mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
b16fcbc290
commit
be852590e4
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020318 Javascript loop causes IE to crash",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://online.securityfocus.com/archive/1/262994"
|
||||
},
|
||||
{
|
||||
"name": "4322",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/4322"
|
||||
},
|
||||
{
|
||||
"name": "20020318 Javascript loop causes IE to crash",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://online.securityfocus.com/archive/1/262994"
|
||||
},
|
||||
{
|
||||
"name": "ie-javascript-dos(8488)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,11 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "win-execute-permissions-16bit(10132)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/10132.php"
|
||||
},
|
||||
{
|
||||
"name": "20020918 Execution Rights Not Checked Correctly For 16-bit Applications",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0211.html"
|
||||
},
|
||||
{
|
||||
"name": "5740",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5740"
|
||||
},
|
||||
{
|
||||
"name": "http://www.abtrusion.com/msexe16.asp",
|
||||
"refsource": "MISC",
|
||||
@ -66,16 +76,6 @@
|
||||
"name": "319458",
|
||||
"refsource": "MSKB",
|
||||
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];319458"
|
||||
},
|
||||
{
|
||||
"name" : "5740",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/5740"
|
||||
},
|
||||
{
|
||||
"name" : "win-execute-permissions-16bit(10132)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/10132.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2005-0171",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050219 pMachine Pro / pMachine Free Remote Code Execution",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://marc.info/?l=full-disclosure&m=110883604531802&w=2"
|
||||
},
|
||||
{
|
||||
"name": "12597",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "15473",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15473"
|
||||
},
|
||||
{
|
||||
"name": "20050219 pMachine Pro / pMachine Free Remote Code Execution",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://marc.info/?l=full-disclosure&m=110883604531802&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.stalker.com/CommuniGatePro/History.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.stalker.com/CommuniGatePro/History.html"
|
||||
"name": "14604",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14604"
|
||||
},
|
||||
{
|
||||
"name": "15257",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.osvdb.org/15257"
|
||||
},
|
||||
{
|
||||
"name" : "14604",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/14604"
|
||||
"name": "http://www.stalker.com/CommuniGatePro/History.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.stalker.com/CommuniGatePro/History.html"
|
||||
},
|
||||
{
|
||||
"name": "communigatepro-list-dos(19961)",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[mnemo] 20050422 Mnemo 1.1.4 (final)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.horde.org/archives/mnemo/Week-of-Mon-20050418/000166.html"
|
||||
},
|
||||
{
|
||||
"name": "http://cvs.horde.org/diff.php/mnemo/docs/CHANGES?r1=1.4.2.31&r2=1.4.2.33&ty=h",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cvs.horde.org/diff.php/mnemo/docs/CHANGES?r1=1.4.2.31&r2=1.4.2.33&ty=h"
|
||||
},
|
||||
{
|
||||
"name": "[mnemo] 20050422 Mnemo 1.1.4 (final)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.horde.org/archives/mnemo/Week-of-Mon-20050418/000166.html"
|
||||
},
|
||||
{
|
||||
"name": "15078",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "15150",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15150"
|
||||
},
|
||||
{
|
||||
"name": "20050511 [Scan Associates Advisory] Neteyes Nexusway multiple vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111585017832066&w=2"
|
||||
},
|
||||
{
|
||||
"name": "nexusway-web-command-execution(20557)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20557"
|
||||
},
|
||||
{
|
||||
"name": "20050510 [Scan Associates Advisory] Neteyes Nexusway multiple vulnerability",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-May/033945.html"
|
||||
},
|
||||
{
|
||||
"name" : "16448",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/16448"
|
||||
},
|
||||
{
|
||||
"name": "16449",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/16449"
|
||||
},
|
||||
{
|
||||
"name" : "15150",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/15150"
|
||||
},
|
||||
{
|
||||
"name" : "nexusway-web-command-execution(20557)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20557"
|
||||
"name": "16448",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/16448"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050607 [AppSecInc Advisory WEBSP05-V0098] Remote Buffer overflow in WebSphere Application Server Administrative Console",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=111817727120752&w=2"
|
||||
"name": "17041",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/17041"
|
||||
},
|
||||
{
|
||||
"name": "15598",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15598/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.appsecinc.com/resources/alerts/general/WEBSPHERE-001.html",
|
||||
@ -68,14 +73,9 @@
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24009775"
|
||||
},
|
||||
{
|
||||
"name" : "17041",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/17041"
|
||||
},
|
||||
{
|
||||
"name" : "15598",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/15598/"
|
||||
"name": "20050607 [AppSecInc Advisory WEBSP05-V0098] Remote Buffer overflow in WebSphere Application Server Administrative Console",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111817727120752&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "mimesweeper-attachment-filter-bypass(23867)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23867"
|
||||
},
|
||||
{
|
||||
"name": "20051220 Digital Armaments Security Advisory 12.20.2005: WEBsweeper/MIMEsweeper Executable File Content Check bypass Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "15982",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/15982/"
|
||||
},
|
||||
{
|
||||
"name" : "mimesweeper-attachment-filter-bypass(23867)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23867"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://marc.info/?l=full-disclosure&m=113532633229270&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "16048",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/16048"
|
||||
"name": "oracle-forum-portlet-obtain-information(23813)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23813"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-3085",
|
||||
@ -72,15 +72,15 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1015406"
|
||||
},
|
||||
{
|
||||
"name": "16048",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/16048"
|
||||
},
|
||||
{
|
||||
"name": "297",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/297"
|
||||
},
|
||||
{
|
||||
"name" : "oracle-forum-portlet-obtain-information(23813)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23813"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2009-0192",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "34160",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34160"
|
||||
},
|
||||
{
|
||||
"name": "http://www.novell.com/support/viewContent.do?externalId=3426981",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.novell.com/support/viewContent.do?externalId=3426981"
|
||||
},
|
||||
{
|
||||
"name": "edirectory-imonitor-acceptlanguage-bo(51703)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51703"
|
||||
},
|
||||
{
|
||||
"name": "20090714 Secunia Research: Novell eDirectory iMonitor \"Accept-Language\" Buffer Overflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -63,34 +78,19 @@
|
||||
"url": "http://secunia.com/secunia_research/2009-13/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.novell.com/support/viewContent.do?externalId=3426981",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.novell.com/support/viewContent.do?externalId=3426981"
|
||||
"name": "55847",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/55847"
|
||||
},
|
||||
{
|
||||
"name": "35666",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/35666"
|
||||
},
|
||||
{
|
||||
"name" : "55847",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/55847"
|
||||
},
|
||||
{
|
||||
"name" : "34160",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/34160"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1883",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1883"
|
||||
},
|
||||
{
|
||||
"name" : "edirectory-imonitor-acceptlanguage-bo(51703)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51703"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2009-0226",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,25 +53,25 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090512 Microsoft PowerPoint 4.2 Conversion Filter Stack Overflow",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=789"
|
||||
"name": "34881",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/34881"
|
||||
},
|
||||
{
|
||||
"name": "32428",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32428"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1290",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1290"
|
||||
},
|
||||
{
|
||||
"name": "MS09-017",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017"
|
||||
},
|
||||
{
|
||||
"name" : "TA09-132A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-132A.html"
|
||||
},
|
||||
{
|
||||
"name" : "34881",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/34881"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:6106",
|
||||
"refsource": "OVAL",
|
||||
@ -83,14 +83,14 @@
|
||||
"url": "http://www.securitytracker.com/id?1022205"
|
||||
},
|
||||
{
|
||||
"name" : "32428",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32428"
|
||||
"name": "20090512 Microsoft PowerPoint 4.2 Conversion Filter Stack Overflow",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=789"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-1290",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/1290"
|
||||
"name": "TA09-132A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-132A.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090202 [Wintercore Research WS02-0209] Kaspersky Products Klim5.sys local privilege escalation",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/500606/100/0/threaded"
|
||||
"name": "http://www.reversemode.com/index.php?option=com_content&task=view&id=60&Itemid=1",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.reversemode.com/index.php?option=com_content&task=view&id=60&Itemid=1"
|
||||
},
|
||||
{
|
||||
"name": "http://kartoffel.reversemode.com/downloads/kaspersky_klim5_plugin.zip",
|
||||
@ -63,25 +63,25 @@
|
||||
"url": "http://kartoffel.reversemode.com/downloads/kaspersky_klim5_plugin.zip"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.reversemode.com/index.php?option=com_content&task=view&id=60&Itemid=1",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.reversemode.com/index.php?option=com_content&task=view&id=60&Itemid=1"
|
||||
"name": "1021661",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021661"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wintercore.com/advisories/advisory_W020209.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.wintercore.com/advisories/advisory_W020209.html"
|
||||
},
|
||||
{
|
||||
"name": "20090202 [Wintercore Research WS02-0209] Kaspersky Products Klim5.sys local privilege escalation",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/500606/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "33561",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33561"
|
||||
},
|
||||
{
|
||||
"name" : "1021661",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1021661"
|
||||
},
|
||||
{
|
||||
"name": "33788",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090331 aspWebCalendar Free Edition bug",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/502311/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "aspwebcalendar-calendar-info-disclosure(49885)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49885"
|
||||
},
|
||||
{
|
||||
"name": "20090331 aspWebCalendar Free Edition bug",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/502311/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090403 glFusion <= 1.1.2 COM_applyFilter()/cookies remote blind sql",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=123877379105028&w=2"
|
||||
},
|
||||
{
|
||||
"name": "8347",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -68,9 +63,9 @@
|
||||
"url": "http://retrogod.altervista.org/9sg_glfuso_sql_cookies.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.glfusion.org/wiki/doku.php?id=glfusion:whatsnew",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.glfusion.org/wiki/doku.php?id=glfusion:whatsnew"
|
||||
"name": "34575",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34575"
|
||||
},
|
||||
{
|
||||
"name": "34361",
|
||||
@ -83,14 +78,19 @@
|
||||
"url": "http://osvdb.org/53286"
|
||||
},
|
||||
{
|
||||
"name" : "34575",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/34575"
|
||||
"name": "20090403 glFusion <= 1.1.2 COM_applyFilter()/cookies remote blind sql",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=123877379105028&w=2"
|
||||
},
|
||||
{
|
||||
"name": "glfusion-libsession-sql-injection(49652)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49652"
|
||||
},
|
||||
{
|
||||
"name": "http://www.glfusion.org/wiki/doku.php?id=glfusion:whatsnew",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.glfusion.org/wiki/doku.php?id=glfusion:whatsnew"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090528 [TZO-27-2009] Firefox Denial of Service (Keygen)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/503876/100/0/threaded"
|
||||
"name": "20090528 Re: [TZO-27-2009] Firefox Denial of Service (Keygen)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0263.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=469565",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=469565"
|
||||
},
|
||||
{
|
||||
"name": "firefox-keygen-dos(50838)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50838"
|
||||
},
|
||||
{
|
||||
"name": "20090908 Re: DoS vulnerability in Google Chrome",
|
||||
@ -63,14 +73,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/506328/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20090527 [TZO-27-2009] Firefox Denial of Service (Keygen)",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0247.html"
|
||||
},
|
||||
{
|
||||
"name" : "20090528 Re: [TZO-27-2009] Firefox Denial of Service (Keygen)",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0263.html"
|
||||
"name": "oval:org.mitre.oval:def:5928",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5928"
|
||||
},
|
||||
{
|
||||
"name": "8822",
|
||||
@ -78,14 +83,9 @@
|
||||
"url": "https://www.exploit-db.com/exploits/8822"
|
||||
},
|
||||
{
|
||||
"name" : "http://blog.zoller.lu/2009/04/advisory-firefox-denial-of-service.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blog.zoller.lu/2009/04/advisory-firefox-denial-of-service.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=469565",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=469565"
|
||||
"name": "20090527 [TZO-27-2009] Firefox Denial of Service (Keygen)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0247.html"
|
||||
},
|
||||
{
|
||||
"name": "http://websecurity.com.ua/3194/",
|
||||
@ -98,14 +98,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/35132"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:5928",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5928"
|
||||
"name": "20090528 [TZO-27-2009] Firefox Denial of Service (Keygen)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/503876/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "firefox-keygen-dos(50838)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50838"
|
||||
"name": "http://blog.zoller.lu/2009/04/advisory-firefox-denial-of-service.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.zoller.lu/2009/04/advisory-firefox-denial-of-service.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2009-1973",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,15 +53,25 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
|
||||
"name": "35776",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35776"
|
||||
},
|
||||
{
|
||||
"name": "35687",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/35687"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-1900",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1900"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
|
||||
},
|
||||
{
|
||||
"name": "55890",
|
||||
"refsource": "OSVDB",
|
||||
@ -72,16 +82,6 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1022560"
|
||||
},
|
||||
{
|
||||
"name" : "35776",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/35776"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-1900",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/1900"
|
||||
},
|
||||
{
|
||||
"name": "oracle-db-vpd-unspecified(51757)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,25 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt"
|
||||
},
|
||||
{
|
||||
"name" : "9483",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/9483"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.telepark.com/telepark-web-software/2009/11/09/telepark-wiki-security-fixes/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blog.telepark.com/telepark-web-software/2009/11/09/telepark-wiki-security-fixes/"
|
||||
},
|
||||
{
|
||||
"name" : "60214",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/60214"
|
||||
"name": "9483",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/9483"
|
||||
},
|
||||
{
|
||||
"name": "60215",
|
||||
@ -86,6 +76,16 @@
|
||||
"name": "teleparkwiki-page-comment-security-bypass(54329)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54329"
|
||||
},
|
||||
{
|
||||
"name": "60214",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/60214"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0911-exploits/serenityaudio-overflow.txt"
|
||||
},
|
||||
{
|
||||
"name": "37472",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37472"
|
||||
},
|
||||
{
|
||||
"name": "10226",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -67,11 +72,6 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/60503"
|
||||
},
|
||||
{
|
||||
"name" : "37472",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/37472"
|
||||
},
|
||||
{
|
||||
"name": "serenity-m3u-bo(54430)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,30 +52,30 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014411",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27014411"
|
||||
},
|
||||
{
|
||||
"name": "PK93429",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK93429"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-3367",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3367"
|
||||
},
|
||||
{
|
||||
"name": "37159",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/37159"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg27014411",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014411"
|
||||
},
|
||||
{
|
||||
"name": "37526",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37526"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-3367",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/3367"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20091110 [MORNINGSTAR-2009-02] Multiple security issues in Cute News and UTF-8 Cute News",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/507782/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt"
|
||||
},
|
||||
{
|
||||
"name" : "36971",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/36971"
|
||||
"name": "cutenews-search-xss(54222)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54222"
|
||||
},
|
||||
{
|
||||
"name": "cutenews-index-xss(54220)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54220"
|
||||
},
|
||||
{
|
||||
"name": "http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt"
|
||||
},
|
||||
{
|
||||
"name": "cutenews-lastusername-xss(54219)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54219"
|
||||
},
|
||||
{
|
||||
"name" : "cutenews-search-xss(54222)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54222"
|
||||
"name": "20091110 [MORNINGSTAR-2009-02] Multiple security issues in Cute News and UTF-8 Cute News",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/507782/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "36971",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/36971"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "37359",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37359"
|
||||
},
|
||||
{
|
||||
"name": "20091107 ToutVirtual VirtualIQ Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://www.securenetwork.it/ricerca/advisory/download/SN-2009-02.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securenetwork.it/ricerca/advisory/download/SN-2009-02.txt"
|
||||
},
|
||||
{
|
||||
"name" : "37359",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/37359"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "[oss-security] 20100615 Re: CVE Request - kernel: put_tty_queue NULL pointer deref",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/06/15/5"
|
||||
},
|
||||
{
|
||||
"name": "USN-1000-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1000-1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.kernel.org/show_bug.cgi?id=14605",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.kernel.org/show_bug.cgi?id=14605"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.6",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.6"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20100615 CVE Request - kernel: put_tty_queue NULL pointer deref",
|
||||
"refsource": "MLIST",
|
||||
@ -67,26 +87,11 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/06/15/4"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20100615 Re: CVE Request - kernel: put_tty_queue NULL pointer deref",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2010/06/15/5"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=703625118069f9f8960d356676662d3db5a9d116",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=703625118069f9f8960d356676662d3db5a9d116"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.6",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.6"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.kernel.org/show_bug.cgi?id=14605",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.kernel.org/show_bug.cgi?id=14605"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=559100",
|
||||
"refsource": "CONFIRM",
|
||||
@ -96,11 +101,6 @@
|
||||
"name": "DSA-2094",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2010/dsa-2094"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1000-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1000-1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-2065",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,49 +53,49 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/04/07/1"
|
||||
"name": "http://drupal.org/node/1482144",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/1482144"
|
||||
},
|
||||
{
|
||||
"name": "http://drupal.org/node/1482428",
|
||||
"refsource": "MISC",
|
||||
"url": "http://drupal.org/node/1482428"
|
||||
},
|
||||
{
|
||||
"name": "48405",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/48405"
|
||||
},
|
||||
{
|
||||
"name": "http://drupal.org/node/1482136",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/1482136"
|
||||
},
|
||||
{
|
||||
"name" : "http://drupal.org/node/1482144",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://drupal.org/node/1482144"
|
||||
},
|
||||
{
|
||||
"name" : "http://drupalcode.org/project/languageicons.git/commit/be620bb",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://drupalcode.org/project/languageicons.git/commit/be620bb"
|
||||
},
|
||||
{
|
||||
"name": "http://drupalcode.org/project/languageicons.git/commit/e3f3f1f",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupalcode.org/project/languageicons.git/commit/e3f3f1f"
|
||||
},
|
||||
{
|
||||
"name" : "52499",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/52499"
|
||||
},
|
||||
{
|
||||
"name": "80070",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/80070"
|
||||
},
|
||||
{
|
||||
"name" : "48405",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/48405"
|
||||
"name": "[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/04/07/1"
|
||||
},
|
||||
{
|
||||
"name": "http://drupalcode.org/project/languageicons.git/commit/be620bb",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupalcode.org/project/languageicons.git/commit/be620bb"
|
||||
},
|
||||
{
|
||||
"name": "52499",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/52499"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name": "https://service.sap.com/sap/support/notes/1687910",
|
||||
"refsource": "MISC",
|
||||
@ -67,6 +62,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://scn.sap.com/docs/DOC-8218"
|
||||
},
|
||||
{
|
||||
"name": "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name": "1027052",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-2671",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20120606 CVE request: rack-cache caches sensitive headers (Set-Cookie)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/06/06/4"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20120606 Re: CVE request: rack-cache caches sensitive headers (Set-Cookie)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/06/06/8"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.novell.com/show_bug.cgi?id=763650",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.novell.com/show_bug.cgi?id=763650"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=824520",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=824520"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/rtomayko/rack-cache/blob/master/CHANGES",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/rtomayko/rack-cache/blob/master/CHANGES"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/rtomayko/rack-cache/commit/2e3a64d07daac4c757cc57620f2288e865a09b90",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/rtomayko/rack-cache/commit/2e3a64d07daac4c757cc57620f2288e865a09b90"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/rtomayko/rack-cache/pull/52",
|
||||
"name": "https://github.com/rtomayko/rack-cache/blob/master/CHANGES",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://github.com/rtomayko/rack-cache/pull/52"
|
||||
"url": "https://github.com/rtomayko/rack-cache/blob/master/CHANGES"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2012-8439",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081812.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/rtomayko/rack-cache/pull/52",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/rtomayko/rack-cache/pull/52"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120606 Re: CVE request: rack-cache caches sensitive headers (Set-Cookie)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/06/06/8"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120606 CVE request: rack-cache caches sensitive headers (Set-Cookie)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/06/06/4"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=824520",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=824520"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/windows/1200b/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/windows/1200b/"
|
||||
},
|
||||
{
|
||||
"name": "opera-form-dos(76361)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76361"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/windows/1200b/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/windows/1200b/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2012-3736",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5503",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5503"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2012-09-19-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5503",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5503"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2012-6178",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "18900",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/18900"
|
||||
},
|
||||
{
|
||||
"name": "53617",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "freenac-deviceadd-sql-injection(75763)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75763"
|
||||
},
|
||||
{
|
||||
"name": "18900",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/18900"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://securitytracker.com/id?1027725",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://securitytracker.com/id?1027725"
|
||||
},
|
||||
{
|
||||
"name" : "http://telussecuritylabs.com/threats/show/TSL20121207-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://telussecuritylabs.com/threats/show/TSL20121207-01"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1286",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1286"
|
||||
},
|
||||
{
|
||||
"name" : "https://community.sophos.com/kb/en-us/118424#six",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://community.sophos.com/kb/en-us/118424#six"
|
||||
},
|
||||
{
|
||||
"name" : "https://lock.cmpxchg8b.com/sophailv2.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://lock.cmpxchg8b.com/sophailv2.pdf"
|
||||
},
|
||||
{
|
||||
"name": "https://nakedsecurity.sophos.com/2012/11/05/tavis-ormandy-sophos/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://nakedsecurity.sophos.com/2012/11/05/tavis-ormandy-sophos/"
|
||||
},
|
||||
{
|
||||
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10205",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10205"
|
||||
"name": "GLSA-201709-24",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201709-24"
|
||||
},
|
||||
{
|
||||
"name": "https://community.sophos.com/kb/en-us/118424#six",
|
||||
"refsource": "MISC",
|
||||
"url": "https://community.sophos.com/kb/en-us/118424#six"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201708-05",
|
||||
@ -93,14 +78,29 @@
|
||||
"url": "https://security.gentoo.org/glsa/201708-05"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201709-24",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201709-24"
|
||||
"name": "https://lock.cmpxchg8b.com/sophailv2.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "https://lock.cmpxchg8b.com/sophailv2.pdf"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201804-16",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201804-16"
|
||||
},
|
||||
{
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10205",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10205"
|
||||
},
|
||||
{
|
||||
"name": "http://telussecuritylabs.com/threats/show/TSL20121207-01",
|
||||
"refsource": "MISC",
|
||||
"url": "http://telussecuritylabs.com/threats/show/TSL20121207-01"
|
||||
},
|
||||
{
|
||||
"name": "http://securitytracker.com/id?1027725",
|
||||
"refsource": "MISC",
|
||||
"url": "http://securitytracker.com/id?1027725"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2015-5222",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-5841",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,31 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1033609",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033609"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205212",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205212"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205213",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205213"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT205267",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT205267"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-09-16-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-09-21-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-09-30-3",
|
||||
"refsource": "APPLE",
|
||||
@ -88,9 +73,24 @@
|
||||
"url": "http://www.securityfocus.com/bid/76764"
|
||||
},
|
||||
{
|
||||
"name" : "1033609",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033609"
|
||||
"name": "https://support.apple.com/HT205267",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205267"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-09-21-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205213",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205213"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-09-16-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://www.manageengine.com/products/applications_manager/issues.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.manageengine.com/products/applications_manager/issues.html"
|
||||
"name": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-11808.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-11808.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/kactrosN/publicdisclosures",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "https://github.com/kactrosN/publicdisclosures"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-11808.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2018-11808.html"
|
||||
"name": "https://www.manageengine.com/products/applications_manager/issues.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.manageengine.com/products/applications_manager/issues.html"
|
||||
},
|
||||
{
|
||||
"name": "104467",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1041809",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041809"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "105437",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105437"
|
||||
},
|
||||
{
|
||||
"name" : "1041809",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041809"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "104911",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104911"
|
||||
},
|
||||
{
|
||||
"name": "[ignite-dev] 20180719 [CVE-2018-8018] Possible Execution of Arbitrary Code via Apache Ignite GridClientJdkMarshaller",
|
||||
"refsource": "MLIST",
|
||||
@ -65,11 +70,6 @@
|
||||
"name": "RHSA-2018:3768",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3768"
|
||||
},
|
||||
{
|
||||
"name" : "104911",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/104911"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20180319 [CVE-2018-8048] Loofah XSS Vulnerability",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2018/03/19/5"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/flavorjones/loofah/issues/144",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/flavorjones/loofah/issues/144"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20180319 [CVE-2018-8048] Loofah XSS Vulnerability",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2018/03/19/5"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4171",
|
||||
"refsource": "DEBIAN",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "Secure@Microsoft.com",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2018-8359",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8359"
|
||||
},
|
||||
{
|
||||
"name" : "104990",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/104990"
|
||||
},
|
||||
{
|
||||
"name": "1041457",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041457"
|
||||
},
|
||||
{
|
||||
"name": "104990",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104990"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "Secure@Microsoft.com",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2018-8575",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user