mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
f0aba79321
commit
c59fb07908
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "kerberos4-arbitrary-proxy(5733)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5733"
|
||||
},
|
||||
{
|
||||
"name": "20001208 Vulnerabilities in KTH Kerberos IV",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "20001210 KTH upgrade and FIX",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0105.html"
|
||||
},
|
||||
{
|
||||
"name" : "kerberos4-arbitrary-proxy(5733)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5733"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010122 def-2001-04: Netscape Enterprise Server Dot-DoS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/157641"
|
||||
},
|
||||
{
|
||||
"name": "20010124 iPlanet FastTrack/Enterprise 4.1 DoS clarifications",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=98035833331446&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20010122 def-2001-04: Netscape Enterprise Server Dot-DoS",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/157641"
|
||||
},
|
||||
{
|
||||
"name": "2282",
|
||||
"refsource": "BID",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "alchemy-http-view-log(7630)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7630"
|
||||
},
|
||||
{
|
||||
"name": "20011130 Rapid 7 Advisory R7-0002: Alchemy Eye Remote Unauthenticated Log Viewing",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "3598",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/3598"
|
||||
},
|
||||
{
|
||||
"name" : "alchemy-http-view-log(7630)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7630"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0005.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.jetico.com/index.htm#/linux.htm",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.jetico.com/index.htm#/linux.htm"
|
||||
"name": "2820",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2820"
|
||||
},
|
||||
{
|
||||
"name": "bestcrypt-bctool-gain-privileges(6648)",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6648"
|
||||
},
|
||||
{
|
||||
"name" : "2820",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/2820"
|
||||
"name": "http://www.jetico.com/index.htm#/linux.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.jetico.com/index.htm#/linux.htm"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060503 OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/432863/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060503 Re: OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/432867/100/0/threaded"
|
||||
"name": "http://openvpn.net/man.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://openvpn.net/man.html"
|
||||
},
|
||||
{
|
||||
"name": "20060503 Re: OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/433000/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://openvpn.net/man.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://openvpn.net/man.html"
|
||||
"name": "20060503 Re: OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/432867/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20060503 OpenVPN 2.0.7 and below: Remote OpenVPN Management Interface Flaw",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/432863/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "25660",
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "weblogic-domain-name-disclosure(26468)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26468"
|
||||
},
|
||||
{
|
||||
"name": "BEA06-128.00",
|
||||
"refsource": "BEA",
|
||||
"url": "http://dev2dev.bea.com/pub/advisory/190"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1828",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/1828"
|
||||
},
|
||||
{
|
||||
"name" : "1016097",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016097"
|
||||
},
|
||||
{
|
||||
"name" : "1016099",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016099"
|
||||
},
|
||||
{
|
||||
"name": "20130",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20130"
|
||||
},
|
||||
{
|
||||
"name" : "weblogic-domain-name-disclosure(26468)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26468"
|
||||
"name": "ADV-2006-1828",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/1828"
|
||||
},
|
||||
{
|
||||
"name": "1016099",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016099"
|
||||
},
|
||||
{
|
||||
"name": "1016097",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016097"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "phpsimplechoose-script-xss(26714)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26714"
|
||||
},
|
||||
{
|
||||
"name": "971",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/971"
|
||||
},
|
||||
{
|
||||
"name": "20060524 PHPSimple Choose v0.3",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/435165/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060601 Re: PHPSimple Choose v0.3",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/435684/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2019",
|
||||
"refsource": "VUPEN",
|
||||
@ -73,14 +78,9 @@
|
||||
"url": "http://secunia.com/advisories/20306"
|
||||
},
|
||||
{
|
||||
"name" : "971",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/971"
|
||||
},
|
||||
{
|
||||
"name" : "phpsimplechoose-script-xss(26714)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26714"
|
||||
"name": "20060601 Re: PHPSimple Choose v0.3",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/435684/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,26 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1016181",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016181"
|
||||
},
|
||||
{
|
||||
"name": "20060530 Jiwa Financials - Reporting allows execution of arbitrary reports as SQL user with full permissions.",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/435352/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060602 Re: Jiwa Financials - Reporting allows execution of arbitrary reports as SQL user with full permissions.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/435730/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20060529 Jiwa Financials - Reporting allows execution of arbitrary reports as SQL user with full permissions.",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046398.html"
|
||||
},
|
||||
{
|
||||
"name" : "1016181",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016181"
|
||||
},
|
||||
{
|
||||
"name": "20342",
|
||||
"refsource": "SECUNIA",
|
||||
@ -82,6 +77,11 @@
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1000"
|
||||
},
|
||||
{
|
||||
"name": "20060602 Re: Jiwa Financials - Reporting allows execution of arbitrary reports as SQL user with full permissions.",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/435730/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "jiwa-financials-information-disclosure(26756)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060528 Advisory: tinyBB <= 0.3 Multiple Remote Vulnerabilities.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/435281/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.nukedx.com/?getxpl=33",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.nukedx.com/?getxpl=33"
|
||||
"name": "20356",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20356"
|
||||
},
|
||||
{
|
||||
"name": "http://www.nukedx.com/?viewdoc=33",
|
||||
@ -68,14 +63,9 @@
|
||||
"url": "http://www.nukedx.com/?viewdoc=33"
|
||||
},
|
||||
{
|
||||
"name" : "18147",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18147"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-2035",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/2035"
|
||||
"name": "tinybb-multiple-sql-injection(26826)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26826"
|
||||
},
|
||||
{
|
||||
"name": "1016172",
|
||||
@ -83,9 +73,19 @@
|
||||
"url": "http://securitytracker.com/id?1016172"
|
||||
},
|
||||
{
|
||||
"name" : "20356",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/20356"
|
||||
"name": "18147",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18147"
|
||||
},
|
||||
{
|
||||
"name": "20060528 Advisory: tinyBB <= 0.3 Multiple Remote Vulnerabilities.",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/435281/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2035",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2035"
|
||||
},
|
||||
{
|
||||
"name": "1011",
|
||||
@ -93,9 +93,9 @@
|
||||
"url": "http://securityreason.com/securityalert/1011"
|
||||
},
|
||||
{
|
||||
"name" : "tinybb-multiple-sql-injection(26826)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26826"
|
||||
"name": "http://www.nukedx.com/?getxpl=33",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.nukedx.com/?getxpl=33"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,25 +57,25 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securityfocus.com/data/vulnerabilities/exploits/Tekno.Portal-0601-sql.txt"
|
||||
},
|
||||
{
|
||||
"name" : "18216",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18216"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-2192",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/2192"
|
||||
},
|
||||
{
|
||||
"name": "20464",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20464"
|
||||
},
|
||||
{
|
||||
"name": "18216",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18216"
|
||||
},
|
||||
{
|
||||
"name": "teknoportal-bolum-sql-injection(26990)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26990"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2192",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2192"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2011-2442",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,24 +58,24 @@
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb11-24.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2011:044",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00025.html"
|
||||
"name": "oval:org.mitre.oval:def:14042",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14042"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2011:1239",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2011:044",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2011:1238",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:14042",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14042"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,44 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.likewise.com/community/index.php/forums/viewannounce/1212_6/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.likewise.com/community/index.php/forums/viewannounce/1212_6/"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.launchpad.net/ubuntu/+source/likewise-open/+bug/802748",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.launchpad.net/ubuntu/+source/likewise-open/+bug/802748"
|
||||
},
|
||||
{
|
||||
"name" : "https://launchpadlibrarian.net/74204969/LWSA-2011-002.txt",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://launchpadlibrarian.net/74204969/LWSA-2011-002.txt"
|
||||
"name": "45276",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/45276"
|
||||
},
|
||||
{
|
||||
"name": "USN-1171-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1171-1"
|
||||
},
|
||||
{
|
||||
"name" : "48816",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/48816"
|
||||
},
|
||||
{
|
||||
"name" : "45276",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/45276"
|
||||
},
|
||||
{
|
||||
"name": "45326",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/45326"
|
||||
},
|
||||
{
|
||||
"name": "http://www.likewise.com/community/index.php/forums/viewannounce/1212_6/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.likewise.com/community/index.php/forums/viewannounce/1212_6/"
|
||||
},
|
||||
{
|
||||
"name": "likewise-lsassd-sql-injection(68765)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68765"
|
||||
},
|
||||
{
|
||||
"name": "https://launchpadlibrarian.net/74204969/LWSA-2011-002.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://launchpadlibrarian.net/74204969/LWSA-2011-002.txt"
|
||||
},
|
||||
{
|
||||
"name": "48816",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48816"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.launchpad.net/ubuntu/+source/likewise-open/+bug/802748",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.launchpad.net/ubuntu/+source/likewise-open/+bug/802748"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/windows/1110/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/windows/1110/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/docs/changelogs/mac/1110/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://www.opera.com/docs/changelogs/unix/1110/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/docs/changelogs/unix/1110/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.opera.com/docs/changelogs/windows/1110/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/docs/changelogs/windows/1110/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2011-2813",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,25 +58,15 @@
|
||||
"url": "http://support.apple.com/kb/HT4981"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4999",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4999"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5000",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5000"
|
||||
"name": "APPLE-SA-2011-10-12-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-10-11-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2011-10-12-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-10-12-4",
|
||||
"refsource": "APPLE",
|
||||
@ -87,6 +77,16 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/50066"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4999",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4999"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5000",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5000"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:17444",
|
||||
"refsource": "OVAL",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2011-3117",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://foobla.com/news/latest/obsuggest-1.8-security-release.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://foobla.com/news/latest/obsuggest-1.8-security-release.html"
|
||||
},
|
||||
{
|
||||
"name": "48944",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48944"
|
||||
},
|
||||
{
|
||||
"name": "http://foobla.com/news/latest/obsuggest-1.8-security-release.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://foobla.com/news/latest/obsuggest-1.8-security-release.html"
|
||||
},
|
||||
{
|
||||
"name": "46844",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-0081",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-067"
|
||||
},
|
||||
{
|
||||
"name" : "TA13-253A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-253A"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:19036",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19036"
|
||||
},
|
||||
{
|
||||
"name": "TA13-253A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-0177",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20130118 [CVE-2013-0177] Cross-Site Scripting (XSS) Vulnerability in Apache OFBiz",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2013/Jan/148"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/119673/Apache-OFBiz-Cross-Site-Scripting.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/119673/Apache-OFBiz-Cross-Site-Scripting.html"
|
||||
"name": "89453",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/89453"
|
||||
},
|
||||
{
|
||||
"name": "http://ofbiz.apache.org/download.html#vulnerabilities",
|
||||
@ -68,14 +63,9 @@
|
||||
"url": "http://ofbiz.apache.org/download.html#vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name" : "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432395",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432395"
|
||||
},
|
||||
{
|
||||
"name" : "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432850",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432850"
|
||||
"name": "20130118 [CVE-2013-0177] Cross-Site Scripting (XSS) Vulnerability in Apache OFBiz",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2013/Jan/148"
|
||||
},
|
||||
{
|
||||
"name": "89452",
|
||||
@ -83,9 +73,19 @@
|
||||
"url": "http://osvdb.org/89452"
|
||||
},
|
||||
{
|
||||
"name" : "89453",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/89453"
|
||||
"name": "http://packetstormsecurity.com/files/119673/Apache-OFBiz-Cross-Site-Scripting.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/119673/Apache-OFBiz-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"name": "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432395",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432395"
|
||||
},
|
||||
{
|
||||
"name": "apache-ofbiz-xss(81398)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81398"
|
||||
},
|
||||
{
|
||||
"name": "51812",
|
||||
@ -93,9 +93,9 @@
|
||||
"url": "http://secunia.com/advisories/51812"
|
||||
},
|
||||
{
|
||||
"name" : "apache-ofbiz-xss(81398)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/81398"
|
||||
"name": "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432850",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://fisheye6.atlassian.com/changelog/ofbiz?cs=1432850"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-0544",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-1159",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-1256",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016"
|
||||
},
|
||||
{
|
||||
"name" : "TA13-043B",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16436",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16436"
|
||||
},
|
||||
{
|
||||
"name": "TA13-043B",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2013-1383",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@symantec.com",
|
||||
"ID": "CVE-2013-4678",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2013-5173",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2013-5187",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2013-5195",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/kb/HT6537",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/kb/HT6537"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2013-12-16-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0087.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/kb/HT6537",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT6537"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2013-12-16-2",
|
||||
"refsource": "APPLE",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2014-2161",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0438",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -55,11 +55,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2017-02-01.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2017-02-01.html"
|
||||
},
|
||||
{
|
||||
"name": "96047",
|
||||
"refsource": "BID",
|
||||
@ -69,6 +64,11 @@
|
||||
"name": "1037798",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037798"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2017-02-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-02-01.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0525",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -55,25 +55,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2017-03-01",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2017-03-01"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.codeaurora.org/use-after-free-vulnerability-during-ipa-routing-commit-logic-cve-2017-0525",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.codeaurora.org/use-after-free-vulnerability-during-ipa-routing-commit-logic-cve-2017-0525"
|
||||
},
|
||||
{
|
||||
"name": "96947",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96947"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2017-03-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
||||
},
|
||||
{
|
||||
"name": "1037968",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037968"
|
||||
},
|
||||
{
|
||||
"name": "https://www.codeaurora.org/use-after-free-vulnerability-during-ipa-routing-commit-logic-cve-2017-0525",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.codeaurora.org/use-after-free-vulnerability-during-ipa-routing-commit-logic-cve-2017-0525"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0531",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -55,25 +55,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2017-03-01",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2017-03-01"
|
||||
},
|
||||
{
|
||||
"name": "https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=530f3a0fd837ed105eddaf99810bc13d97dc4302",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=530f3a0fd837ed105eddaf99810bc13d97dc4302"
|
||||
},
|
||||
{
|
||||
"name" : "96743",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/96743"
|
||||
"name": "https://source.android.com/security/bulletin/2017-03-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
||||
},
|
||||
{
|
||||
"name": "1037968",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037968"
|
||||
},
|
||||
{
|
||||
"name": "96743",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96743"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0545",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2017-0646",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.340007",
|
||||
"ID": "CVE-2017-1000126",
|
||||
"REQUESTER": "hanno@hboeck.de",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "exiv2",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "0.26"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : ""
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "Buffer Overflow"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "DSA-4000",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2017/dsa-4000"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1509215",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1509215"
|
||||
},
|
||||
{
|
||||
"name": "https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4000",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2017/dsa-4000"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1509215",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509215"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -54,9 +54,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
|
||||
"name": "1039152",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039152"
|
||||
},
|
||||
{
|
||||
"name": "100367",
|
||||
@ -64,9 +64,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/100367"
|
||||
},
|
||||
{
|
||||
"name" : "1039152",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039152"
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20171104 [SECURITY] [DLA 1160-1] wordpress security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2017/11/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://codex.wordpress.org/Version_4.8.3",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://codex.wordpress.org/Version_4.8.3"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d"
|
||||
},
|
||||
{
|
||||
"name" : "https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/"
|
||||
},
|
||||
{
|
||||
"name" : "https://wpvulndb.com/vulnerabilities/8941",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://wpvulndb.com/vulnerabilities/8941"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4090",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4090"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20171104 [SECURITY] [DLA 1160-1] wordpress security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "101638",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101638"
|
||||
},
|
||||
{
|
||||
"name": "https://wpvulndb.com/vulnerabilities/8941",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpvulndb.com/vulnerabilities/8941"
|
||||
},
|
||||
{
|
||||
"name": "https://codex.wordpress.org/Version_4.8.3",
|
||||
"refsource": "MISC",
|
||||
"url": "https://codex.wordpress.org/Version_4.8.3"
|
||||
},
|
||||
{
|
||||
"name": "https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html"
|
||||
},
|
||||
{
|
||||
"name": "https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4173",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4357",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "42140",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/42140/"
|
||||
"name": "1038526",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038526"
|
||||
},
|
||||
{
|
||||
"name": "https://www.vmware.com/security/advisories/VMSA-2017-0009.html",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/98560"
|
||||
},
|
||||
{
|
||||
"name" : "1038526",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038526"
|
||||
"name": "42140",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/42140/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "45783",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/45783/"
|
||||
},
|
||||
{
|
||||
"name": "20181102 Royal TS/X - Information Disclosure",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2018/Nov/4"
|
||||
},
|
||||
{
|
||||
"name" : "20181105 Re: Royal TS/X - Information Disclosure",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2018/Nov/25"
|
||||
"name": "45783",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45783/"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/150136/Royal-TS-X-Information-Disclosure.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/150136/Royal-TS-X-Information-Disclosure.html"
|
||||
},
|
||||
{
|
||||
"name": "20181105 Re: Royal TS/X - Information Disclosure",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2018/Nov/25"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user