"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:51:06 +00:00
parent b16fcbc290
commit be852590e4
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 3797 additions and 3797 deletions

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20020318 Javascript loop causes IE to crash",
"refsource" : "BUGTRAQ",
"url" : "http://online.securityfocus.com/archive/1/262994"
},
{
"name": "4322",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4322"
},
{
"name": "20020318 Javascript loop causes IE to crash",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/262994"
},
{
"name": "ie-javascript-dos(8488)",
"refsource": "XF",

View File

@ -52,11 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "win-execute-permissions-16bit(10132)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10132.php"
},
{
"name": "20020918 Execution Rights Not Checked Correctly For 16-bit Applications",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0211.html"
},
{
"name": "5740",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5740"
},
{
"name": "http://www.abtrusion.com/msexe16.asp",
"refsource": "MISC",
@ -66,16 +76,6 @@
"name": "319458",
"refsource": "MSKB",
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];319458"
},
{
"name" : "5740",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/5740"
},
{
"name" : "win-execute-permissions-16bit(10132)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/10132.php"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2005-0171",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20050219 pMachine Pro / pMachine Free Remote Code Execution",
"refsource" : "FULLDISC",
"url" : "http://marc.info/?l=full-disclosure&m=110883604531802&w=2"
},
{
"name": "12597",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "15473",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15473"
},
{
"name": "20050219 pMachine Pro / pMachine Free Remote Code Execution",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=110883604531802&w=2"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.stalker.com/CommuniGatePro/History.html",
"refsource" : "CONFIRM",
"url" : "http://www.stalker.com/CommuniGatePro/History.html"
"name": "14604",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14604"
},
{
"name": "15257",
@ -63,9 +63,9 @@
"url": "http://www.osvdb.org/15257"
},
{
"name" : "14604",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/14604"
"name": "http://www.stalker.com/CommuniGatePro/History.html",
"refsource": "CONFIRM",
"url": "http://www.stalker.com/CommuniGatePro/History.html"
},
{
"name": "communigatepro-list-dos(19961)",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[mnemo] 20050422 Mnemo 1.1.4 (final)",
"refsource" : "MLIST",
"url" : "http://lists.horde.org/archives/mnemo/Week-of-Mon-20050418/000166.html"
},
{
"name": "http://cvs.horde.org/diff.php/mnemo/docs/CHANGES?r1=1.4.2.31&r2=1.4.2.33&ty=h",
"refsource": "CONFIRM",
"url": "http://cvs.horde.org/diff.php/mnemo/docs/CHANGES?r1=1.4.2.31&r2=1.4.2.33&ty=h"
},
{
"name": "[mnemo] 20050422 Mnemo 1.1.4 (final)",
"refsource": "MLIST",
"url": "http://lists.horde.org/archives/mnemo/Week-of-Mon-20050418/000166.html"
},
{
"name": "15078",
"refsource": "SECUNIA",

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "15150",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15150"
},
{
"name": "20050511 [Scan Associates Advisory] Neteyes Nexusway multiple vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111585017832066&w=2"
},
{
"name": "nexusway-web-command-execution(20557)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20557"
},
{
"name": "20050510 [Scan Associates Advisory] Neteyes Nexusway multiple vulnerability",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-May/033945.html"
},
{
"name" : "16448",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/16448"
},
{
"name": "16449",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/16449"
},
{
"name" : "15150",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/15150"
},
{
"name" : "nexusway-web-command-execution(20557)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20557"
"name": "16448",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/16448"
}
]
}

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20050607 [AppSecInc Advisory WEBSP05-V0098] Remote Buffer overflow in WebSphere Application Server Administrative Console",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=111817727120752&w=2"
"name": "17041",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/17041"
},
{
"name": "15598",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15598/"
},
{
"name": "http://www.appsecinc.com/resources/alerts/general/WEBSPHERE-001.html",
@ -68,14 +73,9 @@
"url": "http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24009775"
},
{
"name" : "17041",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/17041"
},
{
"name" : "15598",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/15598/"
"name": "20050607 [AppSecInc Advisory WEBSP05-V0098] Remote Buffer overflow in WebSphere Application Server Administrative Console",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111817727120752&w=2"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "mimesweeper-attachment-filter-bypass(23867)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23867"
},
{
"name": "20051220 Digital Armaments Security Advisory 12.20.2005: WEBsweeper/MIMEsweeper Executable File Content Check bypass Vulnerability",
"refsource": "BUGTRAQ",
@ -66,11 +71,6 @@
"name": "15982",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15982/"
},
{
"name" : "mimesweeper-attachment-filter-bypass(23867)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23867"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "http://marc.info/?l=full-disclosure&m=113532633229270&w=2"
},
{
"name" : "16048",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16048"
"name": "oracle-forum-portlet-obtain-information(23813)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23813"
},
{
"name": "ADV-2005-3085",
@ -72,15 +72,15 @@
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015406"
},
{
"name": "16048",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16048"
},
{
"name": "297",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/297"
},
{
"name" : "oracle-forum-portlet-obtain-information(23813)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23813"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2009-0192",
"STATE": "PUBLIC"
},
@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "34160",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34160"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=3426981",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/viewContent.do?externalId=3426981"
},
{
"name": "edirectory-imonitor-acceptlanguage-bo(51703)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51703"
},
{
"name": "20090714 Secunia Research: Novell eDirectory iMonitor \"Accept-Language\" Buffer Overflow",
"refsource": "BUGTRAQ",
@ -63,34 +78,19 @@
"url": "http://secunia.com/secunia_research/2009-13/"
},
{
"name" : "http://www.novell.com/support/viewContent.do?externalId=3426981",
"refsource" : "CONFIRM",
"url" : "http://www.novell.com/support/viewContent.do?externalId=3426981"
"name": "55847",
"refsource": "OSVDB",
"url": "http://osvdb.org/55847"
},
{
"name": "35666",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35666"
},
{
"name" : "55847",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/55847"
},
{
"name" : "34160",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34160"
},
{
"name": "ADV-2009-1883",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1883"
},
{
"name" : "edirectory-imonitor-acceptlanguage-bo(51703)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51703"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2009-0226",
"STATE": "PUBLIC"
},
@ -53,25 +53,25 @@
"references": {
"reference_data": [
{
"name" : "20090512 Microsoft PowerPoint 4.2 Conversion Filter Stack Overflow",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=789"
"name": "34881",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34881"
},
{
"name": "32428",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32428"
},
{
"name": "ADV-2009-1290",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1290"
},
{
"name": "MS09-017",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017"
},
{
"name" : "TA09-132A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-132A.html"
},
{
"name" : "34881",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/34881"
},
{
"name": "oval:org.mitre.oval:def:6106",
"refsource": "OVAL",
@ -83,14 +83,14 @@
"url": "http://www.securitytracker.com/id?1022205"
},
{
"name" : "32428",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32428"
"name": "20090512 Microsoft PowerPoint 4.2 Conversion Filter Stack Overflow",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=789"
},
{
"name" : "ADV-2009-1290",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/1290"
"name": "TA09-132A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-132A.html"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20090202 [Wintercore Research WS02-0209] Kaspersky Products Klim5.sys local privilege escalation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/500606/100/0/threaded"
"name": "http://www.reversemode.com/index.php?option=com_content&task=view&id=60&Itemid=1",
"refsource": "MISC",
"url": "http://www.reversemode.com/index.php?option=com_content&task=view&id=60&Itemid=1"
},
{
"name": "http://kartoffel.reversemode.com/downloads/kaspersky_klim5_plugin.zip",
@ -63,25 +63,25 @@
"url": "http://kartoffel.reversemode.com/downloads/kaspersky_klim5_plugin.zip"
},
{
"name" : "http://www.reversemode.com/index.php?option=com_content&task=view&id=60&Itemid=1",
"refsource" : "MISC",
"url" : "http://www.reversemode.com/index.php?option=com_content&task=view&id=60&Itemid=1"
"name": "1021661",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021661"
},
{
"name": "http://www.wintercore.com/advisories/advisory_W020209.html",
"refsource": "MISC",
"url": "http://www.wintercore.com/advisories/advisory_W020209.html"
},
{
"name": "20090202 [Wintercore Research WS02-0209] Kaspersky Products Klim5.sys local privilege escalation",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/500606/100/0/threaded"
},
{
"name": "33561",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33561"
},
{
"name" : "1021661",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021661"
},
{
"name": "33788",
"refsource": "SECUNIA",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20090331 aspWebCalendar Free Edition bug",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/502311/100/0/threaded"
},
{
"name": "aspwebcalendar-calendar-info-disclosure(49885)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49885"
},
{
"name": "20090331 aspWebCalendar Free Edition bug",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/502311/100/0/threaded"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20090403 glFusion <= 1.1.2 COM_applyFilter()/cookies remote blind sql",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=123877379105028&w=2"
},
{
"name": "8347",
"refsource": "EXPLOIT-DB",
@ -68,9 +63,9 @@
"url": "http://retrogod.altervista.org/9sg_glfuso_sql_cookies.html"
},
{
"name" : "http://www.glfusion.org/wiki/doku.php?id=glfusion:whatsnew",
"refsource" : "CONFIRM",
"url" : "http://www.glfusion.org/wiki/doku.php?id=glfusion:whatsnew"
"name": "34575",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34575"
},
{
"name": "34361",
@ -83,14 +78,19 @@
"url": "http://osvdb.org/53286"
},
{
"name" : "34575",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34575"
"name": "20090403 glFusion <= 1.1.2 COM_applyFilter()/cookies remote blind sql",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=123877379105028&w=2"
},
{
"name": "glfusion-libsession-sql-injection(49652)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49652"
},
{
"name": "http://www.glfusion.org/wiki/doku.php?id=glfusion:whatsnew",
"refsource": "CONFIRM",
"url": "http://www.glfusion.org/wiki/doku.php?id=glfusion:whatsnew"
}
]
}

View File

@ -53,9 +53,19 @@
"references": {
"reference_data": [
{
"name" : "20090528 [TZO-27-2009] Firefox Denial of Service (Keygen)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/503876/100/0/threaded"
"name": "20090528 Re: [TZO-27-2009] Firefox Denial of Service (Keygen)",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0263.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=469565",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=469565"
},
{
"name": "firefox-keygen-dos(50838)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50838"
},
{
"name": "20090908 Re: DoS vulnerability in Google Chrome",
@ -63,14 +73,9 @@
"url": "http://www.securityfocus.com/archive/1/506328/100/100/threaded"
},
{
"name" : "20090527 [TZO-27-2009] Firefox Denial of Service (Keygen)",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0247.html"
},
{
"name" : "20090528 Re: [TZO-27-2009] Firefox Denial of Service (Keygen)",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0263.html"
"name": "oval:org.mitre.oval:def:5928",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5928"
},
{
"name": "8822",
@ -78,14 +83,9 @@
"url": "https://www.exploit-db.com/exploits/8822"
},
{
"name" : "http://blog.zoller.lu/2009/04/advisory-firefox-denial-of-service.html",
"refsource" : "MISC",
"url" : "http://blog.zoller.lu/2009/04/advisory-firefox-denial-of-service.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=469565",
"refsource" : "MISC",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=469565"
"name": "20090527 [TZO-27-2009] Firefox Denial of Service (Keygen)",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0247.html"
},
{
"name": "http://websecurity.com.ua/3194/",
@ -98,14 +98,14 @@
"url": "http://www.securityfocus.com/bid/35132"
},
{
"name" : "oval:org.mitre.oval:def:5928",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5928"
"name": "20090528 [TZO-27-2009] Firefox Denial of Service (Keygen)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/503876/100/0/threaded"
},
{
"name" : "firefox-keygen-dos(50838)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50838"
"name": "http://blog.zoller.lu/2009/04/advisory-firefox-denial-of-service.html",
"refsource": "MISC",
"url": "http://blog.zoller.lu/2009/04/advisory-firefox-denial-of-service.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2009-1973",
"STATE": "PUBLIC"
},
@ -53,15 +53,25 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
"name": "35776",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35776"
},
{
"name": "35687",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35687"
},
{
"name": "ADV-2009-1900",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1900"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
},
{
"name": "55890",
"refsource": "OSVDB",
@ -72,16 +82,6 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022560"
},
{
"name" : "35776",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35776"
},
{
"name" : "ADV-2009-1900",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/1900"
},
{
"name": "oracle-db-vpd-unspecified(51757)",
"refsource": "XF",

View File

@ -52,25 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt"
},
{
"name" : "9483",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/9483"
},
{
"name": "http://blog.telepark.com/telepark-web-software/2009/11/09/telepark-wiki-security-fixes/",
"refsource": "CONFIRM",
"url": "http://blog.telepark.com/telepark-web-software/2009/11/09/telepark-wiki-security-fixes/"
},
{
"name" : "60214",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/60214"
"name": "9483",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/9483"
},
{
"name": "60215",
@ -86,6 +76,16 @@
"name": "teleparkwiki-page-comment-security-bypass(54329)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54329"
},
{
"name": "60214",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/60214"
},
{
"name": "http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0911-exploits/serenityaudio-overflow.txt"
},
{
"name": "37472",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37472"
},
{
"name": "10226",
"refsource": "EXPLOIT-DB",
@ -67,11 +72,6 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/60503"
},
{
"name" : "37472",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37472"
},
{
"name": "serenity-m3u-bo(54430)",
"refsource": "XF",

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014411",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014411"
},
{
"name": "PK93429",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK93429"
},
{
"name": "ADV-2009-3367",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3367"
},
{
"name": "37159",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37159"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg27014411",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014411"
},
{
"name": "37526",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37526"
},
{
"name" : "ADV-2009-3367",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/3367"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "20091110 [MORNINGSTAR-2009-02] Multiple security issues in Cute News and UTF-8 Cute News",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/507782/100/0/threaded"
},
{
"name" : "http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt",
"refsource" : "MISC",
"url" : "http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt"
},
{
"name" : "36971",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/36971"
"name": "cutenews-search-xss(54222)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54222"
},
{
"name": "cutenews-index-xss(54220)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54220"
},
{
"name": "http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt",
"refsource": "MISC",
"url": "http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt"
},
{
"name": "cutenews-lastusername-xss(54219)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54219"
},
{
"name" : "cutenews-search-xss(54222)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54222"
"name": "20091110 [MORNINGSTAR-2009-02] Multiple security issues in Cute News and UTF-8 Cute News",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/507782/100/0/threaded"
},
{
"name": "36971",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36971"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "37359",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37359"
},
{
"name": "20091107 ToutVirtual VirtualIQ Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "http://www.securenetwork.it/ricerca/advisory/download/SN-2009-02.txt",
"refsource": "MISC",
"url": "http://www.securenetwork.it/ricerca/advisory/download/SN-2009-02.txt"
},
{
"name" : "37359",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37359"
}
]
}

View File

@ -52,6 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20100615 Re: CVE Request - kernel: put_tty_queue NULL pointer deref",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/15/5"
},
{
"name": "USN-1000-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1000-1"
},
{
"name": "https://bugzilla.kernel.org/show_bug.cgi?id=14605",
"refsource": "CONFIRM",
"url": "https://bugzilla.kernel.org/show_bug.cgi?id=14605"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.6",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.6"
},
{
"name": "[oss-security] 20100615 CVE Request - kernel: put_tty_queue NULL pointer deref",
"refsource": "MLIST",
@ -67,26 +87,11 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/06/15/4"
},
{
"name" : "[oss-security] 20100615 Re: CVE Request - kernel: put_tty_queue NULL pointer deref",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2010/06/15/5"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=703625118069f9f8960d356676662d3db5a9d116",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=703625118069f9f8960d356676662d3db5a9d116"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.6",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.6"
},
{
"name" : "https://bugzilla.kernel.org/show_bug.cgi?id=14605",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.kernel.org/show_bug.cgi?id=14605"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=559100",
"refsource": "CONFIRM",
@ -96,11 +101,6 @@
"name": "DSA-2094",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2094"
},
{
"name" : "USN-1000-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1000-1"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2065",
"STATE": "PUBLIC"
},
@ -53,49 +53,49 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/04/07/1"
"name": "http://drupal.org/node/1482144",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/1482144"
},
{
"name": "http://drupal.org/node/1482428",
"refsource": "MISC",
"url": "http://drupal.org/node/1482428"
},
{
"name": "48405",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48405"
},
{
"name": "http://drupal.org/node/1482136",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/1482136"
},
{
"name" : "http://drupal.org/node/1482144",
"refsource" : "CONFIRM",
"url" : "http://drupal.org/node/1482144"
},
{
"name" : "http://drupalcode.org/project/languageicons.git/commit/be620bb",
"refsource" : "CONFIRM",
"url" : "http://drupalcode.org/project/languageicons.git/commit/be620bb"
},
{
"name": "http://drupalcode.org/project/languageicons.git/commit/e3f3f1f",
"refsource": "CONFIRM",
"url": "http://drupalcode.org/project/languageicons.git/commit/e3f3f1f"
},
{
"name" : "52499",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/52499"
},
{
"name": "80070",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/80070"
},
{
"name" : "48405",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48405"
"name": "[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/07/1"
},
{
"name": "http://drupalcode.org/project/languageicons.git/commit/be620bb",
"refsource": "CONFIRM",
"url": "http://drupalcode.org/project/languageicons.git/commit/be620bb"
},
{
"name": "52499",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52499"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities",
"refsource" : "MISC",
"url" : "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities"
},
{
"name": "https://service.sap.com/sap/support/notes/1687910",
"refsource": "MISC",
@ -67,6 +62,11 @@
"refsource": "CONFIRM",
"url": "http://scn.sap.com/docs/DOC-8218"
},
{
"name": "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities",
"refsource": "MISC",
"url": "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities"
},
{
"name": "1027052",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2671",
"STATE": "PUBLIC"
},
@ -52,45 +52,45 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20120606 CVE request: rack-cache caches sensitive headers (Set-Cookie)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/06/06/4"
},
{
"name" : "[oss-security] 20120606 Re: CVE request: rack-cache caches sensitive headers (Set-Cookie)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/06/06/8"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=763650",
"refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=763650"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=824520",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=824520"
},
{
"name" : "https://github.com/rtomayko/rack-cache/blob/master/CHANGES",
"refsource" : "CONFIRM",
"url" : "https://github.com/rtomayko/rack-cache/blob/master/CHANGES"
},
{
"name": "https://github.com/rtomayko/rack-cache/commit/2e3a64d07daac4c757cc57620f2288e865a09b90",
"refsource": "CONFIRM",
"url": "https://github.com/rtomayko/rack-cache/commit/2e3a64d07daac4c757cc57620f2288e865a09b90"
},
{
"name" : "https://github.com/rtomayko/rack-cache/pull/52",
"name": "https://github.com/rtomayko/rack-cache/blob/master/CHANGES",
"refsource": "CONFIRM",
"url" : "https://github.com/rtomayko/rack-cache/pull/52"
"url": "https://github.com/rtomayko/rack-cache/blob/master/CHANGES"
},
{
"name": "FEDORA-2012-8439",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081812.html"
},
{
"name": "https://github.com/rtomayko/rack-cache/pull/52",
"refsource": "CONFIRM",
"url": "https://github.com/rtomayko/rack-cache/pull/52"
},
{
"name": "[oss-security] 20120606 Re: CVE request: rack-cache caches sensitive headers (Set-Cookie)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/06/06/8"
},
{
"name": "[oss-security] 20120606 CVE request: rack-cache caches sensitive headers (Set-Cookie)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/06/06/4"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=824520",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=824520"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.opera.com/docs/changelogs/windows/1200b/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/windows/1200b/"
},
{
"name": "opera-form-dos(76361)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76361"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/1200b/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/1200b/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2012-3736",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT5503",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5503"
},
{
"name": "APPLE-SA-2012-09-19-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT5503",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5503"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2012-6178",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "18900",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/18900"
},
{
"name": "53617",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "freenac-deviceadd-sql-injection(75763)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75763"
},
{
"name": "18900",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/18900"
}
]
}

View File

@ -52,40 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://securitytracker.com/id?1027725",
"refsource" : "MISC",
"url" : "http://securitytracker.com/id?1027725"
},
{
"name" : "http://telussecuritylabs.com/threats/show/TSL20121207-01",
"refsource" : "MISC",
"url" : "http://telussecuritylabs.com/threats/show/TSL20121207-01"
},
{
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1286",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1286"
},
{
"name" : "https://community.sophos.com/kb/en-us/118424#six",
"refsource" : "MISC",
"url" : "https://community.sophos.com/kb/en-us/118424#six"
},
{
"name" : "https://lock.cmpxchg8b.com/sophailv2.pdf",
"refsource" : "MISC",
"url" : "https://lock.cmpxchg8b.com/sophailv2.pdf"
},
{
"name": "https://nakedsecurity.sophos.com/2012/11/05/tavis-ormandy-sophos/",
"refsource": "MISC",
"url": "https://nakedsecurity.sophos.com/2012/11/05/tavis-ormandy-sophos/"
},
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10205",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10205"
"name": "GLSA-201709-24",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201709-24"
},
{
"name": "https://community.sophos.com/kb/en-us/118424#six",
"refsource": "MISC",
"url": "https://community.sophos.com/kb/en-us/118424#six"
},
{
"name": "GLSA-201708-05",
@ -93,14 +78,29 @@
"url": "https://security.gentoo.org/glsa/201708-05"
},
{
"name" : "GLSA-201709-24",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201709-24"
"name": "https://lock.cmpxchg8b.com/sophailv2.pdf",
"refsource": "MISC",
"url": "https://lock.cmpxchg8b.com/sophailv2.pdf"
},
{
"name": "GLSA-201804-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201804-16"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10205",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10205"
},
{
"name": "http://telussecuritylabs.com/threats/show/TSL20121207-01",
"refsource": "MISC",
"url": "http://telussecuritylabs.com/threats/show/TSL20121207-01"
},
{
"name": "http://securitytracker.com/id?1027725",
"refsource": "MISC",
"url": "http://securitytracker.com/id?1027725"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-5222",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-5841",
"STATE": "PUBLIC"
},
@ -52,31 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "1033609",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033609"
},
{
"name": "https://support.apple.com/HT205212",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205212"
},
{
"name" : "https://support.apple.com/HT205213",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205213"
},
{
"name" : "https://support.apple.com/HT205267",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205267"
},
{
"name" : "APPLE-SA-2015-09-16-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
},
{
"name" : "APPLE-SA-2015-09-21-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html"
},
{
"name": "APPLE-SA-2015-09-30-3",
"refsource": "APPLE",
@ -88,9 +73,24 @@
"url": "http://www.securityfocus.com/bid/76764"
},
{
"name" : "1033609",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033609"
"name": "https://support.apple.com/HT205267",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205267"
},
{
"name": "APPLE-SA-2015-09-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html"
},
{
"name": "https://support.apple.com/HT205213",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205213"
},
{
"name": "APPLE-SA-2015-09-16-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://www.manageengine.com/products/applications_manager/issues.html",
"refsource" : "MISC",
"url" : "https://www.manageengine.com/products/applications_manager/issues.html"
"name": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-11808.html",
"refsource": "CONFIRM",
"url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-11808.html"
},
{
"name": "https://github.com/kactrosN/publicdisclosures",
@ -63,9 +63,9 @@
"url": "https://github.com/kactrosN/publicdisclosures"
},
{
"name" : "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-11808.html",
"refsource" : "CONFIRM",
"url" : "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-11808.html"
"name": "https://www.manageengine.com/products/applications_manager/issues.html",
"refsource": "MISC",
"url": "https://www.manageengine.com/products/applications_manager/issues.html"
},
{
"name": "104467",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1041809",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041809"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "105437",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105437"
},
{
"name" : "1041809",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041809"
}
]
}

View File

@ -56,6 +56,11 @@
},
"references": {
"reference_data": [
{
"name": "104911",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104911"
},
{
"name": "[ignite-dev] 20180719 [CVE-2018-8018] Possible Execution of Arbitrary Code via Apache Ignite GridClientJdkMarshaller",
"refsource": "MLIST",
@ -65,11 +70,6 @@
"name": "RHSA-2018:3768",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3768"
},
{
"name" : "104911",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104911"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20180319 [CVE-2018-8048] Loofah XSS Vulnerability",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2018/03/19/5"
},
{
"name": "https://github.com/flavorjones/loofah/issues/144",
"refsource": "CONFIRM",
"url": "https://github.com/flavorjones/loofah/issues/144"
},
{
"name": "[oss-security] 20180319 [CVE-2018-8048] Loofah XSS Vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2018/03/19/5"
},
{
"name": "DSA-4171",
"refsource": "DEBIAN",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8359",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8359"
},
{
"name" : "104990",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104990"
},
{
"name": "1041457",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041457"
},
{
"name": "104990",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104990"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8575",
"STATE": "PUBLIC"
},