mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
fd614e2e74
commit
ce4c733b5b
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020509 Cisco ATA-186 admin password can be trivially circumvented",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-05/0083.html"
|
||||
"name": "4711",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/4711"
|
||||
},
|
||||
{
|
||||
"name": "cisco-ata-reveal-info(9056)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/9056.php"
|
||||
},
|
||||
{
|
||||
"name": "20020523 ATA-186 Password Disclosure Vulnerability",
|
||||
@ -67,20 +72,15 @@
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/9057.php"
|
||||
},
|
||||
{
|
||||
"name" : "cisco-ata-reveal-info(9056)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/9056.php"
|
||||
},
|
||||
{
|
||||
"name" : "4711",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/4711"
|
||||
},
|
||||
{
|
||||
"name": "4712",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/4712"
|
||||
},
|
||||
{
|
||||
"name": "20020509 Cisco ATA-186 admin password can be trivially circumvented",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-05/0083.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020128 user-mode-linux problems",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-01/0338.html"
|
||||
},
|
||||
{
|
||||
"name": "3973",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "uml-kernel-memory-access(8005)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/8005.php"
|
||||
},
|
||||
{
|
||||
"name": "20020128 user-mode-linux problems",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0338.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.rnp.br/cais/alertas/2002/cais-ALR-19112002a.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.rnp.br/cais/alertas/2002/cais-ALR-19112002a.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.imconf.net/imw-2002/imw2002-papers/198.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.imconf.net/imw-2002/imw2002-papers/198.pdf"
|
||||
},
|
||||
{
|
||||
"name": "VU#457875",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/457875"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kb.cert.org/vuls/id/IAFY-5FDT5K",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kb.cert.org/vuls/id/IAFY-5FDT5K"
|
||||
},
|
||||
{
|
||||
"name" : "VU#457875",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/457875"
|
||||
"name": "http://www.rnp.br/cais/alertas/2002/cais-ALR-19112002a.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.rnp.br/cais/alertas/2002/cais-ALR-19112002a.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20021203 Cross-site Scripting Vulnerability in phpBB 2.0.3",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-12/0053.html"
|
||||
},
|
||||
{
|
||||
"name": "6311",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "phpbb-search-username-xss(10773)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10773"
|
||||
},
|
||||
{
|
||||
"name": "20021203 Cross-site Scripting Vulnerability in phpBB 2.0.3",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-12/0053.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050208 Integer overflow and arbitrary files deletion in RealArcade",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=110792779115794&w=2"
|
||||
"name": "14187",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14187/"
|
||||
},
|
||||
{
|
||||
"name": "1013128",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1013128"
|
||||
},
|
||||
{
|
||||
"name" : "14187",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/14187/"
|
||||
},
|
||||
{
|
||||
"name": "realarcade-rgs-bo(19259)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19259"
|
||||
},
|
||||
{
|
||||
"name": "20050208 Integer overflow and arbitrary files deletion in RealArcade",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=110792779115794&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050407 SGI IRIX gr_osview Information Disclosure Vulnerability",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "http://www.idefense.com/application/poi/display?id=226&type=vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name" : "20050402-01-P",
|
||||
"refsource" : "SGI",
|
||||
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20050402-01-P"
|
||||
},
|
||||
{
|
||||
"name": "15351",
|
||||
"refsource": "OSVDB",
|
||||
@ -72,6 +62,16 @@
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1013662"
|
||||
},
|
||||
{
|
||||
"name": "20050402-01-P",
|
||||
"refsource": "SGI",
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20050402-01-P"
|
||||
},
|
||||
{
|
||||
"name": "20050407 SGI IRIX gr_osview Information Disclosure Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://www.idefense.com/application/poi/display?id=226&type=vulnerabilities"
|
||||
},
|
||||
{
|
||||
"name": "14875",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -53,25 +53,25 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050218 Adobe Reader invalid root page node Count value DOS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=110879063511486&w=2"
|
||||
"name": "14813",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14813"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/techdocs/331468.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/techdocs/331468.html"
|
||||
},
|
||||
{
|
||||
"name": "20050218 Adobe Reader invalid root page node Count value DOS",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=110879063511486&w=2"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-0310",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/0310"
|
||||
},
|
||||
{
|
||||
"name" : "14813",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/14813"
|
||||
},
|
||||
{
|
||||
"name": "adobe-root-page-node-dos(19946)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "GLSA-200504-30",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200504-30.xml"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=88831",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=88831"
|
||||
"name": "16053",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/16053"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-0436",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2005/0436"
|
||||
},
|
||||
{
|
||||
"name" : "16053",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/16053"
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=88831",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=88831"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200504-30",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200504-30.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zataz.net/adviso/shtool-05252005.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zataz.net/adviso/shtool-05252005.txt"
|
||||
"name": "DSA-789",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2005/dsa-789"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:9639",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9639"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=93782",
|
||||
@ -63,19 +68,19 @@
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=93782"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-789",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2005/dsa-789"
|
||||
"name": "15668",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15668"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200506-08",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200506-08.xml"
|
||||
"name": "15496",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15496"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2005:564",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2005-564.html"
|
||||
"name": "1014059",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1014059"
|
||||
},
|
||||
{
|
||||
"name": "13767",
|
||||
@ -88,29 +93,24 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A345"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:9639",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9639"
|
||||
"name": "http://www.zataz.net/adviso/shtool-05252005.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zataz.net/adviso/shtool-05252005.txt"
|
||||
},
|
||||
{
|
||||
"name" : "1014059",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1014059"
|
||||
"name": "RHSA-2005:564",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-564.html"
|
||||
},
|
||||
{
|
||||
"name" : "15496",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/15496"
|
||||
"name": "GLSA-200506-08",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200506-08.xml"
|
||||
},
|
||||
{
|
||||
"name": "OpenPKG-SA-2005.011",
|
||||
"refsource": "OPENPKG",
|
||||
"url": "http://marc.info/?l=bugtraq&m=111955937622637&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "15668",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/15668"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -63,24 +63,24 @@
|
||||
"url": "http://www.securityfocus.com/bid/15899"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2005-2943",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2005/2943"
|
||||
"name": "personals-index-sql-injection(50393)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50393"
|
||||
},
|
||||
{
|
||||
"name": "21783",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/21783"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2005-2943",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2005/2943"
|
||||
},
|
||||
{
|
||||
"name": "18094",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/18094"
|
||||
},
|
||||
{
|
||||
"name" : "personals-index-sql-injection(50393)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50393"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,61 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090122 [TKADV2009-003] GStreamer Heap Overflow and Array Index out of Bounds Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/500317/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20090129 CVE Request -- (sort of urgent) gstreamer-plugins-good (repost) (more details about affected versions -- final version)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2009/01/29/3"
|
||||
},
|
||||
{
|
||||
"name" : "http://trapkit.de/advisories/TKADV2009-003.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://trapkit.de/advisories/TKADV2009-003.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53"
|
||||
},
|
||||
{
|
||||
"name" : "http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=481267",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=481267"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200907-11",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200907-11.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2009:035",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:035"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2009:0271",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0271.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2009:005",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-736-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-736-1"
|
||||
},
|
||||
{
|
||||
"name": "33405",
|
||||
"refsource": "BID",
|
||||
@ -118,29 +63,84 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10306"
|
||||
},
|
||||
{
|
||||
"name" : "33815",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33815"
|
||||
"name": "20090122 [TKADV2009-003] GStreamer Heap Overflow and Array Index out of Bounds Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/500317/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "34336",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34336"
|
||||
},
|
||||
{
|
||||
"name": "33815",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33815"
|
||||
},
|
||||
{
|
||||
"name": "35777",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/35777"
|
||||
},
|
||||
{
|
||||
"name": "http://trapkit.de/advisories/TKADV2009-003.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://trapkit.de/advisories/TKADV2009-003.txt"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2009:0271",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2009-0271.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200907-11",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200907-11.xml"
|
||||
},
|
||||
{
|
||||
"name": "33650",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33650"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-0225",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0225"
|
||||
},
|
||||
{
|
||||
"name" : "33650",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33650"
|
||||
"name": "SUSE-SR:2009:005",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=481267",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=481267"
|
||||
},
|
||||
{
|
||||
"name": "USN-736-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-736-1"
|
||||
},
|
||||
{
|
||||
"name": "http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20090129 CVE Request -- (sort of urgent) gstreamer-plugins-good (repost) (more details about affected versions -- final version)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2009/01/29/3"
|
||||
},
|
||||
{
|
||||
"name": "http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2009:035",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:035"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "8016",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/8016"
|
||||
},
|
||||
{
|
||||
"name" : "33698",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/33698"
|
||||
},
|
||||
{
|
||||
"name": "33866",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33866"
|
||||
},
|
||||
{
|
||||
"name": "8016",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/8016"
|
||||
},
|
||||
{
|
||||
"name": "adaptcms-sitepath-file-include(48610)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48610"
|
||||
},
|
||||
{
|
||||
"name": "33698",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33698"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,16 +57,16 @@
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=124025929213175&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT080146",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=124025929213175&w=2"
|
||||
},
|
||||
{
|
||||
"name": "1022087",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1022087"
|
||||
},
|
||||
{
|
||||
"name": "SSRT080146",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=124025929213175&w=2"
|
||||
},
|
||||
{
|
||||
"name": "34808",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.positronsecurity.com/advisories/2009-000.html",
|
||||
"refsource": "MISC",
|
||||
@ -73,14 +63,19 @@
|
||||
"url": "http://trac.osgeo.org/mapserver/ticket/2939"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1914",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2009/dsa-1914"
|
||||
"name": "1021952",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021952"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2009-3357",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
|
||||
"name": "20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/502271/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "34603",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34603"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2009-3383",
|
||||
@ -92,20 +87,25 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/34306"
|
||||
},
|
||||
{
|
||||
"name" : "1021952",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1021952"
|
||||
},
|
||||
{
|
||||
"name": "34520",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34520"
|
||||
},
|
||||
{
|
||||
"name" : "34603",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/34603"
|
||||
"name": "DSA-1914",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2009/dsa-1914"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2009-3357",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html"
|
||||
},
|
||||
{
|
||||
"name": "[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090413 MonGoose 2.4 Directory Traversal Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/502648/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "8428",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/8428"
|
||||
},
|
||||
{
|
||||
"name" : "34510",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/34510"
|
||||
},
|
||||
{
|
||||
"name": "mongoose-directory-traversal(49878)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49878"
|
||||
},
|
||||
{
|
||||
"name": "20090413 MonGoose 2.4 Directory Traversal Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/502648/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "34510",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/34510"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20090401 CVE id rquest: xfig insecure tmp files",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2009/04/01/6"
|
||||
"name": "xfig-temp-symlink(49600)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49600"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2009:244",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:244"
|
||||
},
|
||||
{
|
||||
"name" : "34328",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/34328"
|
||||
"name": "[oss-security] 20090401 CVE id rquest: xfig insecure tmp files",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2009/04/01/6"
|
||||
},
|
||||
{
|
||||
"name": "35320",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://secunia.com/advisories/35320"
|
||||
},
|
||||
{
|
||||
"name" : "xfig-temp-symlink(49600)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49600"
|
||||
"name": "34328",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/34328"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/0912-exploits/iescorts-sql.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/0912-exploits/iescorts-sql.txt"
|
||||
"name": "61397",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/61397"
|
||||
},
|
||||
{
|
||||
"name": "iescortsdirectory-countryid-sql-injection(55208)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55208"
|
||||
},
|
||||
{
|
||||
"name": "10809",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/10809"
|
||||
},
|
||||
{
|
||||
"name" : "61397",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/61397"
|
||||
},
|
||||
{
|
||||
"name": "37957",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/37957"
|
||||
},
|
||||
{
|
||||
"name" : "iescortsdirectory-countryid-sql-injection(55208)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55208"
|
||||
"name": "http://packetstormsecurity.org/0912-exploits/iescorts-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0912-exploits/iescorts-sql.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-2664",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -67,15 +67,15 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1121.html"
|
||||
},
|
||||
{
|
||||
"name" : "54116",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/54116"
|
||||
},
|
||||
{
|
||||
"name": "sos-anaconda-info-disclosure(76468)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76468"
|
||||
},
|
||||
{
|
||||
"name": "54116",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/54116"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-2720",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20120613 Re: CVE Request for Drupal contributed modules",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/06/14/3"
|
||||
},
|
||||
{
|
||||
"name" : "http://drupal.org/node/1619808",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://drupal.org/node/1619808"
|
||||
"name": "49400",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/49400"
|
||||
},
|
||||
{
|
||||
"name": "http://drupal.org/node/1618476",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/1618476"
|
||||
},
|
||||
{
|
||||
"name" : "53840",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/53840"
|
||||
},
|
||||
{
|
||||
"name": "82727",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/82727"
|
||||
},
|
||||
{
|
||||
"name" : "49400",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/49400"
|
||||
"name": "53840",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53840"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120613 Re: CVE Request for Drupal contributed modules",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/06/14/3"
|
||||
},
|
||||
{
|
||||
"name": "tokenauth-usersession-security-bypass(76141)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76141"
|
||||
},
|
||||
{
|
||||
"name": "http://drupal.org/node/1619808",
|
||||
"refsource": "MISC",
|
||||
"url": "http://drupal.org/node/1619808"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2012-3274",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://zerodayinitiative.com/advisories/ZDI-12-171/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://zerodayinitiative.com/advisories/ZDI-12-171/"
|
||||
},
|
||||
{
|
||||
"name": "HPSB3C02831",
|
||||
"refsource": "HP",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "SSRT100661",
|
||||
"refsource": "HP",
|
||||
"url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03589863"
|
||||
},
|
||||
{
|
||||
"name": "http://zerodayinitiative.com/advisories/ZDI-12-171/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://zerodayinitiative.com/advisories/ZDI-12-171/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-71.html"
|
||||
},
|
||||
{
|
||||
"name": "55344",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/55344"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=769265",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "SUSE-SU-2012:1157",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html"
|
||||
},
|
||||
{
|
||||
"name" : "55344",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/55344"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,101 +52,71 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2012/mfsa2012-74.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2012/mfsa2012-74.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=783502",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=783502"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=790856",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=790856"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=794025",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=794025"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2569",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2569"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2565",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2565"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2572",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2572"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2012:163",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:163"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:1351",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1351.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2012:1351",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1611-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1611-1"
|
||||
},
|
||||
{
|
||||
"name" : "55924",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/55924"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16612",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16612"
|
||||
},
|
||||
{
|
||||
"name" : "50856",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/50856"
|
||||
},
|
||||
{
|
||||
"name" : "50892",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/50892"
|
||||
},
|
||||
{
|
||||
"name": "50904",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/50904"
|
||||
},
|
||||
{
|
||||
"name": "50984",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/50984"
|
||||
},
|
||||
{
|
||||
"name": "50935",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/50935"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=794025",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=794025"
|
||||
},
|
||||
{
|
||||
"name": "50856",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/50856"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2565",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2565"
|
||||
},
|
||||
{
|
||||
"name": "50892",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/50892"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16612",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16612"
|
||||
},
|
||||
{
|
||||
"name": "55924",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/55924"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2572",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2572"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-74.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-74.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:1351",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-1351.html"
|
||||
},
|
||||
{
|
||||
"name": "50936",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/50936"
|
||||
},
|
||||
{
|
||||
"name" : "50984",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/50984"
|
||||
},
|
||||
{
|
||||
"name": "51181",
|
||||
"refsource": "SECUNIA",
|
||||
@ -156,6 +126,36 @@
|
||||
"name": "55318",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/55318"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:1351",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2012:163",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:163"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=790856",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=790856"
|
||||
},
|
||||
{
|
||||
"name": "USN-1611-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1611-1"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2569",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2569"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=783502",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=783502"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-6090",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.swi-prolog.org/git/pl.git/commit/b2c88972e7515ada025e97e7d3ce3e34f81cf33e",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.swi-prolog.org/git/pl.git/commit/b2c88972e7515ada025e97e7d3ce3e34f81cf33e"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130103 Re: CVE Request - SWI-Prolog / pl (X < 6.2.5): Multiple (stack-based) buffer overflows in patch canonisation code and when expanding file-names with long paths",
|
||||
"refsource": "MLIST",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.iai.uni-bonn.de/pipermail/swi-prolog/2012/009428.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.swi-prolog.org/git/pl.git/commit/b2c88972e7515ada025e97e7d3ce3e34f81cf33e",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.swi-prolog.org/git/pl.git/commit/b2c88972e7515ada025e97e7d3ce3e34f81cf33e"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=891577",
|
||||
"refsource": "CONFIRM",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2012-6181",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "18348",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/18348"
|
||||
},
|
||||
{
|
||||
"name" : "51359",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/51359"
|
||||
},
|
||||
{
|
||||
"name" : "78267",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/78267"
|
||||
},
|
||||
{
|
||||
"name": "78268",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/78268"
|
||||
},
|
||||
{
|
||||
"name": "wcms-index-xss(72300)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72300"
|
||||
},
|
||||
{
|
||||
"name": "47527",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/47527"
|
||||
},
|
||||
{
|
||||
"name": "18348",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/18348"
|
||||
},
|
||||
{
|
||||
"name": "78267",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/78267"
|
||||
},
|
||||
{
|
||||
"name": "wcms-comment-xss(72301)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72301"
|
||||
},
|
||||
{
|
||||
"name" : "wcms-index-xss(72300)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72300"
|
||||
"name": "51359",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/51359"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://drupal.org/node/1775582",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://drupal.org/node/1775582"
|
||||
},
|
||||
{
|
||||
"name" : "https://drupal.org/node/1774636",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://drupal.org/node/1774636"
|
||||
},
|
||||
{
|
||||
"name": "85190",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/85190"
|
||||
},
|
||||
{
|
||||
"name": "https://drupal.org/node/1775582",
|
||||
"refsource": "MISC",
|
||||
"url": "https://drupal.org/node/1775582"
|
||||
},
|
||||
{
|
||||
"name": "exposed-filter-drupal-xss(78316)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78316"
|
||||
},
|
||||
{
|
||||
"name": "https://drupal.org/node/1774636",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://drupal.org/node/1774636"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2015-5169",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1260087",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20180629-0003/",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1260087"
|
||||
"url": "https://security.netapp.com/advisory/ntap-20180629-0003/"
|
||||
},
|
||||
{
|
||||
"name": "76625",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/76625"
|
||||
},
|
||||
{
|
||||
"name": "https://struts.apache.org/docs/s2-025.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://struts.apache.org/docs/s2-025.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://security.netapp.com/advisory/ntap-20180629-0003/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20180629-0003/"
|
||||
},
|
||||
{
|
||||
"name" : "JVN#95989300",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/en/jp/JVN95989300/index.html"
|
||||
},
|
||||
{
|
||||
"name": "JVNDB-2015-000125",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000125.html"
|
||||
},
|
||||
{
|
||||
"name" : "76625",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/76625"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1260087",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260087"
|
||||
},
|
||||
{
|
||||
"name": "JVN#95989300",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN95989300/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20150627 Session Fixation, Reflected XSS, Code Execution in PivotX 2.3.10",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/535860/100/0/threaded"
|
||||
"name": "http://software-talk.org/blog/2015/06/session-fixation-xss-code-execution-vulnerability-pivotx/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://software-talk.org/blog/2015/06/session-fixation-xss-code-execution-vulnerability-pivotx/"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/132474/PivotX-2.3.10-Session-Fixation-XSS-Code-Execution.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/132474/PivotX-2.3.10-Session-Fixation-XSS-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://software-talk.org/blog/2015/06/session-fixation-xss-code-execution-vulnerability-pivotx/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://software-talk.org/blog/2015/06/session-fixation-xss-code-execution-vulnerability-pivotx/"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.pivotx.net/archive/2015/06/21/pivotx-2311-released",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blog.pivotx.net/archive/2015/06/21/pivotx-2311-released"
|
||||
},
|
||||
{
|
||||
"name" : "http://sourceforge.net/p/pivot-weblog/code/4452/tree//branches/2.3.x/pivotx/fileupload.php?diff=51a4cb5e34309d75c0d1612a:4451",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sourceforge.net/p/pivot-weblog/code/4452/tree//branches/2.3.x/pivotx/fileupload.php?diff=51a4cb5e34309d75c0d1612a:4451"
|
||||
},
|
||||
{
|
||||
"name": "75577",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/75577"
|
||||
},
|
||||
{
|
||||
"name": "20150627 Session Fixation, Reflected XSS, Code Execution in PivotX 2.3.10",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/535860/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/p/pivot-weblog/code/4452/tree//branches/2.3.x/pivotx/fileupload.php?diff=51a4cb5e34309d75c0d1612a:4451",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/p/pivot-weblog/code/4452/tree//branches/2.3.x/pivotx/fileupload.php?diff=51a4cb5e34309d75c0d1612a:4451"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150706 Remote file download vulnerability in wordpress plugin wp-ecommerce-shop-styling v2.5",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/07/06/19"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20150710 Re: Remote file download vulnerability in wordpress plugin wp-ecommerce-shop-styling v2.5",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/07/10/4"
|
||||
"name": "https://wordpress.org/plugins/wp-ecommerce-shop-styling/#developers",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wordpress.org/plugins/wp-ecommerce-shop-styling/#developers"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vapid.dhs.org/advisory.php?v=136",
|
||||
@ -68,9 +63,14 @@
|
||||
"url": "http://www.vapid.dhs.org/advisory.php?v=136"
|
||||
},
|
||||
{
|
||||
"name" : "https://wordpress.org/plugins/wp-ecommerce-shop-styling/#developers",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://wordpress.org/plugins/wp-ecommerce-shop-styling/#developers"
|
||||
"name": "[oss-security] 20150710 Re: Remote file download vulnerability in wordpress plugin wp-ecommerce-shop-styling v2.5",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/07/10/4"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150706 Remote file download vulnerability in wordpress plugin wp-ecommerce-shop-styling v2.5",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/07/06/19"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2015-5834",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1033609",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1033609"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205212",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT205212"
|
||||
},
|
||||
{
|
||||
"name": "76764",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/76764"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2015-09-21-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT205213",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,21 +81,6 @@
|
||||
"name": "APPLE-SA-2015-09-16-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-09-21-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name" : "76764",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/76764"
|
||||
},
|
||||
{
|
||||
"name" : "1033609",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1033609"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-2060",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.au.com/information/notice_mobile/update/update-20170612-01/"
|
||||
},
|
||||
{
|
||||
"name" : "JVN#24348065",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/en/jp/JVN24348065/index.html"
|
||||
},
|
||||
{
|
||||
"name": "99282",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99282"
|
||||
},
|
||||
{
|
||||
"name": "JVN#24348065",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN24348065/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-11043",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=3dfe93028c0c6564db7aa4607a85413195925aa4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=3dfe93028c0c6564db7aa4607a85413195925aa4"
|
||||
},
|
||||
{
|
||||
"name": "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.codeaurora.org/security-bulletin/2018/09/04/september-2018-code-aurora-security-bulletin"
|
||||
},
|
||||
{
|
||||
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=3dfe93028c0c6564db7aa4607a85413195925aa4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=3dfe93028c0c6564db7aa4607a85413195925aa4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.kone.com/en/vulnerability.aspx",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.kone.com/en/vulnerability.aspx"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/149252/KONE-KGC-4.6.4-DoS-Code-Execution-LFI-Bypass.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "secure@dell.com",
|
||||
"ASSIGNER": "security_alert@emc.com",
|
||||
"DATE_PUBLIC": "2018-11-09T05:00:00.000Z",
|
||||
"ID": "CVE-2018-15772",
|
||||
"STATE": "PUBLIC",
|
||||
@ -67,9 +67,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20181108 DSA-2018-205: Dell EMC RecoverPoint Multiple Vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "https://seclists.org/fulldisclosure/2018/Nov/34"
|
||||
"name": "1042059",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1042059"
|
||||
},
|
||||
{
|
||||
"name": "105916",
|
||||
@ -77,9 +77,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/105916"
|
||||
},
|
||||
{
|
||||
"name" : "1042059",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1042059"
|
||||
"name": "20181108 DSA-2018-205: Dell EMC RecoverPoint Multiple Vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "https://seclists.org/fulldisclosure/2018/Nov/34"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "Secure@Microsoft.com",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2018-8351",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -132,6 +132,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1041457",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041457"
|
||||
},
|
||||
{
|
||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8351",
|
||||
"refsource": "CONFIRM",
|
||||
@ -141,11 +146,6 @@
|
||||
"name": "105015",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105015"
|
||||
},
|
||||
{
|
||||
"name" : "1041457",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041457"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user