 +58,15 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name" : "102594",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102594"
},
{
"name": "1040215",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040215"
},
{
"name": "102594",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102594"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.dessci.com/en/dl/",
"refsource" : "MISC",
"url" : "http://www.dessci.com/en/dl/"
},
{
"name": "https://drive.google.com/open?id=175_n6KhbOUlu9l0ySw-8QYk0oQbAaoZV",
"refsource": "MISC",
"url": "https://drive.google.com/open?id=175_n6KhbOUlu9l0ySw-8QYk0oQbAaoZV"
},
{
"name": "http://www.dessci.com/en/dl/",
"refsource": "MISC",
"url": "http://www.dessci.com/en/dl/"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03906en_us",
"refsource" : "MISC",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03906en_us"
},
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03906en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03906en_us"
"name": "1042182",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1042182"
},
{
"name": "106211",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/106211"
},
{
"name" : "1042182",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1042182"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03906en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03906en_us"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03906en_us",
"refsource": "MISC",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03906en_us"
}
]
}

View File

@ -68,15 +68,15 @@
},
"references": {
"reference_data": [
{
"name" : "20190206 Cisco Meeting Server Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-cms-dos"
},
{
"name": "106943",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106943"
},
{
"name": "20190206 Cisco Meeting Server Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-cms-dos"
}
]
},