diff --git a/2011/4xxx/CVE-2011-4707.json b/2011/4xxx/CVE-2011-4707.json index 1ad4fb8ccee..cc43cbbf631 100644 --- a/2011/4xxx/CVE-2011-4707.json +++ b/2011/4xxx/CVE-2011-4707.json @@ -63,9 +63,9 @@ "url" : "http://dsecrg.com/pages/vul/show.php?id=336" }, { - "name" : "http://erpscan.com/advisories/dsecrg-11-036-sap-netwaver-virus-scan-interface-multiple-xss/", + "name" : "https://erpscan.io/advisories/dsecrg-11-036-sap-netwaver-virus-scan-interface-multiple-xss/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/dsecrg-11-036-sap-netwaver-virus-scan-interface-multiple-xss/" + "url" : "https://erpscan.io/advisories/dsecrg-11-036-sap-netwaver-virus-scan-interface-multiple-xss/" }, { "name" : "http://www.sdn.sap.com/irj/sdn/index?rid=/webcontent/uuid/c05604f6-4eb3-2d10-eea7-ceb666083a6a", diff --git a/2011/5xxx/CVE-2011-5260.json b/2011/5xxx/CVE-2011-5260.json index ce5f57cfd18..3d64c85c729 100644 --- a/2011/5xxx/CVE-2011-5260.json +++ b/2011/5xxx/CVE-2011-5260.json @@ -63,9 +63,9 @@ "url" : "http://dsecrg.com/pages/vul/show.php?id=337" }, { - "name" : "http://erpscan.com/advisories/dsecrg-11-037-sap-bw-doc-multiple-xss/", + "name" : "https://erpscan.io/advisories/dsecrg-11-037-sap-bw-doc-multiple-xss/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/dsecrg-11-037-sap-bw-doc-multiple-xss/" + "url" : "https://erpscan.io/advisories/dsecrg-11-037-sap-bw-doc-multiple-xss/" }, { "name" : "http://www.sdn.sap.com/irj/scn/index?rid=/webcontent/uuid/50316177-762d-2f10-0993-a2206cc349b4", diff --git a/2013/5xxx/CVE-2013-5723.json b/2013/5xxx/CVE-2013-5723.json index 9f81cfce203..176c3337b07 100644 --- a/2013/5xxx/CVE-2013-5723.json +++ b/2013/5xxx/CVE-2013-5723.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/dsecrg-13-016-sap-netweaver-abad0_delete_derivation_table/", + "name" : "https://erpscan.io/advisories/dsecrg-13-016-sap-netweaver-abad0_delete_derivation_table/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/dsecrg-13-016-sap-netweaver-abad0_delete_derivation_table/" + "url" : "https://erpscan.io/advisories/dsecrg-13-016-sap-netweaver-abad0_delete_derivation_table/" }, { "name" : "https://service.sap.com/sap/support/notes/1840249", diff --git a/2013/6xxx/CVE-2013-6814.json b/2013/6xxx/CVE-2013-6814.json index e8839292437..b8e012aaf1e 100644 --- a/2013/6xxx/CVE-2013-6814.json +++ b/2013/6xxx/CVE-2013-6814.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-13-021-sap-portal-unvalidated-redirect/", + "name" : "https://erpscan.io/advisories/erpscan-13-021-sap-portal-unvalidated-redirect/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-13-021-sap-portal-unvalidated-redirect/" + "url" : "https://erpscan.io/advisories/erpscan-13-021-sap-portal-unvalidated-redirect/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/6xxx/CVE-2013-6815.json b/2013/6xxx/CVE-2013-6815.json index 17671c9b14d..ac6605304ea 100644 --- a/2013/6xxx/CVE-2013-6815.json +++ b/2013/6xxx/CVE-2013-6815.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-13-020-sap-netweaver-shsti_upload_xml-xxe/", + "name" : "https://erpscan.io/advisories/erpscan-13-020-sap-netweaver-shsti_upload_xml-xxe/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-13-020-sap-netweaver-shsti_upload_xml-xxe/" + "url" : "https://erpscan.io/advisories/erpscan-13-020-sap-netweaver-shsti_upload_xml-xxe/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/6xxx/CVE-2013-6816.json b/2013/6xxx/CVE-2013-6816.json index 52b99ac5702..50f7a2272a0 100644 --- a/2013/6xxx/CVE-2013-6816.json +++ b/2013/6xxx/CVE-2013-6816.json @@ -53,14 +53,14 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-13-018-sap-netweaver-servlet-javadumpservice-multiple-xss/", + "name" : "https://erpscan.io/advisories/erpscan-13-018-sap-netweaver-servlet-javadumpservice-multiple-xss/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-13-018-sap-netweaver-servlet-javadumpservice-multiple-xss/" + "url" : "https://erpscan.io/advisories/erpscan-13-018-sap-netweaver-servlet-javadumpservice-multiple-xss/" }, { - "name" : "http://erpscan.com/advisories/erpscan-13-019-sap-netweaver-servlet-datacollector-multiple-xss/", + "name" : "https://erpscan.io/advisories/erpscan-13-019-sap-netweaver-servlet-datacollector-multiple-xss/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-13-019-sap-netweaver-servlet-datacollector-multiple-xss/" + "url" : "https://erpscan.io/advisories/erpscan-13-019-sap-netweaver-servlet-datacollector-multiple-xss/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/6xxx/CVE-2013-6817.json b/2013/6xxx/CVE-2013-6817.json index 9b760e396ff..e47745a165d 100644 --- a/2013/6xxx/CVE-2013-6817.json +++ b/2013/6xxx/CVE-2013-6817.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/dsecrg-13-013-saprouter-heap-overflow/", + "name" : "https://erpscan.io/advisories/dsecrg-13-013-saprouter-heap-overflow/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/dsecrg-13-013-saprouter-heap-overflow/" + "url" : "https://erpscan.io/advisories/dsecrg-13-013-saprouter-heap-overflow/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/6xxx/CVE-2013-6818.json b/2013/6xxx/CVE-2013-6818.json index e9bc99902fe..f4b6fb26d7d 100644 --- a/2013/6xxx/CVE-2013-6818.json +++ b/2013/6xxx/CVE-2013-6818.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/dsecrg-13-008-sap-netweaver-logviewer-security-check-bypass/", + "name" : "https://erpscan.io/advisories/dsecrg-13-008-sap-netweaver-logviewer-security-check-bypass/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/dsecrg-13-008-sap-netweaver-logviewer-security-check-bypass/" + "url" : "https://erpscan.io/advisories/dsecrg-13-008-sap-netweaver-logviewer-security-check-bypass/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/6xxx/CVE-2013-6819.json b/2013/6xxx/CVE-2013-6819.json index c602f846cbe..9497b1014c3 100644 --- a/2013/6xxx/CVE-2013-6819.json +++ b/2013/6xxx/CVE-2013-6819.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/dsecrg-13-006-sap-netweaver-performance-provider-xss/", + "name" : "https://erpscan.io/advisories/dsecrg-13-006-sap-netweaver-performance-provider-xss/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/dsecrg-13-006-sap-netweaver-performance-provider-xss/" + "url" : "https://erpscan.io/advisories/dsecrg-13-006-sap-netweaver-performance-provider-xss/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/6xxx/CVE-2013-6820.json b/2013/6xxx/CVE-2013-6820.json index c3215d4c547..8d3dd6f1e93 100644 --- a/2013/6xxx/CVE-2013-6820.json +++ b/2013/6xxx/CVE-2013-6820.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/dsecrg-13-004-sap-netweaver-di-arbitrary-file-upload/", + "name" : "https://erpscan.io/advisories/dsecrg-13-004-sap-netweaver-di-arbitrary-file-upload/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/dsecrg-13-004-sap-netweaver-di-arbitrary-file-upload/" + "url" : "https://erpscan.io/advisories/dsecrg-13-004-sap-netweaver-di-arbitrary-file-upload/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/6xxx/CVE-2013-6821.json b/2013/6xxx/CVE-2013-6821.json index 6b278258aeb..7369dd4dd41 100644 --- a/2013/6xxx/CVE-2013-6821.json +++ b/2013/6xxx/CVE-2013-6821.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/dsecrg-13-003-sap-netweaver-exportability-check-service-unauthorized-directory-traversal/", + "name" : "https://erpscan.io/advisories/dsecrg-13-003-sap-netweaver-exportability-check-service-unauthorized-directory-traversal/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/dsecrg-13-003-sap-netweaver-exportability-check-service-unauthorized-directory-traversal/" + "url" : "https://erpscan.io/advisories/dsecrg-13-003-sap-netweaver-exportability-check-service-unauthorized-directory-traversal/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/6xxx/CVE-2013-6822.json b/2013/6xxx/CVE-2013-6822.json index 2135cf42160..1139dcbecff 100644 --- a/2013/6xxx/CVE-2013-6822.json +++ b/2013/6xxx/CVE-2013-6822.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/", + "name" : "https://erpscan.io/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/" + "url" : "https://erpscan.io/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/6xxx/CVE-2013-6823.json b/2013/6xxx/CVE-2013-6823.json index 8c96ccb61aa..527d3556172 100644 --- a/2013/6xxx/CVE-2013-6823.json +++ b/2013/6xxx/CVE-2013-6823.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/", + "name" : "https://erpscan.io/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/" + "url" : "https://erpscan.io/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/6xxx/CVE-2013-6869.json b/2013/6xxx/CVE-2013-6869.json index 754f8432d38..0dfbf556fb6 100644 --- a/2013/6xxx/CVE-2013-6869.json +++ b/2013/6xxx/CVE-2013-6869.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-13-017-sap-netweaver-srtt_get_count_before_key_rfc-sql-injection/", + "name" : "https://erpscan.io/advisories/erpscan-13-017-sap-netweaver-srtt_get_count_before_key_rfc-sql-injection/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-13-017-sap-netweaver-srtt_get_count_before_key_rfc-sql-injection/" + "url" : "https://erpscan.io/advisories/erpscan-13-017-sap-netweaver-srtt_get_count_before_key_rfc-sql-injection/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/7xxx/CVE-2013-7093.json b/2013/7xxx/CVE-2013-7093.json index fa380fc7fb7..35ef59fc71f 100644 --- a/2013/7xxx/CVE-2013-7093.json +++ b/2013/7xxx/CVE-2013-7093.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-13-023-saprouter-authentication-bypass/", + "name" : "https://erpscan.io/advisories/erpscan-13-023-saprouter-authentication-bypass/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-13-023-saprouter-authentication-bypass/" + "url" : "https://erpscan.io/advisories/erpscan-13-023-saprouter-authentication-bypass/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/7xxx/CVE-2013-7094.json b/2013/7xxx/CVE-2013-7094.json index 05c85ee49e9..5dcf89eb537 100644 --- a/2013/7xxx/CVE-2013-7094.json +++ b/2013/7xxx/CVE-2013-7094.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-13-022-sap-netweaver-rsddcver_count_tab_cols-potential-sql-injection/", + "name" : "https://erpscan.io/advisories/erpscan-13-022-sap-netweaver-rsddcver_count_tab_cols-potential-sql-injection/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-13-022-sap-netweaver-rsddcver_count_tab_cols-potential-sql-injection/" + "url" : "https://erpscan.io/advisories/erpscan-13-022-sap-netweaver-rsddcver_count_tab_cols-potential-sql-injection/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/7xxx/CVE-2013-7095.json b/2013/7xxx/CVE-2013-7095.json index b796205f337..ad6e905e1e8 100644 --- a/2013/7xxx/CVE-2013-7095.json +++ b/2013/7xxx/CVE-2013-7095.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-13-025-sap-crm-crm_flex_data-xxe/", + "name" : "https://erpscan.io/advisories/erpscan-13-025-sap-crm-crm_flex_data-xxe/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-13-025-sap-crm-crm_flex_data-xxe/" + "url" : "https://erpscan.io/advisories/erpscan-13-025-sap-crm-crm_flex_data-xxe/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2013/7xxx/CVE-2013-7096.json b/2013/7xxx/CVE-2013-7096.json index 29129117e42..fcaaee8ba54 100644 --- a/2013/7xxx/CVE-2013-7096.json +++ b/2013/7xxx/CVE-2013-7096.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-13-024-sap-emr-unwired-multiple-sql-injections/", + "name" : "https://erpscan.io/advisories/erpscan-13-024-sap-emr-unwired-multiple-sql-injections/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-13-024-sap-emr-unwired-multiple-sql-injections/" + "url" : "https://erpscan.io/advisories/erpscan-13-024-sap-emr-unwired-multiple-sql-injections/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2014/1xxx/CVE-2014-1960.json b/2014/1xxx/CVE-2014-1960.json index 78e459a98c8..382976ed861 100644 --- a/2014/1xxx/CVE-2014-1960.json +++ b/2014/1xxx/CVE-2014-1960.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-14-004-sap-netweaver-solution-manager-missing-authorization-check-information-disclosure/", + "name" : "https://erpscan.io/advisories/erpscan-14-004-sap-netweaver-solution-manager-missing-authorization-check-information-disclosure/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-004-sap-netweaver-solution-manager-missing-authorization-check-information-disclosure/" + "url" : "https://erpscan.io/advisories/erpscan-14-004-sap-netweaver-solution-manager-missing-authorization-check-information-disclosure/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2014/1xxx/CVE-2014-1961.json b/2014/1xxx/CVE-2014-1961.json index 40b97041d9a..e3ccf5b20e0 100644 --- a/2014/1xxx/CVE-2014-1961.json +++ b/2014/1xxx/CVE-2014-1961.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-14-002-sap-portal-webdynpro-path-disclosure/", + "name" : "https://erpscan.io/advisories/erpscan-14-002-sap-portal-webdynpro-path-disclosure/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-002-sap-portal-webdynpro-path-disclosure/" + "url" : "https://erpscan.io/advisories/erpscan-14-002-sap-portal-webdynpro-path-disclosure/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2014/1xxx/CVE-2014-1962.json b/2014/1xxx/CVE-2014-1962.json index 4f64983c90b..480639664b0 100644 --- a/2014/1xxx/CVE-2014-1962.json +++ b/2014/1xxx/CVE-2014-1962.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-14-003-sap-crm-gwsync-xxe/", + "name" : "https://erpscan.io/advisories/erpscan-14-003-sap-crm-gwsync-xxe/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-003-sap-crm-gwsync-xxe/" + "url" : "https://erpscan.io/advisories/erpscan-14-003-sap-crm-gwsync-xxe/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2014/1xxx/CVE-2014-1963.json b/2014/1xxx/CVE-2014-1963.json index 99dd9118c21..db2c1c1d00b 100644 --- a/2014/1xxx/CVE-2014-1963.json +++ b/2014/1xxx/CVE-2014-1963.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-14-001-sap-netweaver-message-server-dos/", + "name" : "https://erpscan.io/advisories/erpscan-14-001-sap-netweaver-message-server-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-001-sap-netweaver-message-server-dos/" + "url" : "https://erpscan.io/advisories/erpscan-14-001-sap-netweaver-message-server-dos/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2014/1xxx/CVE-2014-1964.json b/2014/1xxx/CVE-2014-1964.json index a074cac8cdd..73c14101e82 100644 --- a/2014/1xxx/CVE-2014-1964.json +++ b/2014/1xxx/CVE-2014-1964.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-14-005-sap-netweaver-dir-error-xss/", + "name" : "https://erpscan.io/advisories/erpscan-14-005-sap-netweaver-dir-error-xss/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-005-sap-netweaver-dir-error-xss/" + "url" : "https://erpscan.io/advisories/erpscan-14-005-sap-netweaver-dir-error-xss/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2014/1xxx/CVE-2014-1965.json b/2014/1xxx/CVE-2014-1965.json index 83544ee0f59..ade12b56600 100644 --- a/2014/1xxx/CVE-2014-1965.json +++ b/2014/1xxx/CVE-2014-1965.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-14-006-sap-netweaver-pip-xss/", + "name" : "https://erpscan.io/advisories/erpscan-14-006-sap-netweaver-pip-xss/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-006-sap-netweaver-pip-xss/" + "url" : "https://erpscan.io/advisories/erpscan-14-006-sap-netweaver-pip-xss/" }, { "name" : "http://www.stechno.net/sap-notes.html?view=sapnote&id=1442517", diff --git a/2014/6xxx/CVE-2014-6252.json b/2014/6xxx/CVE-2014-6252.json index d318bea5c88..32910ce773a 100644 --- a/2014/6xxx/CVE-2014-6252.json +++ b/2014/6xxx/CVE-2014-6252.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-14-011-sap-netweaver-dispatcher-buffer-overflow-rce-dos/", + "name" : "https://erpscan.io/advisories/erpscan-14-011-sap-netweaver-dispatcher-buffer-overflow-rce-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-011-sap-netweaver-dispatcher-buffer-overflow-rce-dos/" + "url" : "https://erpscan.io/advisories/erpscan-14-011-sap-netweaver-dispatcher-buffer-overflow-rce-dos/" }, { "name" : "http://scn.sap.com/docs/DOC-8218", diff --git a/2014/8xxx/CVE-2014-8588.json b/2014/8xxx/CVE-2014-8588.json index b3933a20bb6..e264a62562b 100644 --- a/2014/8xxx/CVE-2014-8588.json +++ b/2014/8xxx/CVE-2014-8588.json @@ -53,14 +53,14 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/", + "name" : "https://erpscan.io/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/" + "url" : "https://erpscan.io/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/" }, { - "name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/", + "name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/" + "url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/" }, { "name" : "https://service.sap.com/sap/support/notes/2067972", diff --git a/2014/8xxx/CVE-2014-8589.json b/2014/8xxx/CVE-2014-8589.json index beba825aa5c..ec36fe96099 100644 --- a/2014/8xxx/CVE-2014-8589.json +++ b/2014/8xxx/CVE-2014-8589.json @@ -58,14 +58,14 @@ "url" : "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/" }, { - "name" : "http://erpscan.com/advisories/erpscan-14-014-saprouter-integer-overflow-dos/", + "name" : "https://erpscan.io/advisories/erpscan-14-014-saprouter-integer-overflow-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-014-saprouter-integer-overflow-dos/" + "url" : "https://erpscan.io/advisories/erpscan-14-014-saprouter-integer-overflow-dos/" }, { - "name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/", + "name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/" + "url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/" }, { "name" : "https://service.sap.com/sap/support/notes/2037492", diff --git a/2014/8xxx/CVE-2014-8590.json b/2014/8xxx/CVE-2014-8590.json index 620d83eb16d..9c9162b33f8 100644 --- a/2014/8xxx/CVE-2014-8590.json +++ b/2014/8xxx/CVE-2014-8590.json @@ -58,9 +58,9 @@ "url" : "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/" }, { - "name" : "http://erpscan.com/advisories/erpscan-14-015-sap-netweaver-as-java-xxe/", + "name" : "https://erpscan.io/advisories/erpscan-14-015-sap-netweaver-as-java-xxe/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-015-sap-netweaver-as-java-xxe/" + "url" : "https://erpscan.io/advisories/erpscan-14-015-sap-netweaver-as-java-xxe/" }, { "name" : "https://service.sap.com/sap/support/notes/2045176", @@ -68,9 +68,9 @@ "url" : "https://service.sap.com/sap/support/notes/2045176" }, { - "name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/", + "name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/" + "url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/" }, { "name" : "71023", diff --git a/2014/8xxx/CVE-2014-8591.json b/2014/8xxx/CVE-2014-8591.json index ce688c8e3a8..c78037abad6 100644 --- a/2014/8xxx/CVE-2014-8591.json +++ b/2014/8xxx/CVE-2014-8591.json @@ -58,14 +58,14 @@ "url" : "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/" }, { - "name" : "http://erpscan.com/advisories/erpscan-14-016-sap-netweaver-httpd-partial-http-post-requests-dos/", + "name" : "https://erpscan.io/advisories/erpscan-14-016-sap-netweaver-httpd-partial-http-post-requests-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-016-sap-netweaver-httpd-partial-http-post-requests-dos/" + "url" : "https://erpscan.io/advisories/erpscan-14-016-sap-netweaver-httpd-partial-http-post-requests-dos/" }, { - "name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/", + "name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/" + "url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/" }, { "name" : "https://service.sap.com/sap/support/notes/1966655", diff --git a/2014/8xxx/CVE-2014-8592.json b/2014/8xxx/CVE-2014-8592.json index 321b7ad3f8e..1b76828e265 100644 --- a/2014/8xxx/CVE-2014-8592.json +++ b/2014/8xxx/CVE-2014-8592.json @@ -58,34 +58,34 @@ "url" : "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/" }, { - "name" : "http://erpscan.com/advisories/erpscan-14-017-sap-netweaver-http-partial-http-post-requests-dos/", + "name" : "https://erpscan.io/advisories/erpscan-14-017-sap-netweaver-http-partial-http-post-requests-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-017-sap-netweaver-http-partial-http-post-requests-dos/" + "url" : "https://erpscan.io/advisories/erpscan-14-017-sap-netweaver-http-partial-http-post-requests-dos/" }, { - "name" : "http://erpscan.com/advisories/erpscan-14-018-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/", + "name" : "https://erpscan.io/advisories/erpscan-14-018-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-018-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/" + "url" : "https://erpscan.io/advisories/erpscan-14-018-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/" }, { - "name" : "http://erpscan.com/advisories/erpscan-14-019-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/", + "name" : "https://erpscan.io/advisories/erpscan-14-019-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-019-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/" + "url" : "https://erpscan.io/advisories/erpscan-14-019-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/" }, { - "name" : "http://erpscan.com/advisories/erpscan-14-020-sap-netweaver-management-console-gsaop-partial-http-requests-dos/", + "name" : "https://erpscan.io/advisories/erpscan-14-020-sap-netweaver-management-console-gsaop-partial-http-requests-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-020-sap-netweaver-management-console-gsaop-partial-http-requests-dos/" + "url" : "https://erpscan.io/advisories/erpscan-14-020-sap-netweaver-management-console-gsaop-partial-http-requests-dos/" }, { - "name" : "http://erpscan.com/advisories/erpscan-14-021-sap-netweaver-management-console-gsaop-partial-http-post-requests-dos/", + "name" : "https://erpscan.io/advisories/erpscan-14-021-sap-netweaver-management-console-gsaop-partial-http-post-requests-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-021-sap-netweaver-management-console-gsaop-partial-http-post-requests-dos/" + "url" : "https://erpscan.io/advisories/erpscan-14-021-sap-netweaver-management-console-gsaop-partial-http-post-requests-dos/" }, { - "name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/", + "name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/" + "url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/" }, { "name" : "https://service.sap.com/sap/support/notes/1986725", diff --git a/2014/8xxx/CVE-2014-8659.json b/2014/8xxx/CVE-2014-8659.json index f20a8b9bd12..31ff93ce144 100644 --- a/2014/8xxx/CVE-2014-8659.json +++ b/2014/8xxx/CVE-2014-8659.json @@ -58,9 +58,9 @@ "url" : "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/" }, { - "name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/", + "name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/" + "url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/" }, { "name" : "http://service.sap.com/sap/support/notes/0002052082", diff --git a/2014/8xxx/CVE-2014-8660.json b/2014/8xxx/CVE-2014-8660.json index 8e47a62b0ad..fdebd09356a 100644 --- a/2014/8xxx/CVE-2014-8660.json +++ b/2014/8xxx/CVE-2014-8660.json @@ -58,9 +58,9 @@ "url" : "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/" }, { - "name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/", + "name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-october-2014/" + "url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/" }, { "name" : "https://service.sap.com/sap/support/notes/1906212", diff --git a/2014/9xxx/CVE-2014-9594.json b/2014/9xxx/CVE-2014-9594.json index c7911a6e3bd..e89a17aa2f1 100644 --- a/2014/9xxx/CVE-2014-9594.json +++ b/2014/9xxx/CVE-2014-9594.json @@ -53,14 +53,14 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-14-025-sap-kernel-rce-dos/", + "name" : "https://erpscan.io/advisories/erpscan-14-025-sap-kernel-rce-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-025-sap-kernel-rce-dos/" + "url" : "https://erpscan.io/advisories/erpscan-14-025-sap-kernel-rce-dos/" }, { - "name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-december-2014/", + "name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-december-2014/" + "url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/" }, { "name" : "62150", diff --git a/2014/9xxx/CVE-2014-9595.json b/2014/9xxx/CVE-2014-9595.json index e061c59a1d5..cf8a5ed276f 100644 --- a/2014/9xxx/CVE-2014-9595.json +++ b/2014/9xxx/CVE-2014-9595.json @@ -53,14 +53,14 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-14-024-sap-kernel-rce-dos/", + "name" : "https://erpscan.io/advisories/erpscan-14-024-sap-kernel-rce-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-14-024-sap-kernel-rce-dos/" + "url" : "https://erpscan.io/advisories/erpscan-14-024-sap-kernel-rce-dos/" }, { - "name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-december-2014/", + "name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-december-2014/" + "url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/" }, { "name" : "62150", diff --git a/2015/1xxx/CVE-2015-1309.json b/2015/1xxx/CVE-2015-1309.json index 72f0c32586b..1ff3c4b2dff 100644 --- a/2015/1xxx/CVE-2015-1309.json +++ b/2015/1xxx/CVE-2015-1309.json @@ -53,14 +53,14 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-15-001-sap-netweaver-ecatt_display_xmlstring_remote-xxe/", + "name" : "https://erpscan.io/advisories/erpscan-15-001-sap-netweaver-ecatt_display_xmlstring_remote-xxe/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-001-sap-netweaver-ecatt_display_xmlstring_remote-xxe/" + "url" : "https://erpscan.io/advisories/erpscan-15-001-sap-netweaver-ecatt_display_xmlstring_remote-xxe/" }, { - "name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/", + "name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/" + "url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/" }, { "name" : "62469", diff --git a/2015/1xxx/CVE-2015-1310.json b/2015/1xxx/CVE-2015-1310.json index a643dba6683..6b3005ecf58 100644 --- a/2015/1xxx/CVE-2015-1310.json +++ b/2015/1xxx/CVE-2015-1310.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/", + "name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/" + "url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/" } ] } diff --git a/2015/1xxx/CVE-2015-1311.json b/2015/1xxx/CVE-2015-1311.json index 9a114d1ef7c..8accae3df57 100644 --- a/2015/1xxx/CVE-2015-1311.json +++ b/2015/1xxx/CVE-2015-1311.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/", + "name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/" + "url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/" } ] } diff --git a/2015/1xxx/CVE-2015-1312.json b/2015/1xxx/CVE-2015-1312.json index 314972f57f0..7a0504b0bad 100644 --- a/2015/1xxx/CVE-2015-1312.json +++ b/2015/1xxx/CVE-2015-1312.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/", + "name" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-critical-patch-update-january-2015/" + "url" : "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/" } ] } diff --git a/2015/2xxx/CVE-2015-2811.json b/2015/2xxx/CVE-2015-2811.json index a9ff2f5babf..a00da134ba8 100644 --- a/2015/2xxx/CVE-2015-2811.json +++ b/2015/2xxx/CVE-2015-2811.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Jun/64" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-006-sap-netweaver-portal-reportxmlviewer-xxe/", + "name" : "https://erpscan.io/advisories/erpscan-15-006-sap-netweaver-portal-reportxmlviewer-xxe/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-006-sap-netweaver-portal-reportxmlviewer-xxe/" + "url" : "https://erpscan.io/advisories/erpscan-15-006-sap-netweaver-portal-reportxmlviewer-xxe/" }, { "name" : "http://packetstormsecurity.com/files/132358/SAP-NetWeaver-Portal-7.31-XXE-Injection.html", diff --git a/2015/2xxx/CVE-2015-2812.json b/2015/2xxx/CVE-2015-2812.json index 87cb349b679..5c90e761ec2 100644 --- a/2015/2xxx/CVE-2015-2812.json +++ b/2015/2xxx/CVE-2015-2812.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Jun/62" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-004-sap-netweaver-portal-xmlvalidationcomponent-xxe/", + "name" : "https://erpscan.io/advisories/erpscan-15-004-sap-netweaver-portal-xmlvalidationcomponent-xxe/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-004-sap-netweaver-portal-xmlvalidationcomponent-xxe/" + "url" : "https://erpscan.io/advisories/erpscan-15-004-sap-netweaver-portal-xmlvalidationcomponent-xxe/" }, { "name" : "http://packetstormsecurity.com/files/132356/SAP-NetWeaver-Portal-7.31-XXE-Injection.html", diff --git a/2015/2xxx/CVE-2015-2813.json b/2015/2xxx/CVE-2015-2813.json index 4bb906349a6..68c14da31c5 100644 --- a/2015/2xxx/CVE-2015-2813.json +++ b/2015/2xxx/CVE-2015-2813.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Jun/63" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-005-sap-mobile-platform-xxe/", + "name" : "https://erpscan.io/advisories/erpscan-15-005-sap-mobile-platform-xxe/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-005-sap-mobile-platform-xxe/" + "url" : "https://erpscan.io/advisories/erpscan-15-005-sap-mobile-platform-xxe/" }, { "name" : "http://packetstormsecurity.com/files/132357/SAP-Mobile-Platform-2.3-XXE-Injection.html", diff --git a/2015/2xxx/CVE-2015-2814.json b/2015/2xxx/CVE-2015-2814.json index 5a66717abe1..e0c31b7951a 100644 --- a/2015/2xxx/CVE-2015-2814.json +++ b/2015/2xxx/CVE-2015-2814.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-15-002-sap-mobile-healthcare-emr-v2-unauthorized-access/", + "name" : "https://erpscan.io/advisories/erpscan-15-002-sap-mobile-healthcare-emr-v2-unauthorized-access/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-002-sap-mobile-healthcare-emr-v2-unauthorized-access/" + "url" : "https://erpscan.io/advisories/erpscan-15-002-sap-mobile-healthcare-emr-v2-unauthorized-access/" }, { "name" : "73701", diff --git a/2015/2xxx/CVE-2015-2815.json b/2015/2xxx/CVE-2015-2815.json index f4f92ca9fa3..27e9210951a 100644 --- a/2015/2xxx/CVE-2015-2815.json +++ b/2015/2xxx/CVE-2015-2815.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Jun/61" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-003-sapkernel-c_sapgparam-rce-dos/", + "name" : "https://erpscan.io/advisories/erpscan-15-003-sapkernel-c_sapgparam-rce-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-003-sapkernel-c_sapgparam-rce-dos/" + "url" : "https://erpscan.io/advisories/erpscan-15-003-sapkernel-c_sapgparam-rce-dos/" }, { "name" : "http://packetstormsecurity.com/files/132353/SAP-NetWeaver-Dispatcher-Buffer-Overflow.html", diff --git a/2015/2xxx/CVE-2015-2816.json b/2015/2xxx/CVE-2015-2816.json index 898cc2f1984..4a2c908954d 100644 --- a/2015/2xxx/CVE-2015-2816.json +++ b/2015/2xxx/CVE-2015-2816.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Jun/67" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-009-sap-afaria-7-xclistener-missing-authorization-check/", + "name" : "https://erpscan.io/advisories/erpscan-15-009-sap-afaria-7-xclistener-missing-authorization-check/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-009-sap-afaria-7-xclistener-missing-authorization-check/" + "url" : "https://erpscan.io/advisories/erpscan-15-009-sap-afaria-7-xclistener-missing-authorization-check/" }, { "name" : "http://packetstormsecurity.com/files/132363/SAP-Afaria-7-Missing-Authorization-Check.html", diff --git a/2015/2xxx/CVE-2015-2817.json b/2015/2xxx/CVE-2015-2817.json index 08d8b5774c4..0c996d6db14 100644 --- a/2015/2xxx/CVE-2015-2817.json +++ b/2015/2xxx/CVE-2015-2817.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Jun/65" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-007-sap-management-console-readprofile-parameters-information-disclosure/", + "name" : "https://erpscan.io/advisories/erpscan-15-007-sap-management-console-readprofile-parameters-information-disclosure/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-007-sap-management-console-readprofile-parameters-information-disclosure/" + "url" : "https://erpscan.io/advisories/erpscan-15-007-sap-management-console-readprofile-parameters-information-disclosure/" }, { "name" : "http://packetstormsecurity.com/files/132359/SAP-Management-Console-Information-Disclosure.html", diff --git a/2015/2xxx/CVE-2015-2818.json b/2015/2xxx/CVE-2015-2818.json index 88df1b08d66..cbf137cd608 100644 --- a/2015/2xxx/CVE-2015-2818.json +++ b/2015/2xxx/CVE-2015-2818.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-15-011-sap-mobile-platform-xxe", + "name" : "https://erpscan.io/advisories/erpscan-15-011-sap-mobile-platform-xxe", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-011-sap-mobile-platform-xxe" + "url" : "https://erpscan.io/advisories/erpscan-15-011-sap-mobile-platform-xxe" }, { "name" : "73896", diff --git a/2015/2xxx/CVE-2015-2819.json b/2015/2xxx/CVE-2015-2819.json index ba3b06ddf95..6f7b004a599 100644 --- a/2015/2xxx/CVE-2015-2819.json +++ b/2015/2xxx/CVE-2015-2819.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Jun/68" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/", + "name" : "https://erpscan.io/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/" + "url" : "https://erpscan.io/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/" }, { "name" : "http://packetstormsecurity.com/files/132364/SYBASE-SQL-Anywhere-12-16-Denial-Of-Service.html", diff --git a/2015/2xxx/CVE-2015-2820.json b/2015/2xxx/CVE-2015-2820.json index f0628918b4c..465b78c0c66 100644 --- a/2015/2xxx/CVE-2015-2820.json +++ b/2015/2xxx/CVE-2015-2820.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Jun/66" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-008-sap-afaria-7-xclistener-buffer-overflow/", + "name" : "https://erpscan.io/advisories/erpscan-15-008-sap-afaria-7-xclistener-buffer-overflow/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-008-sap-afaria-7-xclistener-buffer-overflow/" + "url" : "https://erpscan.io/advisories/erpscan-15-008-sap-afaria-7-xclistener-buffer-overflow/" }, { "name" : "http://packetstormsecurity.com/files/132362/SAP-Afaria-7-Denial-Of-Service.html", diff --git a/2015/3xxx/CVE-2015-3978.json b/2015/3xxx/CVE-2015-3978.json index 3dcd038f474..be398a1d9c0 100644 --- a/2015/3xxx/CVE-2015-3978.json +++ b/2015/3xxx/CVE-2015-3978.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/press-center/blog/sap-security-notes-april-2015/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-april-2015/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-security-notes-april-2015/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-april-2015/" }, { "name" : "http://www.onapsis.com/blog/analyzing-sap-security-notes-april-2015-edition/", diff --git a/2015/3xxx/CVE-2015-3981.json b/2015/3xxx/CVE-2015-3981.json index 5f60ee89383..f34e409e9fa 100644 --- a/2015/3xxx/CVE-2015-3981.json +++ b/2015/3xxx/CVE-2015-3981.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/press-center/blog/sap-security-notes-april-2015/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-april-2015/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-security-notes-april-2015/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-april-2015/" }, { "name" : "74627", diff --git a/2015/4xxx/CVE-2015-4091.json b/2015/4xxx/CVE-2015-4091.json index 544392b8496..d9bdc672e97 100644 --- a/2015/4xxx/CVE-2015-4091.json +++ b/2015/4xxx/CVE-2015-4091.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/May/96" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-013-sap-netweaver-as-java-cim-upload-xxe", + "name" : "https://erpscan.io/advisories/erpscan-15-013-sap-netweaver-as-java-cim-upload-xxe", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-013-sap-netweaver-as-java-cim-upload-xxe" + "url" : "https://erpscan.io/advisories/erpscan-15-013-sap-netweaver-as-java-cim-upload-xxe" }, { "name" : "http://packetstormsecurity.com/files/133122/SAP-NetWeaver-AS-Java-XXE-Injection.html", diff --git a/2015/4xxx/CVE-2015-4092.json b/2015/4xxx/CVE-2015-4092.json index 5bb90dc596b..a60881ec782 100644 --- a/2015/4xxx/CVE-2015-4092.json +++ b/2015/4xxx/CVE-2015-4092.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/May/96" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-012-sap-afaria-7-xcomms-bof", + "name" : "https://erpscan.io/advisories/erpscan-15-012-sap-afaria-7-xcomms-bof", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-012-sap-afaria-7-xcomms-bof" + "url" : "https://erpscan.io/advisories/erpscan-15-012-sap-afaria-7-xcomms-bof" }, { "name" : "74797", diff --git a/2015/4xxx/CVE-2015-4845.json b/2015/4xxx/CVE-2015-4845.json index 93cabc02315..cde1b4af106 100644 --- a/2015/4xxx/CVE-2015-4845.json +++ b/2015/4xxx/CVE-2015-4845.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Oct/97" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-025-oracle-e-business-suite-database-user-enumeration-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-15-025-oracle-e-business-suite-database-user-enumeration-vulnerability/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-025-oracle-e-business-suite-database-user-enumeration-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-15-025-oracle-e-business-suite-database-user-enumeration-vulnerability/" }, { "name" : "http://packetstormsecurity.com/files/134098/Oracle-E-Business-Suite-12.2.4-Database-User-Enumeration.html", diff --git a/2015/4xxx/CVE-2015-4846.json b/2015/4xxx/CVE-2015-4846.json index c377ed1ca53..8797ae267b9 100644 --- a/2015/4xxx/CVE-2015-4846.json +++ b/2015/4xxx/CVE-2015-4846.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Oct/99" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-026-oracle-e-business-suite-sql-injection-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-15-026-oracle-e-business-suite-sql-injection-vulnerability/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-026-oracle-e-business-suite-sql-injection-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-15-026-oracle-e-business-suite-sql-injection-vulnerability/" }, { "name" : "http://packetstormsecurity.com/files/134099/Oracle-E-Business-Suite-12.1.3-12.1.4-SQL-Injection.html", diff --git a/2015/4xxx/CVE-2015-4849.json b/2015/4xxx/CVE-2015-4849.json index e1becca354b..593f39a4214 100644 --- a/2015/4xxx/CVE-2015-4849.json +++ b/2015/4xxx/CVE-2015-4849.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Oct/112" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-029-oracle-e-business-suite-xxe-injection-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-15-029-oracle-e-business-suite-xxe-injection-vulnerability/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-029-oracle-e-business-suite-xxe-injection-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-15-029-oracle-e-business-suite-xxe-injection-vulnerability/" }, { "name" : "http://packetstormsecurity.com/files/134118/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html", diff --git a/2015/4xxx/CVE-2015-4851.json b/2015/4xxx/CVE-2015-4851.json index 6e35fe1b149..a50c2e7f98d 100644 --- a/2015/4xxx/CVE-2015-4851.json +++ b/2015/4xxx/CVE-2015-4851.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Oct/113" }, { - "name" : "https://erpscan.com/advisories/erpscan-15-030-oracle-e-business-suite-xxe/", + "name" : "https://erpscan.io/advisories/erpscan-15-030-oracle-e-business-suite-xxe/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-15-030-oracle-e-business-suite-xxe/" + "url" : "https://erpscan.io/advisories/erpscan-15-030-oracle-e-business-suite-xxe/" }, { "name" : "http://packetstormsecurity.com/files/134119/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html", diff --git a/2015/4xxx/CVE-2015-4854.json b/2015/4xxx/CVE-2015-4854.json index 9104926c770..c04ea8c8c18 100644 --- a/2015/4xxx/CVE-2015-4854.json +++ b/2015/4xxx/CVE-2015-4854.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Oct/100" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-027-oracle-e-business-suite-cross-site-scripting-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-15-027-oracle-e-business-suite-cross-site-scripting-vulnerability/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-027-oracle-e-business-suite-cross-site-scripting-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-15-027-oracle-e-business-suite-cross-site-scripting-vulnerability/" }, { "name" : "http://packetstormsecurity.com/files/134100/Oracle-E-Business-Suite-12.1.4-Cross-Site-Scripting.html", diff --git a/2015/4xxx/CVE-2015-4886.json b/2015/4xxx/CVE-2015-4886.json index 37ecb00672a..dcdab94c94a 100644 --- a/2015/4xxx/CVE-2015-4886.json +++ b/2015/4xxx/CVE-2015-4886.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Oct/111" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-028-oracle-e-business-suite-xxe-injection-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-15-028-oracle-e-business-suite-xxe-injection-vulnerability/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-028-oracle-e-business-suite-xxe-injection-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-15-028-oracle-e-business-suite-xxe-injection-vulnerability/" }, { "name" : "http://packetstormsecurity.com/files/134117/Oracle-E-Business-Suite-12.1.3-XXE-Injection.html", diff --git a/2015/5xxx/CVE-2015-5067.json b/2015/5xxx/CVE-2015-5067.json index 1a7db8d71f9..fe394d4f212 100644 --- a/2015/5xxx/CVE-2015-5067.json +++ b/2015/5xxx/CVE-2015-5067.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-15-016-sap-netweaver-hardcoded-credentials/", + "name" : "https://erpscan.io/advisories/erpscan-15-016-sap-netweaver-hardcoded-credentials/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-016-sap-netweaver-hardcoded-credentials/" + "url" : "https://erpscan.io/advisories/erpscan-15-016-sap-netweaver-hardcoded-credentials/" }, { "name" : "http://scn.sap.com/community/security/blog/2015/06/11/sap-security-notes-june-2015", @@ -63,9 +63,9 @@ "url" : "http://scn.sap.com/community/security/blog/2015/06/11/sap-security-notes-june-2015" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-015-sap-netweaver-hardcoded-credentials/", + "name" : "https://erpscan.io/advisories/erpscan-15-015-sap-netweaver-hardcoded-credentials/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-015-sap-netweaver-hardcoded-credentials/" + "url" : "https://erpscan.io/advisories/erpscan-15-015-sap-netweaver-hardcoded-credentials/" }, { "name" : "http://packetstormsecurity.com/files/133515/SAP-NetWeaver-AS-FKCDBFTRACE-ABAP-Hardcoded-Credentials.html", diff --git a/2015/5xxx/CVE-2015-5068.json b/2015/5xxx/CVE-2015-5068.json index c7d11755657..3a1ee0f5cb8 100644 --- a/2015/5xxx/CVE-2015-5068.json +++ b/2015/5xxx/CVE-2015-5068.json @@ -63,9 +63,9 @@ "url" : "http://scn.sap.com/community/security/blog/2015/06/11/sap-security-notes-june-2015" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-014-sap-mobile-platform-3-xxe-in-add-repository/", + "name" : "https://erpscan.io/advisories/erpscan-15-014-sap-mobile-platform-3-xxe-in-add-repository/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-014-sap-mobile-platform-3-xxe-in-add-repository/" + "url" : "https://erpscan.io/advisories/erpscan-15-014-sap-mobile-platform-3-xxe-in-add-repository/" }, { "name" : "http://packetstormsecurity.com/files/133514/SAP-Mobile-Platform-3-XXE-Injection.html", diff --git a/2015/5xxx/CVE-2015-5454.json b/2015/5xxx/CVE-2015-5454.json index a9dfec41f62..ddb2c98eec4 100644 --- a/2015/5xxx/CVE-2015-5454.json +++ b/2015/5xxx/CVE-2015-5454.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Cross-site scripting (XSS) vulnerability in Nucleus CMS 3.65 allows remote attackers to inject arbitrary web script or HTML via the title parameter when adding a new item." + "value" : "Cross-site scripting (XSS) vulnerability in Nucleus CMS allows remote attackers to inject arbitrary web script or HTML via the title parameter when adding a new item." } ] }, @@ -57,6 +57,16 @@ "refsource" : "MISC", "url" : "http://packetstormsecurity.com/files/132461/Nucleus-CMS-3.65-Cross-Site-Scripting.html" }, + { + "name" : "https://github.com/security-provensec/CVE-2015-5454/blob/master/nucleus.pdf", + "refsource" : "MISC", + "url" : "https://github.com/security-provensec/CVE-2015-5454/blob/master/nucleus.pdf" + }, + { + "name" : "https://github.com/NucleusCMS/NucleusCMS/issues/83", + "refsource" : "CONFIRM", + "url" : "https://github.com/NucleusCMS/NucleusCMS/issues/83" + }, { "name" : "75694", "refsource" : "BID", diff --git a/2015/6xxx/CVE-2015-6662.json b/2015/6xxx/CVE-2015-6662.json index f1420623033..d3feb04d94f 100644 --- a/2015/6xxx/CVE-2015-6662.json +++ b/2015/6xxx/CVE-2015-6662.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Nov/92" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-018-sap-netweaver-7-4-xxe/", + "name" : "https://erpscan.io/advisories/erpscan-15-018-sap-netweaver-7-4-xxe/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-018-sap-netweaver-7-4-xxe/" + "url" : "https://erpscan.io/advisories/erpscan-15-018-sap-netweaver-7-4-xxe/" }, { "name" : "http://packetstormsecurity.com/files/134507/SAP-NetWeaver-7.4-XXE-Injection.html", diff --git a/2015/6xxx/CVE-2015-6663.json b/2015/6xxx/CVE-2015-6663.json index 71ebc5de4b6..bdbfdb4a955 100644 --- a/2015/6xxx/CVE-2015-6663.json +++ b/2015/6xxx/CVE-2015-6663.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Nov/95" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-019-sap-afaria-stored-xss/", + "name" : "https://erpscan.io/advisories/erpscan-15-019-sap-afaria-stored-xss/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-019-sap-afaria-stored-xss/" + "url" : "https://erpscan.io/advisories/erpscan-15-019-sap-afaria-stored-xss/" }, { "name" : "http://packetstormsecurity.com/files/134508/SAP-Afaria-7-Cross-Site-Scripting.html", diff --git a/2015/6xxx/CVE-2015-6664.json b/2015/6xxx/CVE-2015-6664.json index f90cb89f6c5..e754e54b8cc 100644 --- a/2015/6xxx/CVE-2015-6664.json +++ b/2015/6xxx/CVE-2015-6664.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Nov/96" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-020-sap-mobile-platform-2-3-xxe-in-application-import/", + "name" : "https://erpscan.io/advisories/erpscan-15-020-sap-mobile-platform-2-3-xxe-in-application-import/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-020-sap-mobile-platform-2-3-xxe-in-application-import/" + "url" : "https://erpscan.io/advisories/erpscan-15-020-sap-mobile-platform-2-3-xxe-in-application-import/" }, { "name" : "http://packetstormsecurity.com/files/134509/SAP-Mobile-Platform-2.3-XXE-Injection.html", diff --git a/2015/7xxx/CVE-2015-7239.json b/2015/7xxx/CVE-2015-7239.json index 61f4ead5e3e..03162488cbb 100644 --- a/2015/7xxx/CVE-2015-7239.json +++ b/2015/7xxx/CVE-2015-7239.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2015/Dec/66" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-021-sap-netweaver-7-4-bp_find_jobs_with_program-sql-injection/", + "name" : "https://erpscan.io/advisories/erpscan-15-021-sap-netweaver-7-4-bp_find_jobs_with_program-sql-injection/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-021-sap-netweaver-7-4-bp_find_jobs_with_program-sql-injection/" + "url" : "https://erpscan.io/advisories/erpscan-15-021-sap-netweaver-7-4-bp_find_jobs_with_program-sql-injection/" }, { "name" : "http://packetstormsecurity.com/files/134801/SAP-NetWeaver-J2EE-Engine-7.40-SQL-Injection.html", diff --git a/2015/7xxx/CVE-2015-7986.json b/2015/7xxx/CVE-2015-7986.json index 4d37b3051f8..11dc11e80b7 100644 --- a/2015/7xxx/CVE-2015-7986.json +++ b/2015/7xxx/CVE-2015-7986.json @@ -68,9 +68,9 @@ "url" : "http://seclists.org/fulldisclosure/2016/Jan/94" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/", + "name" : "https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/" + "url" : "https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/" }, { "name" : "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review", diff --git a/2015/8xxx/CVE-2015-8329.json b/2015/8xxx/CVE-2015-8329.json index 3c54faa6281..aca804cdebb 100644 --- a/2015/8xxx/CVE-2015-8329.json +++ b/2015/8xxx/CVE-2015-8329.json @@ -58,9 +58,9 @@ "url" : "http://seclists.org/fulldisclosure/2016/Feb/68" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-031-using-base64-and-des-in-sap-mii/", + "name" : "https://erpscan.io/advisories/erpscan-15-031-using-base64-and-des-in-sap-mii/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-031-using-base64-and-des-in-sap-mii/" + "url" : "https://erpscan.io/advisories/erpscan-15-031-using-base64-and-des-in-sap-mii/" }, { "name" : "http://packetstormsecurity.com/files/135761/SAP-MII-12.2-14.0-15.0-Cryptography-Issues.html", diff --git a/2015/8xxx/CVE-2015-8330.json b/2015/8xxx/CVE-2015-8330.json index 49f85967998..6ab56798d9c 100644 --- a/2015/8xxx/CVE-2015-8330.json +++ b/2015/8xxx/CVE-2015-8330.json @@ -63,9 +63,9 @@ "url" : "http://seclists.org/fulldisclosure/2016/Feb/69" }, { - "name" : "http://erpscan.com/advisories/erpscan-15-032-sap-pco-agent-dos-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-15-032-sap-pco-agent-dos-vulnerability/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-032-sap-pco-agent-dos-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-15-032-sap-pco-agent-dos-vulnerability/" }, { "name" : "https://www.onapsis.com/blog/analyzing-sap-security-notes-november-2015", diff --git a/2015/8xxx/CVE-2015-8600.json b/2015/8xxx/CVE-2015-8600.json index 429dca1c81d..f10cbb95dec 100644 --- a/2015/8xxx/CVE-2015-8600.json +++ b/2015/8xxx/CVE-2015-8600.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/10761/", + "name" : "https://erpscan.io/advisories/10761/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/10761/" + "url" : "https://erpscan.io/advisories/10761/" }, { "name" : "http://scn.sap.com/community/security/blog/2015/12/09/sap-security-notes-december-2015--review", diff --git a/2015/8xxx/CVE-2015-8753.json b/2015/8xxx/CVE-2015-8753.json index bed143dc4d8..807b6d67f39 100644 --- a/2015/8xxx/CVE-2015-8753.json +++ b/2015/8xxx/CVE-2015-8753.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-15-023-sap-afaria-authorization-bypass-insecure-signature/", + "name" : "https://erpscan.io/advisories/erpscan-15-023-sap-afaria-authorization-bypass-insecure-signature/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-023-sap-afaria-authorization-bypass-insecure-signature/" + "url" : "https://erpscan.io/advisories/erpscan-15-023-sap-afaria-authorization-bypass-insecure-signature/" } ] } diff --git a/2015/8xxx/CVE-2015-8840.json b/2015/8xxx/CVE-2015-8840.json index d1592cfeab0..13f582cbb8f 100644 --- a/2015/8xxx/CVE-2015-8840.json +++ b/2015/8xxx/CVE-2015-8840.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "http://erpscan.com/advisories/erpscan-15-017-sap-netweaver-j2ee-das-service-unauthorized-access/", + "name" : "https://erpscan.io/advisories/erpscan-15-017-sap-netweaver-j2ee-das-service-unauthorized-access/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-15-017-sap-netweaver-j2ee-das-service-unauthorized-access/" + "url" : "https://erpscan.io/advisories/erpscan-15-017-sap-netweaver-j2ee-das-service-unauthorized-access/" }, { "name" : "http://scn.sap.com/community/security/blog/2015/07/15/sap-security-notes-july-2015", diff --git a/2016/0xxx/CVE-2016-0456.json b/2016/0xxx/CVE-2016-0456.json index 1aed3ff7258..60ae1eade3a 100644 --- a/2016/0xxx/CVE-2016-0456.json +++ b/2016/0xxx/CVE-2016-0456.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-16-006-oracle-e-business-suite-xxe-injection-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-16-006-oracle-e-business-suite-xxe-injection-vulnerability/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-006-oracle-e-business-suite-xxe-injection-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-16-006-oracle-e-business-suite-xxe-injection-vulnerability/" }, { "name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", diff --git a/2016/0xxx/CVE-2016-0457.json b/2016/0xxx/CVE-2016-0457.json index da03a1633b0..6e0747d7876 100644 --- a/2016/0xxx/CVE-2016-0457.json +++ b/2016/0xxx/CVE-2016-0457.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-16-007-oracle-e-business-suite-xxe-injection-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-16-007-oracle-e-business-suite-xxe-injection-vulnerability/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-007-oracle-e-business-suite-xxe-injection-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-16-007-oracle-e-business-suite-xxe-injection-vulnerability/" }, { "name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", diff --git a/2016/10xxx/CVE-2016-10005.json b/2016/10xxx/CVE-2016-10005.json index 7f7d21d134c..e102b93af44 100644 --- a/2016/10xxx/CVE-2016-10005.json +++ b/2016/10xxx/CVE-2016-10005.json @@ -58,9 +58,9 @@ "url" : "http://seclists.org/fulldisclosure/2016/Dec/69" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-035-sap-solman-user-accounts-dislosure/", + "name" : "https://erpscan.io/advisories/erpscan-16-035-sap-solman-user-accounts-dislosure/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-035-sap-solman-user-accounts-dislosure/" + "url" : "https://erpscan.io/advisories/erpscan-16-035-sap-solman-user-accounts-dislosure/" }, { "name" : "http://packetstormsecurity.com/files/140232/SAP-Solman-7.31-Information-Disclosure.html", diff --git a/2016/10xxx/CVE-2016-10304.json b/2016/10xxx/CVE-2016-10304.json index 5b74d6bab69..8bb5ec42212 100644 --- a/2016/10xxx/CVE-2016-10304.json +++ b/2016/10xxx/CVE-2016-10304.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-16-029-sap-netweaver-java-7-5-deserialization-untrusted-user-value-trustmanagementservlet/", + "name" : "https://erpscan.io/advisories/erpscan-16-029-sap-netweaver-java-7-5-deserialization-untrusted-user-value-trustmanagementservlet/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-029-sap-netweaver-java-7-5-deserialization-untrusted-user-value-trustmanagementservlet/" + "url" : "https://erpscan.io/advisories/erpscan-16-029-sap-netweaver-java-7-5-deserialization-untrusted-user-value-trustmanagementservlet/" } ] } diff --git a/2016/10xxx/CVE-2016-10310.json b/2016/10xxx/CVE-2016-10310.json index 66b89876e9d..87d55dd0284 100644 --- a/2016/10xxx/CVE-2016-10310.json +++ b/2016/10xxx/CVE-2016-10310.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-16-024-sap-sql-anywhere-mobilink-synchronization-server-buffer-overflow/", + "name" : "https://erpscan.io/advisories/erpscan-16-024-sap-sql-anywhere-mobilink-synchronization-server-buffer-overflow/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-024-sap-sql-anywhere-mobilink-synchronization-server-buffer-overflow/" + "url" : "https://erpscan.io/advisories/erpscan-16-024-sap-sql-anywhere-mobilink-synchronization-server-buffer-overflow/" }, { "name" : "91197", diff --git a/2016/10xxx/CVE-2016-10311.json b/2016/10xxx/CVE-2016-10311.json index dcd2a5db2b3..f3d77389283 100644 --- a/2016/10xxx/CVE-2016-10311.json +++ b/2016/10xxx/CVE-2016-10311.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-16-030-sap-netweaver-sapstartsrv-stack-based-buffer-overflow/", + "name" : "https://erpscan.io/advisories/erpscan-16-030-sap-netweaver-sapstartsrv-stack-based-buffer-overflow/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-030-sap-netweaver-sapstartsrv-stack-based-buffer-overflow/" + "url" : "https://erpscan.io/advisories/erpscan-16-030-sap-netweaver-sapstartsrv-stack-based-buffer-overflow/" } ] } diff --git a/2016/1xxx/CVE-2016-1910.json b/2016/1xxx/CVE-2016-1910.json index c3066c676a1..b0c5d361958 100644 --- a/2016/1xxx/CVE-2016-1910.json +++ b/2016/1xxx/CVE-2016-1910.json @@ -63,14 +63,14 @@ "url" : "http://seclists.org/fulldisclosure/2016/Apr/60" }, { - "name" : "http://erpscan.com/advisories/erpscan-16-003-sap-netweaver-7-4-cryptographic-issues/", + "name" : "https://erpscan.io/advisories/erpscan-16-003-sap-netweaver-7-4-cryptographic-issues/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-16-003-sap-netweaver-7-4-cryptographic-issues/" + "url" : "https://erpscan.io/advisories/erpscan-16-003-sap-netweaver-7-4-cryptographic-issues/" }, { - "name" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" }, { "name" : "80920", diff --git a/2016/1xxx/CVE-2016-1911.json b/2016/1xxx/CVE-2016-1911.json index 50aee10ef05..7b7d5f10df4 100644 --- a/2016/1xxx/CVE-2016-1911.json +++ b/2016/1xxx/CVE-2016-1911.json @@ -63,19 +63,19 @@ "url" : "http://seclists.org/fulldisclosure/2016/Apr/64" }, { - "name" : "http://erpscan.com/advisories/erpscan-16-001-xss-sap-netweaver-7-4-mdt-servlet/", + "name" : "https://erpscan.io/advisories/erpscan-16-001-xss-sap-netweaver-7-4-mdt-servlet/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-16-001-xss-sap-netweaver-7-4-mdt-servlet/" + "url" : "https://erpscan.io/advisories/erpscan-16-001-xss-sap-netweaver-7-4-mdt-servlet/" }, { - "name" : "http://erpscan.com/advisories/erpscan-16-004-sap-netweaver-7-4-pmitest-servlet-xss/", + "name" : "https://erpscan.io/advisories/erpscan-16-004-sap-netweaver-7-4-pmitest-servlet-xss/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-16-004-sap-netweaver-7-4-pmitest-servlet-xss/" + "url" : "https://erpscan.io/advisories/erpscan-16-004-sap-netweaver-7-4-pmitest-servlet-xss/" }, { - "name" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" } ] } diff --git a/2016/1xxx/CVE-2016-1928.json b/2016/1xxx/CVE-2016-1928.json index bd9b5b6b42d..fd9fbab2424 100644 --- a/2016/1xxx/CVE-2016-1928.json +++ b/2016/1xxx/CVE-2016-1928.json @@ -63,14 +63,14 @@ "url" : "http://seclists.org/fulldisclosure/2016/Apr/65" }, { - "name" : "http://erpscan.com/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/", + "name" : "https://erpscan.io/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/" + "url" : "https://erpscan.io/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/" }, { - "name" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" } ] } diff --git a/2016/1xxx/CVE-2016-1929.json b/2016/1xxx/CVE-2016-1929.json index c3629f31e00..f65f08b7c14 100644 --- a/2016/1xxx/CVE-2016-1929.json +++ b/2016/1xxx/CVE-2016-1929.json @@ -58,14 +58,14 @@ "url" : "http://seclists.org/fulldisclosure/2016/Apr/59" }, { - "name" : "http://erpscan.com/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/", + "name" : "https://erpscan.io/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/", "refsource" : "MISC", - "url" : "http://erpscan.com/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/" + "url" : "https://erpscan.io/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/" }, { - "name" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/", "refsource" : "MISC", - "url" : "http://erpscan.com/press-center/blog/sap-security-notes-january-2016-review/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" } ] } diff --git a/2016/2xxx/CVE-2016-2386.json b/2016/2xxx/CVE-2016-2386.json index b1fcbf79b7e..f402675a87d 100644 --- a/2016/2xxx/CVE-2016-2386.json +++ b/2016/2xxx/CVE-2016-2386.json @@ -68,14 +68,14 @@ "url" : "http://seclists.org/fulldisclosure/2016/May/56" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-011-sap-netweaver-7-4-sql-injection-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-16-011-sap-netweaver-7-4-sql-injection-vulnerability/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-011-sap-netweaver-7-4-sql-injection-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-16-011-sap-netweaver-7-4-sql-injection-vulnerability/" }, { - "name" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/" }, { "name" : "https://github.com/vah13/SAP_exploit", diff --git a/2016/2xxx/CVE-2016-2387.json b/2016/2xxx/CVE-2016-2387.json index 9f5731a024d..257378869f1 100644 --- a/2016/2xxx/CVE-2016-2387.json +++ b/2016/2xxx/CVE-2016-2387.json @@ -58,14 +58,14 @@ "url" : "http://seclists.org/fulldisclosure/2016/May/39" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-008-sap-netweaver-7-4-proxyserver-servlet-xss-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-16-008-sap-netweaver-7-4-proxyserver-servlet-xss-vulnerability/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-008-sap-netweaver-7-4-proxyserver-servlet-xss-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-16-008-sap-netweaver-7-4-proxyserver-servlet-xss-vulnerability/" }, { - "name" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/" }, { "name" : "http://packetstormsecurity.com/files/137045/SAP-NetWeaver-AS-JAVA-7.4-Cross-Site-Scripting.html", diff --git a/2016/2xxx/CVE-2016-2388.json b/2016/2xxx/CVE-2016-2388.json index 52ecc7da07a..76018749292 100644 --- a/2016/2xxx/CVE-2016-2388.json +++ b/2016/2xxx/CVE-2016-2388.json @@ -68,14 +68,14 @@ "url" : "http://seclists.org/fulldisclosure/2016/May/55" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-010-sap-netweaver-7-4-information-disclosure/", + "name" : "https://erpscan.io/advisories/erpscan-16-010-sap-netweaver-7-4-information-disclosure/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-010-sap-netweaver-7-4-information-disclosure/" + "url" : "https://erpscan.io/advisories/erpscan-16-010-sap-netweaver-7-4-information-disclosure/" }, { - "name" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/" }, { "name" : "http://packetstormsecurity.com/files/137128/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html", diff --git a/2016/2xxx/CVE-2016-2389.json b/2016/2xxx/CVE-2016-2389.json index d8a6d25ef1c..1209af4f5d9 100644 --- a/2016/2xxx/CVE-2016-2389.json +++ b/2016/2xxx/CVE-2016-2389.json @@ -63,14 +63,14 @@ "url" : "http://seclists.org/fulldisclosure/2016/May/40" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/" }, { - "name" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-security-notes-february-2016-review/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/" }, { "name" : "http://packetstormsecurity.com/files/137046/SAP-MII-15.0-Directory-Traversal.html", diff --git a/2016/3xxx/CVE-2016-3973.json b/2016/3xxx/CVE-2016-3973.json index 3a7e2ed7015..29caf20d5e9 100644 --- a/2016/3xxx/CVE-2016-3973.json +++ b/2016/3xxx/CVE-2016-3973.json @@ -58,14 +58,14 @@ "url" : "http://seclists.org/fulldisclosure/2016/Jun/46" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-016-sap-netweaver-7-4-information-disclosure-wd_chat/", + "name" : "https://erpscan.io/advisories/erpscan-16-016-sap-netweaver-7-4-information-disclosure-wd_chat/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-016-sap-netweaver-7-4-information-disclosure-wd_chat/" + "url" : "https://erpscan.io/advisories/erpscan-16-016-sap-netweaver-7-4-information-disclosure-wd_chat/" }, { - "name" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/" }, { "name" : "http://packetstormsecurity.com/files/137579/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html", diff --git a/2016/3xxx/CVE-2016-3974.json b/2016/3xxx/CVE-2016-3974.json index f5c3d8a208e..656c460500f 100644 --- a/2016/3xxx/CVE-2016-3974.json +++ b/2016/3xxx/CVE-2016-3974.json @@ -63,14 +63,14 @@ "url" : "http://seclists.org/fulldisclosure/2016/Jun/41" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/", + "name" : "https://erpscan.io/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/" + "url" : "https://erpscan.io/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/" }, { - "name" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/" }, { "name" : "http://packetstormsecurity.com/files/137527/SAP-NetWeaver-AS-JAVA-7.5-XXE-Injection.html", diff --git a/2016/3xxx/CVE-2016-3975.json b/2016/3xxx/CVE-2016-3975.json index d6cfb8dd408..e77e3d465dc 100644 --- a/2016/3xxx/CVE-2016-3975.json +++ b/2016/3xxx/CVE-2016-3975.json @@ -58,14 +58,14 @@ "url" : "http://seclists.org/fulldisclosure/2016/Jun/42" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-014-sap-netweaver-7-4-navigationurltester/", + "name" : "https://erpscan.io/advisories/erpscan-16-014-sap-netweaver-7-4-navigationurltester/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-014-sap-netweaver-7-4-navigationurltester/" + "url" : "https://erpscan.io/advisories/erpscan-16-014-sap-netweaver-7-4-navigationurltester/" }, { - "name" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/" }, { "name" : "http://packetstormsecurity.com/files/137529/SAP-NetWeaver-AS-JAVA-7.5-Cross-Site-Scripting.html", diff --git a/2016/3xxx/CVE-2016-3976.json b/2016/3xxx/CVE-2016-3976.json index f13e1522c22..e78e821ec74 100644 --- a/2016/3xxx/CVE-2016-3976.json +++ b/2016/3xxx/CVE-2016-3976.json @@ -63,14 +63,14 @@ "url" : "http://seclists.org/fulldisclosure/2016/Jun/40" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-012/", + "name" : "https://erpscan.io/advisories/erpscan-16-012/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-012/" + "url" : "https://erpscan.io/advisories/erpscan-16-012/" }, { - "name" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/", + "name" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-security-notes-march-2016-review/" + "url" : "https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/" }, { "name" : "http://packetstormsecurity.com/files/137528/SAP-NetWeaver-AS-JAVA-7.5-Directory-Traversal.html", diff --git a/2016/3xxx/CVE-2016-3979.json b/2016/3xxx/CVE-2016-3979.json index 63e467ef214..6842910db77 100644 --- a/2016/3xxx/CVE-2016-3979.json +++ b/2016/3xxx/CVE-2016-3979.json @@ -58,9 +58,9 @@ "url" : "http://seclists.org/fulldisclosure/2016/Jun/55" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-017-sap-java-icman-dos/", + "name" : "https://erpscan.io/advisories/erpscan-16-017-sap-java-icman-dos/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-017-sap-java-icman-dos/" + "url" : "https://erpscan.io/advisories/erpscan-16-017-sap-java-icman-dos/" }, { "name" : "http://packetstormsecurity.com/files/137589/SAP-NetWeaver-AS-JAVA-7.4-icman-Denial-Of-Service.html", diff --git a/2016/3xxx/CVE-2016-3980.json b/2016/3xxx/CVE-2016-3980.json index 61b4585fbd0..7ef1e9b0d77 100644 --- a/2016/3xxx/CVE-2016-3980.json +++ b/2016/3xxx/CVE-2016-3980.json @@ -58,9 +58,9 @@ "url" : "http://seclists.org/fulldisclosure/2016/Jun/56" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-018-sap-java-jstart-dos/", + "name" : "https://erpscan.io/advisories/erpscan-16-018-sap-java-jstart-dos/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-018-sap-java-jstart-dos/" + "url" : "https://erpscan.io/advisories/erpscan-16-018-sap-java-jstart-dos/" }, { "name" : "http://packetstormsecurity.com/files/137591/SAP-NetWeaver-AS-JAVA-7.4-jstart-Denial-Of-Service.html", diff --git a/2016/4xxx/CVE-2016-4014.json b/2016/4xxx/CVE-2016-4014.json index 572718b54e7..7e51cd53b13 100644 --- a/2016/4xxx/CVE-2016-4014.json +++ b/2016/4xxx/CVE-2016-4014.json @@ -58,14 +58,14 @@ "url" : "http://seclists.org/fulldisclosure/2016/Jul/45" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-020-sap-netweaver-java-uddi-component-xxe-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-16-020-sap-netweaver-java-uddi-component-xxe-vulnerability/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-020-sap-netweaver-java-uddi-component-xxe-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-16-020-sap-netweaver-java-uddi-component-xxe-vulnerability/" }, { - "name" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", + "name" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" + "url" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" }, { "name" : "http://packetstormsecurity.com/files/137919/SAP-NetWeaver-AS-JAVA-7.4-XXE-Injection.html", diff --git a/2016/4xxx/CVE-2016-4015.json b/2016/4xxx/CVE-2016-4015.json index ce0d21d0c26..15e949e5cc0 100644 --- a/2016/4xxx/CVE-2016-4015.json +++ b/2016/4xxx/CVE-2016-4015.json @@ -53,14 +53,14 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/" }, { - "name" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", + "name" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" + "url" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" } ] } diff --git a/2016/4xxx/CVE-2016-4016.json b/2016/4xxx/CVE-2016-4016.json index 09eb357c360..dbb5960d965 100644 --- a/2016/4xxx/CVE-2016-4016.json +++ b/2016/4xxx/CVE-2016-4016.json @@ -58,14 +58,14 @@ "url" : "http://seclists.org/fulldisclosure/2016/Jul/46" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-021-sap-mii-reflected-xss-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-16-021-sap-mii-reflected-xss-vulnerability/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-021-sap-mii-reflected-xss-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-16-021-sap-mii-reflected-xss-vulnerability/" }, { - "name" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", + "name" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" + "url" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" }, { "name" : "http://packetstormsecurity.com/files/137920/SAP-xMII-15-Cross-Site-Scripting.html", diff --git a/2016/4xxx/CVE-2016-4017.json b/2016/4xxx/CVE-2016-4017.json index 2a7e4653268..831b179455e 100644 --- a/2016/4xxx/CVE-2016-4017.json +++ b/2016/4xxx/CVE-2016-4017.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", + "name" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" + "url" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" } ] } diff --git a/2016/4xxx/CVE-2016-4018.json b/2016/4xxx/CVE-2016-4018.json index 2ea599e6fbf..332c3add983 100644 --- a/2016/4xxx/CVE-2016-4018.json +++ b/2016/4xxx/CVE-2016-4018.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", + "name" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" + "url" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" } ] } diff --git a/2016/6xxx/CVE-2016-6818.json b/2016/6xxx/CVE-2016-6818.json index 54a922237d4..9049c6bf3cc 100644 --- a/2016/6xxx/CVE-2016-6818.json +++ b/2016/6xxx/CVE-2016-6818.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-january-2017/", + "name" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-january-2017/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-january-2017/" + "url" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-january-2017/" }, { "name" : "97661", diff --git a/2016/9xxx/CVE-2016-9562.json b/2016/9xxx/CVE-2016-9562.json index 8197852e65c..bd7ef080450 100644 --- a/2016/9xxx/CVE-2016-9562.json +++ b/2016/9xxx/CVE-2016-9562.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-16-033-sap-netweaver-java-icman-dos-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-16-033-sap-netweaver-java-icman-dos-vulnerability/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-033-sap-netweaver-java-icman-dos-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-16-033-sap-netweaver-java-icman-dos-vulnerability/" }, { "name" : "92418", diff --git a/2016/9xxx/CVE-2016-9563.json b/2016/9xxx/CVE-2016-9563.json index 4c3e5d1a1c0..550e5b66a91 100644 --- a/2016/9xxx/CVE-2016-9563.json +++ b/2016/9xxx/CVE-2016-9563.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-16-034-sap-netweaver-java-xxe-vulnerability-bc-bmt-bpm-dsk-component/", + "name" : "https://erpscan.io/advisories/erpscan-16-034-sap-netweaver-java-xxe-vulnerability-bc-bmt-bpm-dsk-component/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-034-sap-netweaver-java-xxe-vulnerability-bc-bmt-bpm-dsk-component/" + "url" : "https://erpscan.io/advisories/erpscan-16-034-sap-netweaver-java-xxe-vulnerability-bc-bmt-bpm-dsk-component/" }, { "name" : "92419", diff --git a/2017/10xxx/CVE-2017-10061.json b/2017/10xxx/CVE-2017-10061.json index fbe6e15a057..2d092be30e3 100644 --- a/2017/10xxx/CVE-2017-10061.json +++ b/2017/10xxx/CVE-2017-10061.json @@ -58,14 +58,14 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-038-directory-traversal-vulnerability-integration-gateway-psigw/", + "name" : "https://erpscan.io/advisories/erpscan-17-038-directory-traversal-vulnerability-integration-gateway-psigw/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-038-directory-traversal-vulnerability-integration-gateway-psigw/" + "url" : "https://erpscan.io/advisories/erpscan-17-038-directory-traversal-vulnerability-integration-gateway-psigw/" }, { - "name" : "https://erpscan.com/advisories/erpscan-17-039-file-upload-integration-gateway-psigw-peoplesoft/", + "name" : "https://erpscan.io/advisories/erpscan-17-039-file-upload-integration-gateway-psigw-peoplesoft/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-039-file-upload-integration-gateway-psigw-peoplesoft/" + "url" : "https://erpscan.io/advisories/erpscan-17-039-file-upload-integration-gateway-psigw-peoplesoft/" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", diff --git a/2017/10xxx/CVE-2017-10106.json b/2017/10xxx/CVE-2017-10106.json index 41059c7c8b5..3f81b28e629 100644 --- a/2017/10xxx/CVE-2017-10106.json +++ b/2017/10xxx/CVE-2017-10106.json @@ -58,9 +58,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-037-multiple-xss-vulnerabilities-testservlet-peoplesoft/", + "name" : "https://erpscan.io/advisories/erpscan-17-037-multiple-xss-vulnerabilities-testservlet-peoplesoft/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-037-multiple-xss-vulnerabilities-testservlet-peoplesoft/" + "url" : "https://erpscan.io/advisories/erpscan-17-037-multiple-xss-vulnerabilities-testservlet-peoplesoft/" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", diff --git a/2017/10xxx/CVE-2017-10146.json b/2017/10xxx/CVE-2017-10146.json index 0c0c6ec5bca..675b3c51d69 100644 --- a/2017/10xxx/CVE-2017-10146.json +++ b/2017/10xxx/CVE-2017-10146.json @@ -58,9 +58,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-040-anonymous-directory-traversal-vulnerability-double-encode-peoplesoft/", + "name" : "https://erpscan.io/advisories/erpscan-17-040-anonymous-directory-traversal-vulnerability-double-encode-peoplesoft/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-040-anonymous-directory-traversal-vulnerability-double-encode-peoplesoft/" + "url" : "https://erpscan.io/advisories/erpscan-17-040-anonymous-directory-traversal-vulnerability-double-encode-peoplesoft/" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", diff --git a/2017/10xxx/CVE-2017-10147.json b/2017/10xxx/CVE-2017-10147.json index 14586b7ac2a..5ee8c35f7c7 100644 --- a/2017/10xxx/CVE-2017-10147.json +++ b/2017/10xxx/CVE-2017-10147.json @@ -66,9 +66,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-041-unauthorized-container-shutdown-servermigrationcoordinator/", + "name" : "https://erpscan.io/advisories/erpscan-17-041-unauthorized-container-shutdown-servermigrationcoordinator/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-041-unauthorized-container-shutdown-servermigrationcoordinator/" + "url" : "https://erpscan.io/advisories/erpscan-17-041-unauthorized-container-shutdown-servermigrationcoordinator/" }, { "name" : "https://github.com/vah13/OracleCVE/tree/master/CVE-2017-10147", diff --git a/2017/10xxx/CVE-2017-10148.json b/2017/10xxx/CVE-2017-10148.json index ec865368b1d..ca1321ceca0 100644 --- a/2017/10xxx/CVE-2017-10148.json +++ b/2017/10xxx/CVE-2017-10148.json @@ -66,9 +66,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-042-anonymous-log-injection-in-fscm/", + "name" : "https://erpscan.io/advisories/erpscan-17-042-anonymous-log-injection-in-fscm/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-042-anonymous-log-injection-in-fscm/" + "url" : "https://erpscan.io/advisories/erpscan-17-042-anonymous-log-injection-in-fscm/" }, { "name" : "https://github.com/vah13/OracleCVE/tree/master/CVE-2017-10148", diff --git a/2017/11xxx/CVE-2017-11457.json b/2017/11xxx/CVE-2017-11457.json index 3b9f8e97080..793f15c2b9f 100644 --- a/2017/11xxx/CVE-2017-11457.json +++ b/2017/11xxx/CVE-2017-11457.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-018-sap-netweaver-java-7-5-xxe-com-sap-km-cm-ice/", + "name" : "https://erpscan.io/advisories/erpscan-17-018-sap-netweaver-java-7-5-xxe-com-sap-km-cm-ice/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-018-sap-netweaver-java-7-5-xxe-com-sap-km-cm-ice/" + "url" : "https://erpscan.io/advisories/erpscan-17-018-sap-netweaver-java-7-5-xxe-com-sap-km-cm-ice/" }, { "name" : "97572", diff --git a/2017/11xxx/CVE-2017-11458.json b/2017/11xxx/CVE-2017-11458.json index 99b2a204498..865c50e64f9 100644 --- a/2017/11xxx/CVE-2017-11458.json +++ b/2017/11xxx/CVE-2017-11458.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-017-sap-netweaver-java-7-3-java-xss-ctcprotocolprotocol-servlet/", + "name" : "https://erpscan.io/advisories/erpscan-17-017-sap-netweaver-java-7-3-java-xss-ctcprotocolprotocol-servlet/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-017-sap-netweaver-java-7-3-java-xss-ctcprotocolprotocol-servlet/" + "url" : "https://erpscan.io/advisories/erpscan-17-017-sap-netweaver-java-7-3-java-xss-ctcprotocolprotocol-servlet/" }, { "name" : "97566", diff --git a/2017/11xxx/CVE-2017-11459.json b/2017/11xxx/CVE-2017-11459.json index 72231ecbbd9..1aa81f9e159 100644 --- a/2017/11xxx/CVE-2017-11459.json +++ b/2017/11xxx/CVE-2017-11459.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-019-sap-trex-rce/", + "name" : "https://erpscan.io/advisories/erpscan-17-019-sap-trex-rce/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-019-sap-trex-rce/" + "url" : "https://erpscan.io/advisories/erpscan-17-019-sap-trex-rce/" } ] } diff --git a/2017/11xxx/CVE-2017-11460.json b/2017/11xxx/CVE-2017-11460.json index e2dad67102a..31570958160 100644 --- a/2017/11xxx/CVE-2017-11460.json +++ b/2017/11xxx/CVE-2017-11460.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-016-sap-netweaver-java-7-4-dataarchivingservice-servlet-xss/", + "name" : "https://erpscan.io/advisories/erpscan-17-016-sap-netweaver-java-7-4-dataarchivingservice-servlet-xss/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-016-sap-netweaver-java-7-4-dataarchivingservice-servlet-xss/" + "url" : "https://erpscan.io/advisories/erpscan-17-016-sap-netweaver-java-7-4-dataarchivingservice-servlet-xss/" }, { "name" : "97565", diff --git a/2017/14xxx/CVE-2017-14581.json b/2017/14xxx/CVE-2017-14581.json index b364702c90d..8c5ea261143 100644 --- a/2017/14xxx/CVE-2017-14581.json +++ b/2017/14xxx/CVE-2017-14581.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-030-sap-hostcontrol-remote-dos/", + "name" : "https://erpscan.io/advisories/erpscan-17-030-sap-hostcontrol-remote-dos/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-030-sap-hostcontrol-remote-dos/" + "url" : "https://erpscan.io/advisories/erpscan-17-030-sap-hostcontrol-remote-dos/" } ] } diff --git a/2017/15xxx/CVE-2017-15293.json b/2017/15xxx/CVE-2017-15293.json index e482ff60d80..be227592d8f 100644 --- a/2017/15xxx/CVE-2017-15293.json +++ b/2017/15xxx/CVE-2017-15293.json @@ -58,14 +58,14 @@ "url" : "https://blogs.sap.com/2017/09/12/sap-security-patch-day-september-2017/" }, { - "name" : "https://erpscan.com/advisories/erpscan-17-032-sap-pos-missing-authentication-xpressserver/", + "name" : "https://erpscan.io/advisories/erpscan-17-032-sap-pos-missing-authentication-xpressserver/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-032-sap-pos-missing-authentication-xpressserver/" + "url" : "https://erpscan.io/advisories/erpscan-17-032-sap-pos-missing-authentication-xpressserver/" }, { - "name" : "https://erpscan.com/research/hacking-sap-pos/", + "name" : "https://erpscan.io/research/hacking-sap-pos/", "refsource" : "MISC", - "url" : "https://erpscan.com/research/hacking-sap-pos/" + "url" : "https://erpscan.io/research/hacking-sap-pos/" }, { "name" : "100713", diff --git a/2017/15xxx/CVE-2017-15294.json b/2017/15xxx/CVE-2017-15294.json index 08387a095fd..649800fdc1f 100644 --- a/2017/15xxx/CVE-2017-15294.json +++ b/2017/15xxx/CVE-2017-15294.json @@ -58,9 +58,9 @@ "url" : "https://blogs.sap.com/2017/07/11/sap-security-patch-day-july-2017/" }, { - "name" : "https://erpscan.com/advisories/erpscan-17-035-xss-crm-administration-console-java/", + "name" : "https://erpscan.io/advisories/erpscan-17-035-xss-crm-administration-console-java/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-035-xss-crm-administration-console-java/" + "url" : "https://erpscan.io/advisories/erpscan-17-035-xss-crm-administration-console-java/" }, { "name" : "99532", diff --git a/2017/15xxx/CVE-2017-15295.json b/2017/15xxx/CVE-2017-15295.json index 73a8e1e9444..7c87196343d 100644 --- a/2017/15xxx/CVE-2017-15295.json +++ b/2017/15xxx/CVE-2017-15295.json @@ -58,14 +58,14 @@ "url" : "https://blogs.sap.com/2017/09/12/sap-security-patch-day-september-2017/" }, { - "name" : "https://erpscan.com/advisories/erpscan-17-033-sap-pos-missing-authentication-xpressserver/", + "name" : "https://erpscan.io/advisories/erpscan-17-033-sap-pos-missing-authentication-xpressserver/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-033-sap-pos-missing-authentication-xpressserver/" + "url" : "https://erpscan.io/advisories/erpscan-17-033-sap-pos-missing-authentication-xpressserver/" }, { - "name" : "https://erpscan.com/research/hacking-sap-pos/", + "name" : "https://erpscan.io/research/hacking-sap-pos/", "refsource" : "MISC", - "url" : "https://erpscan.com/research/hacking-sap-pos/" + "url" : "https://erpscan.io/research/hacking-sap-pos/" } ] } diff --git a/2017/15xxx/CVE-2017-15296.json b/2017/15xxx/CVE-2017-15296.json index 7452890e26e..6c1aba04b9e 100644 --- a/2017/15xxx/CVE-2017-15296.json +++ b/2017/15xxx/CVE-2017-15296.json @@ -58,9 +58,9 @@ "url" : "https://blogs.sap.com/2017/07/11/sap-security-patch-day-july-2017/" }, { - "name" : "https://erpscan.com/advisories/erpscan-17-036-csrf-sap-java-crm/", + "name" : "https://erpscan.io/advisories/erpscan-17-036-csrf-sap-java-crm/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-036-csrf-sap-java-crm/" + "url" : "https://erpscan.io/advisories/erpscan-17-036-csrf-sap-java-crm/" } ] } diff --git a/2017/15xxx/CVE-2017-15297.json b/2017/15xxx/CVE-2017-15297.json index 84a863355f5..9e96751782a 100644 --- a/2017/15xxx/CVE-2017-15297.json +++ b/2017/15xxx/CVE-2017-15297.json @@ -58,9 +58,9 @@ "url" : "https://blogs.sap.com/2017/07/11/sap-security-patch-day-july-2017/" }, { - "name" : "https://erpscan.com/advisories/erpscan-17-034-sap-hostcontrol-unprotected-web-method-dos/", + "name" : "https://erpscan.io/advisories/erpscan-17-034-sap-hostcontrol-unprotected-web-method-dos/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-034-sap-hostcontrol-unprotected-web-method-dos/" + "url" : "https://erpscan.io/advisories/erpscan-17-034-sap-hostcontrol-unprotected-web-method-dos/" }, { "name" : "99528", diff --git a/2017/3xxx/CVE-2017-3241.json b/2017/3xxx/CVE-2017-3241.json index 06d1883a732..611f21bee85 100644 --- a/2017/3xxx/CVE-2017-3241.json +++ b/2017/3xxx/CVE-2017-3241.json @@ -84,9 +84,9 @@ "url" : "https://www.exploit-db.com/exploits/41145/" }, { - "name" : "https://erpscan.com/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", diff --git a/2017/3xxx/CVE-2017-3300.json b/2017/3xxx/CVE-2017-3300.json index c54f5f826fa..e11f6fdd5c0 100644 --- a/2017/3xxx/CVE-2017-3300.json +++ b/2017/3xxx/CVE-2017-3300.json @@ -56,9 +56,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-005-oracle-peoplesoft-xss-vulnerability/", + "name" : "https://erpscan.io/advisories/erpscan-17-005-oracle-peoplesoft-xss-vulnerability/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-005-oracle-peoplesoft-xss-vulnerability/" + "url" : "https://erpscan.io/advisories/erpscan-17-005-oracle-peoplesoft-xss-vulnerability/" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", diff --git a/2017/3xxx/CVE-2017-3546.json b/2017/3xxx/CVE-2017-3546.json index 63ad284e245..31a3b7fa35c 100644 --- a/2017/3xxx/CVE-2017-3546.json +++ b/2017/3xxx/CVE-2017-3546.json @@ -63,9 +63,9 @@ "url" : "https://www.exploit-db.com/exploits/42034/" }, { - "name" : "https://erpscan.com/advisories/erpscan-17-022-ssrf-peoplesoft-imservlet/", + "name" : "https://erpscan.io/advisories/erpscan-17-022-ssrf-peoplesoft-imservlet/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-022-ssrf-peoplesoft-imservlet/" + "url" : "https://erpscan.io/advisories/erpscan-17-022-ssrf-peoplesoft-imservlet/" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", diff --git a/2017/3xxx/CVE-2017-3547.json b/2017/3xxx/CVE-2017-3547.json index 467d99f42fe..bf4b922bd01 100644 --- a/2017/3xxx/CVE-2017-3547.json +++ b/2017/3xxx/CVE-2017-3547.json @@ -58,9 +58,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-023-crlf-injection-peoplesoft-imservlet/", + "name" : "https://erpscan.io/advisories/erpscan-17-023-crlf-injection-peoplesoft-imservlet/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-023-crlf-injection-peoplesoft-imservlet/" + "url" : "https://erpscan.io/advisories/erpscan-17-023-crlf-injection-peoplesoft-imservlet/" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", diff --git a/2017/3xxx/CVE-2017-3548.json b/2017/3xxx/CVE-2017-3548.json index 8a5576f1cfc..f5a89c2da9f 100644 --- a/2017/3xxx/CVE-2017-3548.json +++ b/2017/3xxx/CVE-2017-3548.json @@ -63,9 +63,9 @@ "url" : "https://www.exploit-db.com/exploits/41925/" }, { - "name" : "https://erpscan.com/advisories/erpscan-17-020-xxe-via-doctype-peoplesoft/", + "name" : "https://erpscan.io/advisories/erpscan-17-020-xxe-via-doctype-peoplesoft/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-020-xxe-via-doctype-peoplesoft/" + "url" : "https://erpscan.io/advisories/erpscan-17-020-xxe-via-doctype-peoplesoft/" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", diff --git a/2017/3xxx/CVE-2017-3549.json b/2017/3xxx/CVE-2017-3549.json index ca47ca08f8e..18f392be149 100644 --- a/2017/3xxx/CVE-2017-3549.json +++ b/2017/3xxx/CVE-2017-3549.json @@ -83,9 +83,9 @@ "url" : "https://www.exploit-db.com/exploits/41926/" }, { - "name" : "https://erpscan.com/advisories/erpscan-17-021-sql-injection-e-business-suite-iesfootprint/", + "name" : "https://erpscan.io/advisories/erpscan-17-021-sql-injection-e-business-suite-iesfootprint/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-021-sql-injection-e-business-suite-iesfootprint/" + "url" : "https://erpscan.io/advisories/erpscan-17-021-sql-injection-e-business-suite-iesfootprint/" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", diff --git a/2017/3xxx/CVE-2017-3555.json b/2017/3xxx/CVE-2017-3555.json index 69ba8138d92..f6cf3c6c76d 100644 --- a/2017/3xxx/CVE-2017-3555.json +++ b/2017/3xxx/CVE-2017-3555.json @@ -78,9 +78,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-024-dos-oracle-e-business-suite-anonymouslogin/", + "name" : "https://erpscan.io/advisories/erpscan-17-024-dos-oracle-e-business-suite-anonymouslogin/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-024-dos-oracle-e-business-suite-anonymouslogin/" + "url" : "https://erpscan.io/advisories/erpscan-17-024-dos-oracle-e-business-suite-anonymouslogin/" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", diff --git a/2017/3xxx/CVE-2017-3556.json b/2017/3xxx/CVE-2017-3556.json index 5068fb53d18..d6e99760cbb 100644 --- a/2017/3xxx/CVE-2017-3556.json +++ b/2017/3xxx/CVE-2017-3556.json @@ -70,9 +70,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-025-auth-bypass-file-downloading-oracle-e-business-suite/", + "name" : "https://erpscan.io/advisories/erpscan-17-025-auth-bypass-file-downloading-oracle-e-business-suite/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-025-auth-bypass-file-downloading-oracle-e-business-suite/" + "url" : "https://erpscan.io/advisories/erpscan-17-025-auth-bypass-file-downloading-oracle-e-business-suite/" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", diff --git a/2017/3xxx/CVE-2017-3557.json b/2017/3xxx/CVE-2017-3557.json index 26a12a3b4db..e2643eab5f2 100644 --- a/2017/3xxx/CVE-2017-3557.json +++ b/2017/3xxx/CVE-2017-3557.json @@ -70,9 +70,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-026-xss-oracle-e-business-suite-jtffmprintserver/", + "name" : "https://erpscan.io/advisories/erpscan-17-026-xss-oracle-e-business-suite-jtffmprintserver/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-026-xss-oracle-e-business-suite-jtffmprintserver/" + "url" : "https://erpscan.io/advisories/erpscan-17-026-xss-oracle-e-business-suite-jtffmprintserver/" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", diff --git a/2017/5xxx/CVE-2017-5371.json b/2017/5xxx/CVE-2017-5371.json index fb50fa7425e..7751d0e0d83 100644 --- a/2017/5xxx/CVE-2017-5371.json +++ b/2017/5xxx/CVE-2017-5371.json @@ -63,14 +63,14 @@ "url" : "http://packetstormsecurity.com/files/140610/SAP-ASE-ODATA-Server-16-Denial-Of-Service.html" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-036-sap-ase-odata-server-denial-service/", + "name" : "https://erpscan.io/advisories/erpscan-16-036-sap-ase-odata-server-denial-service/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-036-sap-ase-odata-server-denial-service/" + "url" : "https://erpscan.io/advisories/erpscan-16-036-sap-ase-odata-server-denial-service/" }, { - "name" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-october-2016/", + "name" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-october-2016/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-october-2016/" + "url" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-october-2016/" }, { "name" : "93545", diff --git a/2017/5xxx/CVE-2017-5372.json b/2017/5xxx/CVE-2017-5372.json index cc20a7990bb..a6beecb3371 100644 --- a/2017/5xxx/CVE-2017-5372.json +++ b/2017/5xxx/CVE-2017-5372.json @@ -63,14 +63,14 @@ "url" : "http://packetstormsecurity.com/files/140611/SAP-NetWeaver-AS-Java-P4-MSPRUNTIMEINTERFACE-Information-Disclosure.html" }, { - "name" : "https://erpscan.com/advisories/erpscan-16-037-sap-java-p4-mspruntimeinterface-information-disclosure/", + "name" : "https://erpscan.io/advisories/erpscan-16-037-sap-java-p4-mspruntimeinterface-information-disclosure/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-037-sap-java-p4-mspruntimeinterface-information-disclosure/" + "url" : "https://erpscan.io/advisories/erpscan-16-037-sap-java-p4-mspruntimeinterface-information-disclosure/" }, { - "name" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-october-2016/", + "name" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-october-2016/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-october-2016/" + "url" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-october-2016/" }, { "name" : "93504", diff --git a/2017/5xxx/CVE-2017-5997.json b/2017/5xxx/CVE-2017-5997.json index 2777c351b3f..c6999631de2 100644 --- a/2017/5xxx/CVE-2017-5997.json +++ b/2017/5xxx/CVE-2017-5997.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-16-038-sap-message-server-http-remote-dos/", + "name" : "https://erpscan.io/advisories/erpscan-16-038-sap-message-server-http-remote-dos/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-16-038-sap-message-server-http-remote-dos/" + "url" : "https://erpscan.io/advisories/erpscan-16-038-sap-message-server-http-remote-dos/" } ] } diff --git a/2017/6xxx/CVE-2017-6950.json b/2017/6xxx/CVE-2017-6950.json index 07fe8ac83e0..4fa8d860298 100644 --- a/2017/6xxx/CVE-2017-6950.json +++ b/2017/6xxx/CVE-2017-6950.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-011-sap-gui-versions-remote-code-execution-bypass-security-policy/", + "name" : "https://erpscan.io/advisories/erpscan-17-011-sap-gui-versions-remote-code-execution-bypass-security-policy/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-011-sap-gui-versions-remote-code-execution-bypass-security-policy/" + "url" : "https://erpscan.io/advisories/erpscan-17-011-sap-gui-versions-remote-code-execution-bypass-security-policy/" }, { "name" : "96872", diff --git a/2017/7xxx/CVE-2017-7696.json b/2017/7xxx/CVE-2017-7696.json index 7790fe1f0a9..2269360d16d 100644 --- a/2017/7xxx/CVE-2017-7696.json +++ b/2017/7xxx/CVE-2017-7696.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-001-sap-java-dos-bc-iam-sso-otp-package-use-qr-servlet/", + "name" : "https://erpscan.io/advisories/erpscan-17-001-sap-java-dos-bc-iam-sso-otp-package-use-qr-servlet/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-001-sap-java-dos-bc-iam-sso-otp-package-use-qr-servlet/" + "url" : "https://erpscan.io/advisories/erpscan-17-001-sap-java-dos-bc-iam-sso-otp-package-use-qr-servlet/" } ] } diff --git a/2017/7xxx/CVE-2017-7717.json b/2017/7xxx/CVE-2017-7717.json index 9072438c1cd..f19b0449fee 100644 --- a/2017/7xxx/CVE-2017-7717.json +++ b/2017/7xxx/CVE-2017-7717.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-003-sap-netweaver-7-4-getuseruddielements-sql-injection/", + "name" : "https://erpscan.io/advisories/erpscan-17-003-sap-netweaver-7-4-getuseruddielements-sql-injection/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-003-sap-netweaver-7-4-getuseruddielements-sql-injection/" + "url" : "https://erpscan.io/advisories/erpscan-17-003-sap-netweaver-7-4-getuseruddielements-sql-injection/" }, { "name" : "95364", diff --git a/2017/8xxx/CVE-2017-8913.json b/2017/8xxx/CVE-2017-8913.json index 4012bed8016..413d8a1b122 100644 --- a/2017/8xxx/CVE-2017-8913.json +++ b/2017/8xxx/CVE-2017-8913.json @@ -53,14 +53,14 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-007-sap-netweaver-java-7-5-xxe-visual-composer-vc70runtime/", + "name" : "https://erpscan.io/advisories/erpscan-17-007-sap-netweaver-java-7-5-xxe-visual-composer-vc70runtime/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-007-sap-netweaver-java-7-5-xxe-visual-composer-vc70runtime/" + "url" : "https://erpscan.io/advisories/erpscan-17-007-sap-netweaver-java-7-5-xxe-visual-composer-vc70runtime/" }, { - "name" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/", + "name" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/" + "url" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/" } ] } diff --git a/2017/8xxx/CVE-2017-8914.json b/2017/8xxx/CVE-2017-8914.json index d4acd1db6ab..79ed172a90c 100644 --- a/2017/8xxx/CVE-2017-8914.json +++ b/2017/8xxx/CVE-2017-8914.json @@ -53,14 +53,14 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-009-sap-hana-sinopia-default-user-creation-policy-insecure/", + "name" : "https://erpscan.io/advisories/erpscan-17-009-sap-hana-sinopia-default-user-creation-policy-insecure/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-009-sap-hana-sinopia-default-user-creation-policy-insecure/" + "url" : "https://erpscan.io/advisories/erpscan-17-009-sap-hana-sinopia-default-user-creation-policy-insecure/" }, { - "name" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/", + "name" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/" + "url" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/" }, { "name" : "96206", diff --git a/2017/8xxx/CVE-2017-8915.json b/2017/8xxx/CVE-2017-8915.json index dacbb56cd6c..3f099ccb879 100644 --- a/2017/8xxx/CVE-2017-8915.json +++ b/2017/8xxx/CVE-2017-8915.json @@ -53,14 +53,14 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-008-sap-hana-xs-sinopia-dos/", + "name" : "https://erpscan.io/advisories/erpscan-17-008-sap-hana-xs-sinopia-dos/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-008-sap-hana-xs-sinopia-dos/" + "url" : "https://erpscan.io/advisories/erpscan-17-008-sap-hana-xs-sinopia-dos/" }, { - "name" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/", + "name" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/" + "url" : "https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-february-2017/" }, { "name" : "96206", diff --git a/2017/9xxx/CVE-2017-9843.json b/2017/9xxx/CVE-2017-9843.json index 78715d2d8d2..a287190bef6 100644 --- a/2017/9xxx/CVE-2017-9843.json +++ b/2017/9xxx/CVE-2017-9843.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-010-sap-netweaver-abap-dispwork-crash-using-cl_java_script/", + "name" : "https://erpscan.io/advisories/erpscan-17-010-sap-netweaver-abap-dispwork-crash-using-cl_java_script/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-010-sap-netweaver-abap-dispwork-crash-using-cl_java_script/" + "url" : "https://erpscan.io/advisories/erpscan-17-010-sap-netweaver-abap-dispwork-crash-using-cl_java_script/" }, { "name" : "96900", diff --git a/2017/9xxx/CVE-2017-9844.json b/2017/9xxx/CVE-2017-9844.json index 522914f73a4..0cedd927ae2 100644 --- a/2017/9xxx/CVE-2017-9844.json +++ b/2017/9xxx/CVE-2017-9844.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/", + "name" : "https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/" + "url" : "https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/" }, { "name" : "96865", diff --git a/2017/9xxx/CVE-2017-9845.json b/2017/9xxx/CVE-2017-9845.json index ad0a445bfa7..042c5709dcf 100644 --- a/2017/9xxx/CVE-2017-9845.json +++ b/2017/9xxx/CVE-2017-9845.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-17-015-sap-netweaver-dispwork-anonymous-denial-service/", + "name" : "https://erpscan.io/advisories/erpscan-17-015-sap-netweaver-dispwork-anonymous-denial-service/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-17-015-sap-netweaver-dispwork-anonymous-denial-service/" + "url" : "https://erpscan.io/advisories/erpscan-17-015-sap-netweaver-dispwork-anonymous-denial-service/" }, { "name" : "96874", diff --git a/2018/15xxx/CVE-2018-15805.json b/2018/15xxx/CVE-2018-15805.json index 1fcfa4afc97..a3c3265c593 100644 --- a/2018/15xxx/CVE-2018-15805.json +++ b/2018/15xxx/CVE-2018-15805.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-15805", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,33 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Accusoft PrizmDoc HTML5 Document Viewer before 13.5 contains an XML external entity (XXE) vulnerability, allowing an attacker to read arbitrary files or cause a denial of service (resource consumption)." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://medium.com/@mrnikhilsri/oob-xxe-in-prizmdoc-cve-2018-15805-dfb1e474345c", + "refsource" : "MISC", + "url" : "https://medium.com/@mrnikhilsri/oob-xxe-in-prizmdoc-cve-2018-15805-dfb1e474345c" + }, + { + "name" : "https://help.accusoft.com/PrizmDoc/v13.5/HTML/webframe.html#Release_v13_5.html", + "refsource" : "CONFIRM", + "url" : "https://help.accusoft.com/PrizmDoc/v13.5/HTML/webframe.html#Release_v13_5.html" } ] } diff --git a/2018/16xxx/CVE-2018-16635.json b/2018/16xxx/CVE-2018-16635.json index 848c42be1a3..7efc7b3a429 100644 --- a/2018/16xxx/CVE-2018-16635.json +++ b/2018/16xxx/CVE-2018-16635.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-16635", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Blackcat CMS 1.3.2 allows XSS via the willkommen.php?lang=DE page title at backend/pages/modify.php." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/security-provensec/CVE-2018-16635/blob/master/blackcatcms.pdf", + "refsource" : "MISC", + "url" : "https://github.com/security-provensec/CVE-2018-16635/blob/master/blackcatcms.pdf" } ] } diff --git a/2018/16xxx/CVE-2018-16636.json b/2018/16xxx/CVE-2018-16636.json index 60552bdb28c..8c9bfb2e3a4 100644 --- a/2018/16xxx/CVE-2018-16636.json +++ b/2018/16xxx/CVE-2018-16636.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-16636", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,33 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Nucleus CMS 3.70 allows HTML Injection via the index.php body parameter." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/security-provensec/CVE-2018-16636/blob/master/nucleus_html.pdf", + "refsource" : "MISC", + "url" : "https://github.com/security-provensec/CVE-2018-16636/blob/master/nucleus_html.pdf" + }, + { + "name" : "https://github.com/NucleusCMS/NucleusCMS/issues/84", + "refsource" : "CONFIRM", + "url" : "https://github.com/NucleusCMS/NucleusCMS/issues/84" } ] } diff --git a/2018/17xxx/CVE-2018-17300.json b/2018/17xxx/CVE-2018-17300.json index cd12b75c984..f7e66936034 100644 --- a/2018/17xxx/CVE-2018-17300.json +++ b/2018/17xxx/CVE-2018-17300.json @@ -56,6 +56,11 @@ "name" : "https://github.com/CuppaCMS/CuppaCMS/issues/4", "refsource" : "MISC", "url" : "https://github.com/CuppaCMS/CuppaCMS/issues/4" + }, + { + "name" : "https://github.com/security-provensec/CVE-2018-17300/blob/master/cuppa_xss.pdf", + "refsource" : "MISC", + "url" : "https://github.com/security-provensec/CVE-2018-17300/blob/master/cuppa_xss.pdf" } ] } diff --git a/2018/2xxx/CVE-2018-2605.json b/2018/2xxx/CVE-2018-2605.json index 6c6ade2ef41..88d8ea5771e 100644 --- a/2018/2xxx/CVE-2018-2605.json +++ b/2018/2xxx/CVE-2018-2605.json @@ -62,9 +62,9 @@ "references" : { "reference_data" : [ { - "name" : "https://erpscan.com/advisories/erpscan-18-001-information-disclosure-peoplesoft-listening-connector/", + "name" : "https://erpscan.io/advisories/erpscan-18-001-information-disclosure-peoplesoft-listening-connector/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-18-001-information-disclosure-peoplesoft-listening-connector/" + "url" : "https://erpscan.io/advisories/erpscan-18-001-information-disclosure-peoplesoft-listening-connector/" }, { "name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", diff --git a/2018/2xxx/CVE-2018-2636.json b/2018/2xxx/CVE-2018-2636.json index 1b7c38dbe27..f272769d877 100644 --- a/2018/2xxx/CVE-2018-2636.json +++ b/2018/2xxx/CVE-2018-2636.json @@ -67,14 +67,14 @@ "url" : "https://www.exploit-db.com/exploits/43960/" }, { - "name" : "https://erpscan.com/press-center/blog/oracle-micros-pos-breached/", + "name" : "https://erpscan.io/press-center/blog/oracle-micros-pos-breached/", "refsource" : "MISC", - "url" : "https://erpscan.com/press-center/blog/oracle-micros-pos-breached/" + "url" : "https://erpscan.io/press-center/blog/oracle-micros-pos-breached/" }, { - "name" : "https://erpscan.com/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/", + "name" : "https://erpscan.io/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/", "refsource" : "MISC", - "url" : "https://erpscan.com/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/" + "url" : "https://erpscan.io/advisories/erpscan-18-002-oracle-micros-pos-missing-authorisation-check/" }, { "name" : "https://github.com/erpscanteam/CVE-2018-2636", diff --git a/2019/2xxx/CVE-2019-2385.json b/2019/2xxx/CVE-2019-2385.json new file mode 100644 index 00000000000..7e1d433b569 --- /dev/null +++ b/2019/2xxx/CVE-2019-2385.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-2385", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/2xxx/CVE-2019-2386.json b/2019/2xxx/CVE-2019-2386.json new file mode 100644 index 00000000000..758400a1f3f --- /dev/null +++ b/2019/2xxx/CVE-2019-2386.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-2386", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/2xxx/CVE-2019-2387.json b/2019/2xxx/CVE-2019-2387.json new file mode 100644 index 00000000000..d9fb5444d81 --- /dev/null +++ b/2019/2xxx/CVE-2019-2387.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-2387", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/2xxx/CVE-2019-2388.json b/2019/2xxx/CVE-2019-2388.json new file mode 100644 index 00000000000..8e93397ec72 --- /dev/null +++ b/2019/2xxx/CVE-2019-2388.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-2388", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/2xxx/CVE-2019-2389.json b/2019/2xxx/CVE-2019-2389.json new file mode 100644 index 00000000000..52d5805b79b --- /dev/null +++ b/2019/2xxx/CVE-2019-2389.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-2389", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/2xxx/CVE-2019-2390.json b/2019/2xxx/CVE-2019-2390.json new file mode 100644 index 00000000000..b221f1cb936 --- /dev/null +++ b/2019/2xxx/CVE-2019-2390.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-2390", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/2xxx/CVE-2019-2391.json b/2019/2xxx/CVE-2019-2391.json new file mode 100644 index 00000000000..d374baabf5d --- /dev/null +++ b/2019/2xxx/CVE-2019-2391.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-2391", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/2xxx/CVE-2019-2392.json b/2019/2xxx/CVE-2019-2392.json new file mode 100644 index 00000000000..a953be2602c --- /dev/null +++ b/2019/2xxx/CVE-2019-2392.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-2392", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/2xxx/CVE-2019-2393.json b/2019/2xxx/CVE-2019-2393.json new file mode 100644 index 00000000000..6c297addd0d --- /dev/null +++ b/2019/2xxx/CVE-2019-2393.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-2393", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/2xxx/CVE-2019-2394.json b/2019/2xxx/CVE-2019-2394.json new file mode 100644 index 00000000000..5ca36d670e5 --- /dev/null +++ b/2019/2xxx/CVE-2019-2394.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-2394", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}