"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:40:47 +00:00
parent 8f93ccae57
commit c14f1b68f9
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
51 changed files with 3600 additions and 3600 deletions

View File

@ -57,16 +57,16 @@
"refsource": "ISS",
"url": "http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20759"
},
{
"name" : "Q326322",
"refsource" : "MSKB",
"url" : "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q326322"
},
{
"name": "MS02-037",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-037"
},
{
"name": "Q326322",
"refsource": "MSKB",
"url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q326322"
},
{
"name": "exchange-imc-ehlo-bo(9658)",
"refsource": "XF",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "4912",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4912"
},
{
"name": "20020601 BadBlue Web Server v1.7.0 Directory Contents Disclosure",
"refsource": "BUGTRAQ",
@ -61,11 +66,6 @@
"name": "badblue-directory-contents-disclosure(9239)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9239.php"
},
{
"name" : "4912",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/4912"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20021024 [SecurityOffice] Liteserve Web Server v2.0 Authorization Bypass Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-10/0372.html"
},
{
"name": "http://www.securityoffice.net/articles/liteserve/",
"refsource": "MISC",
@ -67,6 +62,11 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6042"
},
{
"name": "20021024 [SecurityOffice] Liteserve Web Server v2.0 Authorization Bypass Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-10/0372.html"
},
{
"name": "perception-liteserve-file-access(10468)",
"refsource": "XF",

View File

@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "ftp://platan.vc.cvut.cz/pub/linux/ncpfs/Changes-2.2.6",
"refsource" : "CONFIRM",
"url" : "ftp://platan.vc.cvut.cz/pub/linux/ncpfs/Changes-2.2.6"
},
{
"name": "DSA-665",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-665"
},
{
"name" : "FLSA:152904",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/433927/100/0/threaded"
},
{
"name" : "GLSA-200501-44",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200501-44.xml"
},
{
"name" : "MDKSA-2005:028",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:028"
},
{
"name" : "RHSA-2005:371",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-371.html"
},
{
"name" : "12400",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/12400"
},
{
"name": "13297",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/13297"
},
{
"name": "FLSA:152904",
"refsource": "FEDORA",
"url": "http://www.securityfocus.com/archive/1/433927/100/0/threaded"
},
{
"name": "ftp://platan.vc.cvut.cz/pub/linux/ncpfs/Changes-2.2.6",
"refsource": "CONFIRM",
"url": "ftp://platan.vc.cvut.cz/pub/linux/ncpfs/Changes-2.2.6"
},
{
"name": "MDKSA-2005:028",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:028"
},
{
"name": "12400",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12400"
},
{
"name": "1013019",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1013019"
},
{
"name": "GLSA-200501-44",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200501-44.xml"
},
{
"name": "RHSA-2005:371",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-371.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20050214 Advisory: JPEG EXIF information disclosure",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html"
},
{
"name": "http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt",
"refsource": "MISC",
"url": "http://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt"
},
{
"name": "20050214 Advisory: JPEG EXIF information disclosure",
"refsource": "FULLDISC",
"url": "http://seclists.org/lists/fulldisclosure/2005/Feb/0343.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "12756",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/12756"
},
{
"name": "1013420",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1013420"
},
{
"name": "12756",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12756"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-0759",
"STATE": "PUBLIC"
},
@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "DSA-702",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-702"
},
{
"name" : "RHSA-2005:070",
"refsource" : "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2005-070.html"
},
{
"name" : "SUSE-SA:2005:017",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2005_17_imagemagick.html"
"name": "1013550",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1013550"
},
{
"name": "12875",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12875"
},
{
"name": "SUSE-SA:2005:017",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2005_17_imagemagick.html"
},
{
"name": "oval:org.mitre.oval:def:11022",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11022"
},
{
"name" : "1013550",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1013550"
"name": "RHSA-2005:070",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2005-070.html"
},
{
"name": "DSA-702",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-702"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "14524",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/14524"
},
{
"name": "http://www.mail-archive.com/mathopd%40mathopd.org/msg00272.html",
"refsource": "CONFIRM",
"url": "http://www.mail-archive.com/mathopd%40mathopd.org/msg00272.html"
},
{
"name": "14524",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14524"
}
]
}

View File

@ -62,6 +62,11 @@
"refsource": "CONFIRM",
"url": "http://cvs.sourceforge.net/viewcvs.py/birdblog/birdblog/admin/admincore.php?r1=1.4&r2=1.5"
},
{
"name": "birdblog-admincore-sql-injection(19799)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19799"
},
{
"name": "12880",
"refsource": "BID",
@ -76,11 +81,6 @@
"name": "14676",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14676"
},
{
"name" : "birdblog-admincore-sql-injection(19799)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19799"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111713248227479&w=2"
},
{
"name" : "http://aluigi.altervista.org/adv/t3wmbof-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/t3wmbof-adv.txt"
},
{
"name": "15520",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15520"
},
{
"name": "http://aluigi.altervista.org/adv/t3wmbof-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/t3wmbof-adv.txt"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://pridels0.blogspot.com/2005/12/ezdatabase-vuln.html",
"refsource" : "MISC",
"url" : "http://pridels0.blogspot.com/2005/12/ezdatabase-vuln.html"
},
{
"name": "15908",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15908"
},
{
"name" : "21798",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21798"
"name": "http://pridels0.blogspot.com/2005/12/ezdatabase-vuln.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2005/12/ezdatabase-vuln.html"
},
{
"name": "18043",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18043"
},
{
"name": "21798",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21798"
}
]
}

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "http://pridels0.blogspot.com/2005/12/scoop-xss-vuln.html",
"refsource" : "MISC",
"url" : "http://pridels0.blogspot.com/2005/12/scoop-xss-vuln.html"
"name": "21945",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21945"
},
{
"name": "16014",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16014"
},
{
"name" : "ADV-2005-3041",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/3041"
},
{
"name": "21944",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21944"
},
{
"name" : "21945",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21945"
"name": "ADV-2005-3041",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/3041"
},
{
"name": "http://pridels0.blogspot.com/2005/12/scoop-xss-vuln.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2005/12/scoop-xss-vuln.html"
},
{
"name": "18182",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-0026",
"STATE": "PUBLIC"
},
@ -52,30 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "4942",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4942"
},
{
"name": "20090120 [ANNOUNCE] Apache Jackrabbit 1.5.2 released",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/500196/100/0/threaded"
},
{
"name" : "https://issues.apache.org/jira/browse/JCR-1925",
"refsource" : "CONFIRM",
"url" : "https://issues.apache.org/jira/browse/JCR-1925"
},
{
"name": "http://www.apache.org/dist/jackrabbit/RELEASE-NOTES-1.5.2.txt",
"refsource": "CONFIRM",
"url": "http://www.apache.org/dist/jackrabbit/RELEASE-NOTES-1.5.2.txt"
},
{
"name" : "33360",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33360"
},
{
"name" : "ADV-2009-0177",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0177"
"name": "jackrabbit-search-swr-xss(48110)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48110"
},
{
"name": "33576",
@ -83,14 +78,19 @@
"url": "http://secunia.com/advisories/33576"
},
{
"name" : "4942",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4942"
"name": "https://issues.apache.org/jira/browse/JCR-1925",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/JCR-1925"
},
{
"name" : "jackrabbit-search-swr-xss(48110)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/48110"
"name": "ADV-2009-0177",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0177"
},
{
"name": "33360",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33360"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "250066",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-250066-1"
"name": "ADV-2009-0209",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0209"
},
{
"name": "33398",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33398"
},
{
"name" : "ADV-2009-0209",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0209"
},
{
"name": "solaris-ultrasparct2-dos(48164)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48164"
},
{
"name": "250066",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-250066-1"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.bugzilla.org/security/2.22.6/",
"refsource" : "CONFIRM",
"url" : "http://www.bugzilla.org/security/2.22.6/"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=466692",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=466692"
"name": "FEDORA-2009-2418",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00664.html"
},
{
"name": "FEDORA-2009-2417",
@ -68,19 +63,24 @@
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00687.html"
},
{
"name" : "FEDORA-2009-2418",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00664.html"
},
{
"name" : "33580",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33580"
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=466692",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=466692"
},
{
"name": "34361",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34361"
},
{
"name": "http://www.bugzilla.org/security/2.22.6/",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/2.22.6/"
},
{
"name": "33580",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33580"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-1373",
"STATE": "PUBLIC"
},
@ -52,75 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.pidgin.im/news/security/?id=29",
"refsource" : "CONFIRM",
"url" : "http://www.pidgin.im/news/security/?id=29"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=500488",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=500488"
},
{
"name" : "DSA-1805",
"refsource" : "DEBIAN",
"url" : "http://debian.org/security/2009/dsa-1805"
},
{
"name" : "FEDORA-2009-5552",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00033.html"
},
{
"name" : "FEDORA-2009-5583",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00051.html"
},
{
"name": "FEDORA-2009-5597",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00075.html"
},
{
"name" : "GLSA-200905-07",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200905-07.xml"
},
{
"name" : "MDVSA-2009:140",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:140"
},
{
"name" : "MDVSA-2009:173",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:173"
},
{
"name" : "RHSA-2009:1059",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1059.html"
},
{
"name": "RHSA-2009:1060",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1060.html"
},
{
"name" : "USN-781-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-781-1"
},
{
"name": "USN-781-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-781-2"
},
{
"name" : "35067",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35067"
"name": "RHSA-2009:1059",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1059.html"
},
{
"name": "GLSA-200905-07",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200905-07.xml"
},
{
"name": "oval:org.mitre.oval:def:9005",
@ -128,34 +83,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9005"
},
{
"name" : "oval:org.mitre.oval:def:17722",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17722"
"name": "35067",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35067"
},
{
"name" : "35194",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35194"
},
{
"name" : "35202",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35202"
},
{
"name" : "35188",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35188"
},
{
"name" : "35215",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35215"
},
{
"name" : "35294",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35294"
"name": "FEDORA-2009-5583",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00051.html"
},
{
"name": "35329",
@ -163,9 +98,69 @@
"url": "http://secunia.com/advisories/35329"
},
{
"name" : "35330",
"name": "USN-781-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-781-1"
},
{
"name": "oval:org.mitre.oval:def:17722",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17722"
},
{
"name": "DSA-1805",
"refsource": "DEBIAN",
"url": "http://debian.org/security/2009/dsa-1805"
},
{
"name": "MDVSA-2009:140",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:140"
},
{
"name": "35294",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/35330"
"url": "http://secunia.com/advisories/35294"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=500488",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=500488"
},
{
"name": "35188",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35188"
},
{
"name": "pidgin-xmppsocks5-bo(50682)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50682"
},
{
"name": "35194",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35194"
},
{
"name": "FEDORA-2009-5552",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00033.html"
},
{
"name": "35202",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35202"
},
{
"name": "http://www.pidgin.im/news/security/?id=29",
"refsource": "CONFIRM",
"url": "http://www.pidgin.im/news/security/?id=29"
},
{
"name": "35215",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35215"
},
{
"name": "ADV-2009-1396",
@ -173,9 +168,14 @@
"url": "http://www.vupen.com/english/advisories/2009/1396"
},
{
"name" : "pidgin-xmppsocks5-bo(50682)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50682"
"name": "35330",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35330"
},
{
"name": "MDVSA-2009:173",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:173"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT3613",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3613"
"name": "35308",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35308"
},
{
"name": "APPLE-SA-2009-06-08-1",
@ -68,14 +68,9 @@
"url": "http://www.securityfocus.com/bid/35260"
},
{
"name" : "35308",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35308"
},
{
"name" : "54974",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/54974"
"name": "ADV-2009-1522",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1522"
},
{
"name": "35379",
@ -83,9 +78,14 @@
"url": "http://secunia.com/advisories/35379"
},
{
"name" : "ADV-2009-1522",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/1522"
"name": "54974",
"refsource": "OSVDB",
"url": "http://osvdb.org/54974"
},
{
"name": "http://support.apple.com/kb/HT3613",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3613"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://jeffchannell.com/Joomla/webee-111-multiple-vulnerabilities.html",
"refsource" : "MISC",
"url" : "http://jeffchannell.com/Joomla/webee-111-multiple-vulnerabilities.html"
},
{
"name": "38204",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38204"
},
{
"name": "http://jeffchannell.com/Joomla/webee-111-multiple-vulnerabilities.html",
"refsource": "MISC",
"url": "http://jeffchannell.com/Joomla/webee-111-multiple-vulnerabilities.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2085",
"STATE": "PUBLIC"
},
@ -52,11 +52,31 @@
},
"references": {
"reference_data": [
{
"name": "48794",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48794"
},
{
"name": "48708",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48708"
},
{
"name": "[oss-security] 20120408 CVE request: gajim - code execution and sql injection",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/08/1"
},
{
"name": "GLSA-201208-04",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201208-04.xml"
},
{
"name": "https://trac.gajim.org/ticket/7031",
"refsource": "CONFIRM",
"url": "https://trac.gajim.org/ticket/7031"
},
{
"name": "[oss-security] 20120408 Re: CVE request: gajim - code execution and sql injection",
"refsource": "MLIST",
@ -67,30 +87,10 @@
"refsource": "CONFIRM",
"url": "https://trac.gajim.org/changeset/bc296e96ac10"
},
{
"name" : "https://trac.gajim.org/ticket/7031",
"refsource" : "CONFIRM",
"url" : "https://trac.gajim.org/ticket/7031"
},
{
"name" : "GLSA-201208-04",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201208-04.xml"
},
{
"name": "52943",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52943"
},
{
"name" : "48708",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48708"
},
{
"name" : "48794",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48794"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2012-2180",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21597090",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21597090"
"name": "db2-drdaconnection-dos(75418)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75418"
},
{
"name": "IC82234",
@ -63,9 +63,9 @@
"url": "http://www.ibm.com/support/docview.wss?uid=swg1IC82234"
},
{
"name" : "IC82367",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1IC82367"
"name": "http://www.ibm.com/support/docview.wss?uid=swg21597090",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21597090"
},
{
"name": "53873",
@ -73,9 +73,9 @@
"url": "http://www.securityfocus.com/bid/53873"
},
{
"name" : "db2-drdaconnection-dos(75418)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75418"
"name": "IC82367",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=swg1IC82367"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.plixer.com/Press-Releases/plixer-releases-9-5-2.html",
"refsource" : "MISC",
"url" : "http://www.plixer.com/Press-Releases/plixer-releases-9-5-2.html"
},
{
"name": "https://www.trustwave.com/spiderlabs/advisories/TWSL2012-014.txt",
"refsource": "MISC",
"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2012-014.txt"
},
{
"name": "http://www.plixer.com/Press-Releases/plixer-releases-9-5-2.html",
"refsource": "MISC",
"url": "http://www.plixer.com/Press-Releases/plixer-releases-9-5-2.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-3127",
"STATE": "PUBLIC"
},
@ -52,6 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "solaris-sctp7p-dos(77044)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77044"
},
{
"name": "54510",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/54510"
},
{
"name": "1027274",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027274"
},
{
"name": "83937",
"refsource": "OSVDB",
"url": "http://osvdb.org/83937"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"refsource": "CONFIRM",
@ -61,26 +81,6 @@
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name" : "54510",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/54510"
},
{
"name" : "83937",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/83937"
},
{
"name" : "1027274",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1027274"
},
{
"name" : "solaris-sctp7p-dos(77044)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/77044"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3385",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20120702 CVE #'s for WordPress 3.4.1 release",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/07/02/1"
},
{
"name": "[oss-security] 20120707 Re: CVE #'s for WordPress 3.4.1 release",
"refsource": "MLIST",
@ -66,6 +61,11 @@
"name": "http://codex.wordpress.org/Version_3.4.1",
"refsource": "CONFIRM",
"url": "http://codex.wordpress.org/Version_3.4.1"
},
{
"name": "[oss-security] 20120702 CVE #'s for WordPress 3.4.1 release",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/02/1"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://codex.wordpress.org/Version_3.3.3",
"refsource" : "CONFIRM",
"url" : "http://codex.wordpress.org/Version_3.3.3"
},
{
"name": "https://core.trac.wordpress.org/changeset/21086",
"refsource": "CONFIRM",
"url": "https://core.trac.wordpress.org/changeset/21086"
},
{
"name": "http://codex.wordpress.org/Version_3.3.3",
"refsource": "CONFIRM",
"url": "http://codex.wordpress.org/Version_3.3.3"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-5210",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20151013 [CVE-2015-5210] Unvalidated Redirects and Forwards using targetURI parameter can enable phishing exploits",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/10/13/4"
},
{
"name": "https://cwiki.apache.org/confluence/display/AMBARI/Ambari+Vulnerabilities",
"refsource": "CONFIRM",
"url": "https://cwiki.apache.org/confluence/display/AMBARI/Ambari+Vulnerabilities"
},
{
"name": "[oss-security] 20151013 [CVE-2015-5210] Unvalidated Redirects and Forwards using targetURI parameter can enable phishing exploits",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/10/13/4"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2015-5448",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04863562",
"refsource" : "CONFIRM",
"url" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04863562"
},
{
"name": "77303",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "1033957",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033957"
},
{
"name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04863562",
"refsource": "CONFIRM",
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04863562"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-5615",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://kb.juniper.net/JSA10770",
"refsource" : "CONFIRM",
"url" : "https://kb.juniper.net/JSA10770"
},
{
"name": "98750",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98750"
},
{
"name": "https://kb.juniper.net/JSA10770",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA10770"
}
]
}

View File

@ -80,9 +80,9 @@
"references": {
"reference_data": [
{
"name" : "https://kb.juniper.net/JSA10781",
"refsource" : "CONFIRM",
"url" : "https://kb.juniper.net/JSA10781"
"name": "1038253",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038253"
},
{
"name": "97615",
@ -90,9 +90,9 @@
"url": "http://www.securityfocus.com/bid/97615"
},
{
"name" : "1038253",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038253"
"name": "https://kb.juniper.net/JSA10781",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA10781"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20180523 PHP Login & User Management <= 4.1.0 - Arbitrary File Upload (CVE-2018-11392)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/542038/100/0/threaded"
"name": "https://doddsecurity.com/94/remote-code-execution-in-the-avatars/",
"refsource": "MISC",
"url": "https://doddsecurity.com/94/remote-code-execution-in-the-avatars/"
},
{
"name": "http://packetstormsecurity.com/files/147878/PHP-Login-And-User-Management-4.1.0-Shell-Upload.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/147878/PHP-Login-And-User-Management-4.1.0-Shell-Upload.html"
},
{
"name" : "https://doddsecurity.com/94/remote-code-execution-in-the-avatars/",
"refsource" : "MISC",
"url" : "https://doddsecurity.com/94/remote-code-execution-in-the-avatars/"
},
{
"name": "https://codecanyon.net/item/php-login-user-management/49008",
"refsource": "CONFIRM",
"url": "https://codecanyon.net/item/php-login-user-management/49008"
},
{
"name": "20180523 PHP Login & User Management <= 4.1.0 - Arbitrary File Upload (CVE-2018-11392)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/542038/100/0/threaded"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "45206",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45206/"
},
{
"name": "https://hackpuntes.com/cve-2018-15571-wordpress-plugin-export-users-to-csv-1-1-1-csv-injection/",
"refsource": "MISC",
"url": "https://hackpuntes.com/cve-2018-15571-wordpress-plugin-export-users-to-csv-1-1-1-csv-injection/"
},
{
"name": "45206",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45206/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "secure@dell.com",
"ASSIGNER": "security_alert@emc.com",
"DATE_PUBLIC": "2018-12-03T00:00:00.000Z",
"ID": "CVE-2018-15797",
"STATE": "PUBLIC",

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1041809",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041809"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "105441",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105441"
},
{
"name" : "1041809",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041809"
}
]
}

View File

@ -65,6 +65,26 @@
},
"references": {
"reference_data": [
{
"name": "USN-3799-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3799-2/"
},
{
"name": "1041888",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041888"
},
{
"name": "RHSA-2018:3655",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3655"
},
{
"name": "USN-3799-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3799-1/"
},
{
"name": "[debian-lts-announce] 20181105 [SECURITY] [DLA 1566-1] mysql-5.5 security update",
"refsource": "MLIST",
@ -80,30 +100,10 @@
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181018-0002/"
},
{
"name" : "RHSA-2018:3655",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3655"
},
{
"name" : "USN-3799-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3799-1/"
},
{
"name" : "USN-3799-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3799-2/"
},
{
"name": "105610",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105610"
},
{
"name" : "1041888",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041888"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://hackerone.com/reports/383117",
"refsource" : "MISC",
"url" : "https://hackerone.com/reports/383117"
},
{
"name": "https://nextcloud.com/security/advisory/?id=NC-SA-2018-008",
"refsource": "CONFIRM",
"url": "https://nextcloud.com/security/advisory/?id=NC-SA-2018-008"
},
{
"name": "https://hackerone.com/reports/383117",
"refsource": "MISC",
"url": "https://hackerone.com/reports/383117"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8511",
"STATE": "PUBLIC"
},
@ -71,11 +71,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8511",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8511"
},
{
"name": "105471",
"refsource": "BID",
@ -85,6 +80,11 @@
"name": "1041825",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041825"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8511",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8511"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8596",
"STATE": "PUBLIC"
},
@ -221,15 +221,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8596",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8596"
},
{
"name": "106086",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106086"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8596",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8596"
}
]
}