mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-09 16:04:06 +00:00
- Synchronized data.
This commit is contained in:
parent
2e1a5297c7
commit
b65d938f22
@ -63,9 +63,9 @@
|
||||
"url" : "http://dsecrg.com/pages/vul/show.php?id=336"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/dsecrg-11-036-sap-netwaver-virus-scan-interface-multiple-xss/",
|
||||
"name" : "https://erpscan.io/advisories/dsecrg-11-036-sap-netwaver-virus-scan-interface-multiple-xss/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/dsecrg-11-036-sap-netwaver-virus-scan-interface-multiple-xss/"
|
||||
"url" : "https://erpscan.io/advisories/dsecrg-11-036-sap-netwaver-virus-scan-interface-multiple-xss/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.sdn.sap.com/irj/sdn/index?rid=/webcontent/uuid/c05604f6-4eb3-2d10-eea7-ceb666083a6a",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://dsecrg.com/pages/vul/show.php?id=337"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/dsecrg-11-037-sap-bw-doc-multiple-xss/",
|
||||
"name" : "https://erpscan.io/advisories/dsecrg-11-037-sap-bw-doc-multiple-xss/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/dsecrg-11-037-sap-bw-doc-multiple-xss/"
|
||||
"url" : "https://erpscan.io/advisories/dsecrg-11-037-sap-bw-doc-multiple-xss/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.sdn.sap.com/irj/scn/index?rid=/webcontent/uuid/50316177-762d-2f10-0993-a2206cc349b4",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/dsecrg-13-016-sap-netweaver-abad0_delete_derivation_table/",
|
||||
"name" : "https://erpscan.io/advisories/dsecrg-13-016-sap-netweaver-abad0_delete_derivation_table/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/dsecrg-13-016-sap-netweaver-abad0_delete_derivation_table/"
|
||||
"url" : "https://erpscan.io/advisories/dsecrg-13-016-sap-netweaver-abad0_delete_derivation_table/"
|
||||
},
|
||||
{
|
||||
"name" : "https://service.sap.com/sap/support/notes/1840249",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-13-021-sap-portal-unvalidated-redirect/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-13-021-sap-portal-unvalidated-redirect/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-13-021-sap-portal-unvalidated-redirect/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-13-021-sap-portal-unvalidated-redirect/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-13-020-sap-netweaver-shsti_upload_xml-xxe/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-13-020-sap-netweaver-shsti_upload_xml-xxe/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-13-020-sap-netweaver-shsti_upload_xml-xxe/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-13-020-sap-netweaver-shsti_upload_xml-xxe/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,14 +53,14 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-13-018-sap-netweaver-servlet-javadumpservice-multiple-xss/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-13-018-sap-netweaver-servlet-javadumpservice-multiple-xss/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-13-018-sap-netweaver-servlet-javadumpservice-multiple-xss/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-13-018-sap-netweaver-servlet-javadumpservice-multiple-xss/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-13-019-sap-netweaver-servlet-datacollector-multiple-xss/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-13-019-sap-netweaver-servlet-datacollector-multiple-xss/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-13-019-sap-netweaver-servlet-datacollector-multiple-xss/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-13-019-sap-netweaver-servlet-datacollector-multiple-xss/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/dsecrg-13-013-saprouter-heap-overflow/",
|
||||
"name" : "https://erpscan.io/advisories/dsecrg-13-013-saprouter-heap-overflow/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/dsecrg-13-013-saprouter-heap-overflow/"
|
||||
"url" : "https://erpscan.io/advisories/dsecrg-13-013-saprouter-heap-overflow/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/dsecrg-13-008-sap-netweaver-logviewer-security-check-bypass/",
|
||||
"name" : "https://erpscan.io/advisories/dsecrg-13-008-sap-netweaver-logviewer-security-check-bypass/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/dsecrg-13-008-sap-netweaver-logviewer-security-check-bypass/"
|
||||
"url" : "https://erpscan.io/advisories/dsecrg-13-008-sap-netweaver-logviewer-security-check-bypass/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/dsecrg-13-006-sap-netweaver-performance-provider-xss/",
|
||||
"name" : "https://erpscan.io/advisories/dsecrg-13-006-sap-netweaver-performance-provider-xss/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/dsecrg-13-006-sap-netweaver-performance-provider-xss/"
|
||||
"url" : "https://erpscan.io/advisories/dsecrg-13-006-sap-netweaver-performance-provider-xss/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/dsecrg-13-004-sap-netweaver-di-arbitrary-file-upload/",
|
||||
"name" : "https://erpscan.io/advisories/dsecrg-13-004-sap-netweaver-di-arbitrary-file-upload/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/dsecrg-13-004-sap-netweaver-di-arbitrary-file-upload/"
|
||||
"url" : "https://erpscan.io/advisories/dsecrg-13-004-sap-netweaver-di-arbitrary-file-upload/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/dsecrg-13-003-sap-netweaver-exportability-check-service-unauthorized-directory-traversal/",
|
||||
"name" : "https://erpscan.io/advisories/dsecrg-13-003-sap-netweaver-exportability-check-service-unauthorized-directory-traversal/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/dsecrg-13-003-sap-netweaver-exportability-check-service-unauthorized-directory-traversal/"
|
||||
"url" : "https://erpscan.io/advisories/dsecrg-13-003-sap-netweaver-exportability-check-service-unauthorized-directory-traversal/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/",
|
||||
"name" : "https://erpscan.io/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/"
|
||||
"url" : "https://erpscan.io/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/",
|
||||
"name" : "https://erpscan.io/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/"
|
||||
"url" : "https://erpscan.io/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-13-017-sap-netweaver-srtt_get_count_before_key_rfc-sql-injection/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-13-017-sap-netweaver-srtt_get_count_before_key_rfc-sql-injection/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-13-017-sap-netweaver-srtt_get_count_before_key_rfc-sql-injection/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-13-017-sap-netweaver-srtt_get_count_before_key_rfc-sql-injection/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-13-023-saprouter-authentication-bypass/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-13-023-saprouter-authentication-bypass/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-13-023-saprouter-authentication-bypass/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-13-023-saprouter-authentication-bypass/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-13-022-sap-netweaver-rsddcver_count_tab_cols-potential-sql-injection/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-13-022-sap-netweaver-rsddcver_count_tab_cols-potential-sql-injection/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-13-022-sap-netweaver-rsddcver_count_tab_cols-potential-sql-injection/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-13-022-sap-netweaver-rsddcver_count_tab_cols-potential-sql-injection/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-13-025-sap-crm-crm_flex_data-xxe/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-13-025-sap-crm-crm_flex_data-xxe/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-13-025-sap-crm-crm_flex_data-xxe/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-13-025-sap-crm-crm_flex_data-xxe/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-13-024-sap-emr-unwired-multiple-sql-injections/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-13-024-sap-emr-unwired-multiple-sql-injections/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-13-024-sap-emr-unwired-multiple-sql-injections/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-13-024-sap-emr-unwired-multiple-sql-injections/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-004-sap-netweaver-solution-manager-missing-authorization-check-information-disclosure/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-004-sap-netweaver-solution-manager-missing-authorization-check-information-disclosure/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-004-sap-netweaver-solution-manager-missing-authorization-check-information-disclosure/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-004-sap-netweaver-solution-manager-missing-authorization-check-information-disclosure/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-002-sap-portal-webdynpro-path-disclosure/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-002-sap-portal-webdynpro-path-disclosure/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-002-sap-portal-webdynpro-path-disclosure/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-002-sap-portal-webdynpro-path-disclosure/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-003-sap-crm-gwsync-xxe/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-003-sap-crm-gwsync-xxe/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-003-sap-crm-gwsync-xxe/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-003-sap-crm-gwsync-xxe/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-001-sap-netweaver-message-server-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-001-sap-netweaver-message-server-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-001-sap-netweaver-message-server-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-001-sap-netweaver-message-server-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-005-sap-netweaver-dir-error-xss/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-005-sap-netweaver-dir-error-xss/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-005-sap-netweaver-dir-error-xss/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-005-sap-netweaver-dir-error-xss/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-006-sap-netweaver-pip-xss/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-006-sap-netweaver-pip-xss/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-006-sap-netweaver-pip-xss/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-006-sap-netweaver-pip-xss/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.stechno.net/sap-notes.html?view=sapnote&id=1442517",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-011-sap-netweaver-dispatcher-buffer-overflow-rce-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-011-sap-netweaver-dispatcher-buffer-overflow-rce-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-011-sap-netweaver-dispatcher-buffer-overflow-rce-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-011-sap-netweaver-dispatcher-buffer-overflow-rce-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/docs/DOC-8218",
|
||||
|
@ -53,14 +53,14 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
},
|
||||
{
|
||||
"name" : "https://service.sap.com/sap/support/notes/2067972",
|
||||
|
@ -58,14 +58,14 @@
|
||||
"url" : "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-014-saprouter-integer-overflow-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-014-saprouter-integer-overflow-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-014-saprouter-integer-overflow-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-014-saprouter-integer-overflow-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
},
|
||||
{
|
||||
"name" : "https://service.sap.com/sap/support/notes/2037492",
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url" : "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-015-sap-netweaver-as-java-xxe/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-015-sap-netweaver-as-java-xxe/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-015-sap-netweaver-as-java-xxe/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-015-sap-netweaver-as-java-xxe/"
|
||||
},
|
||||
{
|
||||
"name" : "https://service.sap.com/sap/support/notes/2045176",
|
||||
@ -68,9 +68,9 @@
|
||||
"url" : "https://service.sap.com/sap/support/notes/2045176"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
},
|
||||
{
|
||||
"name" : "71023",
|
||||
|
@ -58,14 +58,14 @@
|
||||
"url" : "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-016-sap-netweaver-httpd-partial-http-post-requests-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-016-sap-netweaver-httpd-partial-http-post-requests-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-016-sap-netweaver-httpd-partial-http-post-requests-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-016-sap-netweaver-httpd-partial-http-post-requests-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
},
|
||||
{
|
||||
"name" : "https://service.sap.com/sap/support/notes/1966655",
|
||||
|
@ -58,34 +58,34 @@
|
||||
"url" : "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-017-sap-netweaver-http-partial-http-post-requests-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-017-sap-netweaver-http-partial-http-post-requests-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-017-sap-netweaver-http-partial-http-post-requests-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-017-sap-netweaver-http-partial-http-post-requests-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-018-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-018-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-018-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-018-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-019-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-019-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-019-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-019-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-020-sap-netweaver-management-console-gsaop-partial-http-requests-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-020-sap-netweaver-management-console-gsaop-partial-http-requests-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-020-sap-netweaver-management-console-gsaop-partial-http-requests-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-020-sap-netweaver-management-console-gsaop-partial-http-requests-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-021-sap-netweaver-management-console-gsaop-partial-http-post-requests-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-021-sap-netweaver-management-console-gsaop-partial-http-post-requests-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-021-sap-netweaver-management-console-gsaop-partial-http-post-requests-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-021-sap-netweaver-management-console-gsaop-partial-http-post-requests-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
},
|
||||
{
|
||||
"name" : "https://service.sap.com/sap/support/notes/1986725",
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url" : "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
},
|
||||
{
|
||||
"name" : "http://service.sap.com/sap/support/notes/0002052082",
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url" : "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/"
|
||||
},
|
||||
{
|
||||
"name" : "https://service.sap.com/sap/support/notes/1906212",
|
||||
|
@ -53,14 +53,14 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-025-sap-kernel-rce-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-025-sap-kernel-rce-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-025-sap-kernel-rce-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-025-sap-kernel-rce-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-december-2014/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-december-2014/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/"
|
||||
},
|
||||
{
|
||||
"name" : "62150",
|
||||
|
@ -53,14 +53,14 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-14-024-sap-kernel-rce-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-14-024-sap-kernel-rce-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-14-024-sap-kernel-rce-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-14-024-sap-kernel-rce-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-december-2014/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-december-2014/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/"
|
||||
},
|
||||
{
|
||||
"name" : "62150",
|
||||
|
@ -53,14 +53,14 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-001-sap-netweaver-ecatt_display_xmlstring_remote-xxe/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-001-sap-netweaver-ecatt_display_xmlstring_remote-xxe/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-001-sap-netweaver-ecatt_display_xmlstring_remote-xxe/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-001-sap-netweaver-ecatt_display_xmlstring_remote-xxe/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/"
|
||||
},
|
||||
{
|
||||
"name" : "62469",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Jun/64"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-006-sap-netweaver-portal-reportxmlviewer-xxe/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-006-sap-netweaver-portal-reportxmlviewer-xxe/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-006-sap-netweaver-portal-reportxmlviewer-xxe/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-006-sap-netweaver-portal-reportxmlviewer-xxe/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/132358/SAP-NetWeaver-Portal-7.31-XXE-Injection.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Jun/62"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-004-sap-netweaver-portal-xmlvalidationcomponent-xxe/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-004-sap-netweaver-portal-xmlvalidationcomponent-xxe/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-004-sap-netweaver-portal-xmlvalidationcomponent-xxe/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-004-sap-netweaver-portal-xmlvalidationcomponent-xxe/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/132356/SAP-NetWeaver-Portal-7.31-XXE-Injection.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Jun/63"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-005-sap-mobile-platform-xxe/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-005-sap-mobile-platform-xxe/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-005-sap-mobile-platform-xxe/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-005-sap-mobile-platform-xxe/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/132357/SAP-Mobile-Platform-2.3-XXE-Injection.html",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-002-sap-mobile-healthcare-emr-v2-unauthorized-access/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-002-sap-mobile-healthcare-emr-v2-unauthorized-access/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-002-sap-mobile-healthcare-emr-v2-unauthorized-access/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-002-sap-mobile-healthcare-emr-v2-unauthorized-access/"
|
||||
},
|
||||
{
|
||||
"name" : "73701",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Jun/61"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-003-sapkernel-c_sapgparam-rce-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-003-sapkernel-c_sapgparam-rce-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-003-sapkernel-c_sapgparam-rce-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-003-sapkernel-c_sapgparam-rce-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/132353/SAP-NetWeaver-Dispatcher-Buffer-Overflow.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Jun/67"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-009-sap-afaria-7-xclistener-missing-authorization-check/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-009-sap-afaria-7-xclistener-missing-authorization-check/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-009-sap-afaria-7-xclistener-missing-authorization-check/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-009-sap-afaria-7-xclistener-missing-authorization-check/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/132363/SAP-Afaria-7-Missing-Authorization-Check.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Jun/65"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-007-sap-management-console-readprofile-parameters-information-disclosure/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-007-sap-management-console-readprofile-parameters-information-disclosure/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-007-sap-management-console-readprofile-parameters-information-disclosure/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-007-sap-management-console-readprofile-parameters-information-disclosure/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/132359/SAP-Management-Console-Information-Disclosure.html",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-011-sap-mobile-platform-xxe",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-011-sap-mobile-platform-xxe",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-011-sap-mobile-platform-xxe"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-011-sap-mobile-platform-xxe"
|
||||
},
|
||||
{
|
||||
"name" : "73896",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Jun/68"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/132364/SYBASE-SQL-Anywhere-12-16-Denial-Of-Service.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Jun/66"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-008-sap-afaria-7-xclistener-buffer-overflow/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-008-sap-afaria-7-xclistener-buffer-overflow/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-008-sap-afaria-7-xclistener-buffer-overflow/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-008-sap-afaria-7-xclistener-buffer-overflow/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/132362/SAP-Afaria-7-Denial-Of-Service.html",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-security-notes-april-2015/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-april-2015/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-security-notes-april-2015/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-april-2015/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.onapsis.com/blog/analyzing-sap-security-notes-april-2015-edition/",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-security-notes-april-2015/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-april-2015/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-security-notes-april-2015/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-april-2015/"
|
||||
},
|
||||
{
|
||||
"name" : "74627",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/May/96"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-013-sap-netweaver-as-java-cim-upload-xxe",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-013-sap-netweaver-as-java-cim-upload-xxe",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-013-sap-netweaver-as-java-cim-upload-xxe"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-013-sap-netweaver-as-java-cim-upload-xxe"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/133122/SAP-NetWeaver-AS-Java-XXE-Injection.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/May/96"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-012-sap-afaria-7-xcomms-bof",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-012-sap-afaria-7-xcomms-bof",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-012-sap-afaria-7-xcomms-bof"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-012-sap-afaria-7-xcomms-bof"
|
||||
},
|
||||
{
|
||||
"name" : "74797",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Oct/97"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-025-oracle-e-business-suite-database-user-enumeration-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-025-oracle-e-business-suite-database-user-enumeration-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-025-oracle-e-business-suite-database-user-enumeration-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-025-oracle-e-business-suite-database-user-enumeration-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/134098/Oracle-E-Business-Suite-12.2.4-Database-User-Enumeration.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Oct/99"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-026-oracle-e-business-suite-sql-injection-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-026-oracle-e-business-suite-sql-injection-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-026-oracle-e-business-suite-sql-injection-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-026-oracle-e-business-suite-sql-injection-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/134099/Oracle-E-Business-Suite-12.1.3-12.1.4-SQL-Injection.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Oct/112"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-029-oracle-e-business-suite-xxe-injection-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-029-oracle-e-business-suite-xxe-injection-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-029-oracle-e-business-suite-xxe-injection-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-029-oracle-e-business-suite-xxe-injection-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/134118/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Oct/113"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-15-030-oracle-e-business-suite-xxe/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-030-oracle-e-business-suite-xxe/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-15-030-oracle-e-business-suite-xxe/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-030-oracle-e-business-suite-xxe/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/134119/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Oct/100"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-027-oracle-e-business-suite-cross-site-scripting-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-027-oracle-e-business-suite-cross-site-scripting-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-027-oracle-e-business-suite-cross-site-scripting-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-027-oracle-e-business-suite-cross-site-scripting-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/134100/Oracle-E-Business-Suite-12.1.4-Cross-Site-Scripting.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Oct/111"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-028-oracle-e-business-suite-xxe-injection-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-028-oracle-e-business-suite-xxe-injection-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-028-oracle-e-business-suite-xxe-injection-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-028-oracle-e-business-suite-xxe-injection-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/134117/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-016-sap-netweaver-hardcoded-credentials/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-016-sap-netweaver-hardcoded-credentials/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-016-sap-netweaver-hardcoded-credentials/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-016-sap-netweaver-hardcoded-credentials/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/community/security/blog/2015/06/11/sap-security-notes-june-2015",
|
||||
@ -63,9 +63,9 @@
|
||||
"url" : "http://scn.sap.com/community/security/blog/2015/06/11/sap-security-notes-june-2015"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-015-sap-netweaver-hardcoded-credentials/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-015-sap-netweaver-hardcoded-credentials/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-015-sap-netweaver-hardcoded-credentials/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-015-sap-netweaver-hardcoded-credentials/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/133515/SAP-NetWeaver-AS-FKCDBFTRACE-ABAP-Hardcoded-Credentials.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://scn.sap.com/community/security/blog/2015/06/11/sap-security-notes-june-2015"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-014-sap-mobile-platform-3-xxe-in-add-repository/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-014-sap-mobile-platform-3-xxe-in-add-repository/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-014-sap-mobile-platform-3-xxe-in-add-repository/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-014-sap-mobile-platform-3-xxe-in-add-repository/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/133514/SAP-Mobile-Platform-3-XXE-Injection.html",
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Cross-site scripting (XSS) vulnerability in Nucleus CMS 3.65 allows remote attackers to inject arbitrary web script or HTML via the title parameter when adding a new item."
|
||||
"value" : "Cross-site scripting (XSS) vulnerability in Nucleus CMS allows remote attackers to inject arbitrary web script or HTML via the title parameter when adding a new item."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -57,6 +57,16 @@
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/132461/Nucleus-CMS-3.65-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/security-provensec/CVE-2015-5454/blob/master/nucleus.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/security-provensec/CVE-2015-5454/blob/master/nucleus.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/NucleusCMS/NucleusCMS/issues/83",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/NucleusCMS/NucleusCMS/issues/83"
|
||||
},
|
||||
{
|
||||
"name" : "75694",
|
||||
"refsource" : "BID",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Nov/92"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-018-sap-netweaver-7-4-xxe/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-018-sap-netweaver-7-4-xxe/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-018-sap-netweaver-7-4-xxe/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-018-sap-netweaver-7-4-xxe/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/134507/SAP-NetWeaver-7.4-XXE-Injection.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Nov/95"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-019-sap-afaria-stored-xss/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-019-sap-afaria-stored-xss/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-019-sap-afaria-stored-xss/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-019-sap-afaria-stored-xss/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/134508/SAP-Afaria-7-Cross-Site-Scripting.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Nov/96"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-020-sap-mobile-platform-2-3-xxe-in-application-import/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-020-sap-mobile-platform-2-3-xxe-in-application-import/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-020-sap-mobile-platform-2-3-xxe-in-application-import/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-020-sap-mobile-platform-2-3-xxe-in-application-import/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/134509/SAP-Mobile-Platform-2.3-XXE-Injection.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2015/Dec/66"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-021-sap-netweaver-7-4-bp_find_jobs_with_program-sql-injection/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-021-sap-netweaver-7-4-bp_find_jobs_with_program-sql-injection/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-021-sap-netweaver-7-4-bp_find_jobs_with_program-sql-injection/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-021-sap-netweaver-7-4-bp_find_jobs_with_program-sql-injection/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/134801/SAP-NetWeaver-J2EE-Engine-7.40-SQL-Injection.html",
|
||||
|
@ -68,9 +68,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Jan/94"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review",
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Feb/68"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-031-using-base64-and-des-in-sap-mii/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-031-using-base64-and-des-in-sap-mii/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-031-using-base64-and-des-in-sap-mii/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-031-using-base64-and-des-in-sap-mii/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/135761/SAP-MII-12.2-14.0-15.0-Cryptography-Issues.html",
|
||||
|
@ -63,9 +63,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Feb/69"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-032-sap-pco-agent-dos-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-032-sap-pco-agent-dos-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-032-sap-pco-agent-dos-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-032-sap-pco-agent-dos-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.onapsis.com/blog/analyzing-sap-security-notes-november-2015",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/10761/",
|
||||
"name" : "https://erpscan.io/advisories/10761/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/10761/"
|
||||
"url" : "https://erpscan.io/advisories/10761/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/community/security/blog/2015/12/09/sap-security-notes-december-2015--review",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-023-sap-afaria-authorization-bypass-insecure-signature/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-023-sap-afaria-authorization-bypass-insecure-signature/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-023-sap-afaria-authorization-bypass-insecure-signature/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-023-sap-afaria-authorization-bypass-insecure-signature/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-15-017-sap-netweaver-j2ee-das-service-unauthorized-access/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-15-017-sap-netweaver-j2ee-das-service-unauthorized-access/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-15-017-sap-netweaver-j2ee-das-service-unauthorized-access/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-15-017-sap-netweaver-j2ee-das-service-unauthorized-access/"
|
||||
},
|
||||
{
|
||||
"name" : "http://scn.sap.com/community/security/blog/2015/07/15/sap-security-notes-july-2015",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-006-oracle-e-business-suite-xxe-injection-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-006-oracle-e-business-suite-xxe-injection-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-006-oracle-e-business-suite-xxe-injection-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-006-oracle-e-business-suite-xxe-injection-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-007-oracle-e-business-suite-xxe-injection-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-007-oracle-e-business-suite-xxe-injection-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-007-oracle-e-business-suite-xxe-injection-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-007-oracle-e-business-suite-xxe-injection-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Dec/69"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-035-sap-solman-user-accounts-dislosure/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-035-sap-solman-user-accounts-dislosure/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-035-sap-solman-user-accounts-dislosure/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-035-sap-solman-user-accounts-dislosure/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/140232/SAP-Solman-7.31-Information-Disclosure.html",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-029-sap-netweaver-java-7-5-deserialization-untrusted-user-value-trustmanagementservlet/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-029-sap-netweaver-java-7-5-deserialization-untrusted-user-value-trustmanagementservlet/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-029-sap-netweaver-java-7-5-deserialization-untrusted-user-value-trustmanagementservlet/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-029-sap-netweaver-java-7-5-deserialization-untrusted-user-value-trustmanagementservlet/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-024-sap-sql-anywhere-mobilink-synchronization-server-buffer-overflow/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-024-sap-sql-anywhere-mobilink-synchronization-server-buffer-overflow/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-024-sap-sql-anywhere-mobilink-synchronization-server-buffer-overflow/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-024-sap-sql-anywhere-mobilink-synchronization-server-buffer-overflow/"
|
||||
},
|
||||
{
|
||||
"name" : "91197",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-030-sap-netweaver-sapstartsrv-stack-based-buffer-overflow/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-030-sap-netweaver-sapstartsrv-stack-based-buffer-overflow/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-030-sap-netweaver-sapstartsrv-stack-based-buffer-overflow/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-030-sap-netweaver-sapstartsrv-stack-based-buffer-overflow/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -63,14 +63,14 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Apr/60"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-16-003-sap-netweaver-7-4-cryptographic-issues/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-003-sap-netweaver-7-4-cryptographic-issues/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-16-003-sap-netweaver-7-4-cryptographic-issues/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-003-sap-netweaver-7-4-cryptographic-issues/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/"
|
||||
},
|
||||
{
|
||||
"name" : "80920",
|
||||
|
@ -63,19 +63,19 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Apr/64"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-16-001-xss-sap-netweaver-7-4-mdt-servlet/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-001-xss-sap-netweaver-7-4-mdt-servlet/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-16-001-xss-sap-netweaver-7-4-mdt-servlet/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-001-xss-sap-netweaver-7-4-mdt-servlet/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-16-004-sap-netweaver-7-4-pmitest-servlet-xss/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-004-sap-netweaver-7-4-pmitest-servlet-xss/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-16-004-sap-netweaver-7-4-pmitest-servlet-xss/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-004-sap-netweaver-7-4-pmitest-servlet-xss/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -63,14 +63,14 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Apr/65"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,14 +58,14 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Apr/59"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/"
|
||||
},
|
||||
{
|
||||
"name" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -68,14 +68,14 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/May/56"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-011-sap-netweaver-7-4-sql-injection-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-011-sap-netweaver-7-4-sql-injection-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-011-sap-netweaver-7-4-sql-injection-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-011-sap-netweaver-7-4-sql-injection-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/vah13/SAP_exploit",
|
||||
|
@ -58,14 +58,14 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/May/39"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-008-sap-netweaver-7-4-proxyserver-servlet-xss-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-008-sap-netweaver-7-4-proxyserver-servlet-xss-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-008-sap-netweaver-7-4-proxyserver-servlet-xss-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-008-sap-netweaver-7-4-proxyserver-servlet-xss-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/137045/SAP-NetWeaver-AS-JAVA-7.4-Cross-Site-Scripting.html",
|
||||
|
@ -68,14 +68,14 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/May/55"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-010-sap-netweaver-7-4-information-disclosure/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-010-sap-netweaver-7-4-information-disclosure/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-010-sap-netweaver-7-4-information-disclosure/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-010-sap-netweaver-7-4-information-disclosure/"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/137128/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html",
|
||||
|
@ -63,14 +63,14 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/May/40"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/137046/SAP-MII-15.0-Directory-Traversal.html",
|
||||
|
@ -58,14 +58,14 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Jun/46"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-016-sap-netweaver-7-4-information-disclosure-wd_chat/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-016-sap-netweaver-7-4-information-disclosure-wd_chat/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-016-sap-netweaver-7-4-information-disclosure-wd_chat/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-016-sap-netweaver-7-4-information-disclosure-wd_chat/"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/137579/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html",
|
||||
|
@ -63,14 +63,14 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Jun/41"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/137527/SAP-NetWeaver-AS-JAVA-7.5-XXE-Injection.html",
|
||||
|
@ -58,14 +58,14 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Jun/42"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-014-sap-netweaver-7-4-navigationurltester/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-014-sap-netweaver-7-4-navigationurltester/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-014-sap-netweaver-7-4-navigationurltester/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-014-sap-netweaver-7-4-navigationurltester/"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/137529/SAP-NetWeaver-AS-JAVA-7.5-Cross-Site-Scripting.html",
|
||||
|
@ -63,14 +63,14 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Jun/40"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-012/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-012/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-012/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-012/"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/137528/SAP-NetWeaver-AS-JAVA-7.5-Directory-Traversal.html",
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Jun/55"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-017-sap-java-icman-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-017-sap-java-icman-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-017-sap-java-icman-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-017-sap-java-icman-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/137589/SAP-NetWeaver-AS-JAVA-7.4-icman-Denial-Of-Service.html",
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Jun/56"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-018-sap-java-jstart-dos/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-018-sap-java-jstart-dos/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-018-sap-java-jstart-dos/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-018-sap-java-jstart-dos/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/137591/SAP-NetWeaver-AS-JAVA-7.4-jstart-Denial-Of-Service.html",
|
||||
|
@ -58,14 +58,14 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Jul/45"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-020-sap-netweaver-java-uddi-component-xxe-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-020-sap-netweaver-java-uddi-component-xxe-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-020-sap-netweaver-java-uddi-component-xxe-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-020-sap-netweaver-java-uddi-component-xxe-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/",
|
||||
"name" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/"
|
||||
"url" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/137919/SAP-NetWeaver-AS-JAVA-7.4-XXE-Injection.html",
|
||||
|
@ -53,14 +53,14 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/",
|
||||
"name" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/"
|
||||
"url" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,14 +58,14 @@
|
||||
"url" : "http://seclists.org/fulldisclosure/2016/Jul/46"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-021-sap-mii-reflected-xss-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-021-sap-mii-reflected-xss-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-021-sap-mii-reflected-xss-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-021-sap-mii-reflected-xss-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/",
|
||||
"name" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/"
|
||||
"url" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/137920/SAP-xMII-15-Cross-Site-Scripting.html",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/",
|
||||
"name" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/"
|
||||
"url" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/",
|
||||
"name" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/"
|
||||
"url" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-january-2017/",
|
||||
"name" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-january-2017/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-january-2017/"
|
||||
"url" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-january-2017/"
|
||||
},
|
||||
{
|
||||
"name" : "97661",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-033-sap-netweaver-java-icman-dos-vulnerability/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-033-sap-netweaver-java-icman-dos-vulnerability/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-033-sap-netweaver-java-icman-dos-vulnerability/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-033-sap-netweaver-java-icman-dos-vulnerability/"
|
||||
},
|
||||
{
|
||||
"name" : "92418",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-16-034-sap-netweaver-java-xxe-vulnerability-bc-bmt-bpm-dsk-component/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-16-034-sap-netweaver-java-xxe-vulnerability-bc-bmt-bpm-dsk-component/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-16-034-sap-netweaver-java-xxe-vulnerability-bc-bmt-bpm-dsk-component/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-16-034-sap-netweaver-java-xxe-vulnerability-bc-bmt-bpm-dsk-component/"
|
||||
},
|
||||
{
|
||||
"name" : "92419",
|
||||
|
@ -58,14 +58,14 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-17-038-directory-traversal-vulnerability-integration-gateway-psigw/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-17-038-directory-traversal-vulnerability-integration-gateway-psigw/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-17-038-directory-traversal-vulnerability-integration-gateway-psigw/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-17-038-directory-traversal-vulnerability-integration-gateway-psigw/"
|
||||
},
|
||||
{
|
||||
"name" : "https://erpscan.com/advisories/erpscan-17-039-file-upload-integration-gateway-psigw-peoplesoft/",
|
||||
"name" : "https://erpscan.io/advisories/erpscan-17-039-file-upload-integration-gateway-psigw-peoplesoft/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://erpscan.com/advisories/erpscan-17-039-file-upload-integration-gateway-psigw-peoplesoft/"
|
||||
"url" : "https://erpscan.io/advisories/erpscan-17-039-file-upload-integration-gateway-psigw-peoplesoft/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user