mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
d5229d3d18
commit
d1bd07f45a
@ -62,21 +62,26 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/53806"
|
||||
},
|
||||
{
|
||||
"name": "drupal-header-data-manipulation(25206)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25206"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1007",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1007"
|
||||
},
|
||||
{
|
||||
"name" : "17104",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/17104"
|
||||
},
|
||||
{
|
||||
"name": "23912",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/23912"
|
||||
},
|
||||
{
|
||||
"name": "17104",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/17104"
|
||||
},
|
||||
{
|
||||
"name": "19245",
|
||||
"refsource": "SECUNIA",
|
||||
@ -91,11 +96,6 @@
|
||||
"name": "579",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/579"
|
||||
},
|
||||
{
|
||||
"name" : "drupal-header-data-manipulation(25206)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25206"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "22163",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22163"
|
||||
},
|
||||
{
|
||||
"name": "20060927 Blog Pixel Motion V2.1.1 PHP Code Execution / Create Admin Exploit",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -62,11 +67,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://acid-root.new.fr/poc/12060927.txt"
|
||||
},
|
||||
{
|
||||
"name" : "22163",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22163"
|
||||
},
|
||||
{
|
||||
"name": "1653",
|
||||
"refsource": "SREASON",
|
||||
|
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.deluxebb.com/community/topic.php?tid=420",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.deluxebb.com/community/topic.php?tid=420"
|
||||
},
|
||||
{
|
||||
"name": "20292",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20292"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3857",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3857"
|
||||
"name": "http://www.deluxebb.com/community/topic.php?tid=420",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.deluxebb.com/community/topic.php?tid=420"
|
||||
},
|
||||
{
|
||||
"name": "29371",
|
||||
@ -77,6 +72,11 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22176"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3857",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3857"
|
||||
},
|
||||
{
|
||||
"name": "deluxebb-sig-file-include(29305)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061023 D-Link DSL-G624T several vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/449486/100/0/threaded"
|
||||
"name": "ADV-2006-4191",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4191"
|
||||
},
|
||||
{
|
||||
"name": "1781",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1781"
|
||||
},
|
||||
{
|
||||
"name": "http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html",
|
||||
@ -63,19 +68,14 @@
|
||||
"url": "http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4191",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4191"
|
||||
"name": "20061023 D-Link DSL-G624T several vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/449486/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "22524",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22524"
|
||||
},
|
||||
{
|
||||
"name" : "1781",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1781"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2006-5689",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061107 WarFTPd 1.82.00-RC11 Remote Denial Of Service",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/450804/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20944",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/20944"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4398",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4398"
|
||||
},
|
||||
{
|
||||
"name" : "1017174",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1017174"
|
||||
},
|
||||
{
|
||||
"name" : "22755",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22755"
|
||||
},
|
||||
{
|
||||
"name": "1832",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1832"
|
||||
},
|
||||
{
|
||||
"name": "1017174",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1017174"
|
||||
},
|
||||
{
|
||||
"name": "20944",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/20944"
|
||||
},
|
||||
{
|
||||
"name": "warftpd-string-dos(30077)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30077"
|
||||
},
|
||||
{
|
||||
"name": "20061107 WarFTPd 1.82.00-RC11 Remote Denial Of Service",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/450804/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "22755",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22755"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,36 +52,36 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070415 [MajorSecurity Advisory #45]oe2edit CMS - Cross Site Scripting and Cookie Manipulation Issue",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/465844/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.majorsecurity.de/index_2.php?major_rls=major_rls45",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.majorsecurity.de/index_2.php?major_rls=major_rls45"
|
||||
},
|
||||
{
|
||||
"name": "23512",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23512"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1417",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1417"
|
||||
},
|
||||
{
|
||||
"name": "34972",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34972"
|
||||
},
|
||||
{
|
||||
"name": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls45",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls45"
|
||||
},
|
||||
{
|
||||
"name": "20070415 [MajorSecurity Advisory #45]oe2edit CMS - Cross Site Scripting and Cookie Manipulation Issue",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/465844/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "24919",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/24919"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1417",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1417"
|
||||
},
|
||||
{
|
||||
"name": "oe2editcms-oe2edit-xss(33690)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,44 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "3763",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/3763"
|
||||
},
|
||||
{
|
||||
"name" : "23550",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23550"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1448",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1448"
|
||||
"name": "Rezervi-root-file-include(33737)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33737"
|
||||
},
|
||||
{
|
||||
"name": "35006",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35006"
|
||||
},
|
||||
{
|
||||
"name": "35009",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35009"
|
||||
},
|
||||
{
|
||||
"name": "23550",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23550"
|
||||
},
|
||||
{
|
||||
"name": "35007",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35007"
|
||||
},
|
||||
{
|
||||
"name": "3763",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/3763"
|
||||
},
|
||||
{
|
||||
"name": "35008",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35008"
|
||||
},
|
||||
{
|
||||
"name" : "35009",
|
||||
"name": "35013",
|
||||
"refsource": "OSVDB",
|
||||
"url" : "http://osvdb.org/35009"
|
||||
},
|
||||
{
|
||||
"name" : "35010",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35010"
|
||||
"url": "http://osvdb.org/35013"
|
||||
},
|
||||
{
|
||||
"name": "35011",
|
||||
@ -98,14 +98,9 @@
|
||||
"url": "http://osvdb.org/35011"
|
||||
},
|
||||
{
|
||||
"name" : "35012",
|
||||
"name": "35010",
|
||||
"refsource": "OSVDB",
|
||||
"url" : "http://osvdb.org/35012"
|
||||
},
|
||||
{
|
||||
"name" : "35013",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/35013"
|
||||
"url": "http://osvdb.org/35010"
|
||||
},
|
||||
{
|
||||
"name": "24926",
|
||||
@ -113,9 +108,14 @@
|
||||
"url": "http://secunia.com/advisories/24926"
|
||||
},
|
||||
{
|
||||
"name" : "Rezervi-root-file-include(33737)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33737"
|
||||
"name": "35012",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/35012"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1448",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1448"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "VU#184473",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/184473"
|
||||
},
|
||||
{
|
||||
"name": "23595",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23595"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1507",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1507"
|
||||
},
|
||||
{
|
||||
"name": "34329",
|
||||
"refsource": "OSVDB",
|
||||
@ -76,6 +66,16 @@
|
||||
"name": "25017",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25017"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1507",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1507"
|
||||
},
|
||||
{
|
||||
"name": "VU#184473",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/184473"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://research.eeye.com/html/advisories/upcoming/20070327.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://research.eeye.com/html/advisories/upcoming/20070327.html"
|
||||
},
|
||||
{
|
||||
"name" : "23332",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23332"
|
||||
},
|
||||
{
|
||||
"name": "35637",
|
||||
"refsource": "OSVDB",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "win-unspecified-code-execution(34444)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34444"
|
||||
},
|
||||
{
|
||||
"name": "http://research.eeye.com/html/advisories/upcoming/20070327.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://research.eeye.com/html/advisories/upcoming/20070327.html"
|
||||
},
|
||||
{
|
||||
"name": "23332",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23332"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "nukedit-search-xss(33998)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33998"
|
||||
},
|
||||
{
|
||||
"name": "23729",
|
||||
"refsource": "BID",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "25087",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/25087"
|
||||
},
|
||||
{
|
||||
"name" : "nukedit-search-xss(33998)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33998"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://moaxb.blogspot.com/2007/05/moaxb-07-versalsoft-http-file-uploader.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://moaxb.blogspot.com/2007/05/moaxb-07-versalsoft-http-file-uploader.html"
|
||||
"name": "34339",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/34339"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.shinnai.altervista.org/moaxb/20070507/ufile.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.shinnai.altervista.org/moaxb/20070507/ufile.txt"
|
||||
},
|
||||
{
|
||||
"name" : "23853",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/23853"
|
||||
"name": "versalsoft-ufileuploaderd-activex-bo(34123)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34123"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1672",
|
||||
@ -73,9 +68,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1672"
|
||||
},
|
||||
{
|
||||
"name" : "34339",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/34339"
|
||||
"name": "http://www.shinnai.altervista.org/moaxb/20070507/ufile.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.shinnai.altervista.org/moaxb/20070507/ufile.txt"
|
||||
},
|
||||
{
|
||||
"name": "25156",
|
||||
@ -83,9 +78,14 @@
|
||||
"url": "http://secunia.com/advisories/25156"
|
||||
},
|
||||
{
|
||||
"name" : "versalsoft-ufileuploaderd-activex-bo(34123)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34123"
|
||||
"name": "http://moaxb.blogspot.com/2007/05/moaxb-07-versalsoft-http-file-uploader.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://moaxb.blogspot.com/2007/05/moaxb-07-versalsoft-http-file-uploader.html"
|
||||
},
|
||||
{
|
||||
"name": "23853",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/23853"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,45 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20070521 NOD32 Antivirus Long Path Name Stack Overflow Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/469300/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070523 Re: NOD32 Antivirus Long Path Name Stack Overflow Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/469337/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070524 Re: NOD32 Antivirus Long Path Name Stack Overflow Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/469468/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.inkatel.com/wp-content/uploads/2007/05/Advisory.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.inkatel.com/wp-content/uploads/2007/05/Advisory.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.eset.com/support/news.php",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.eset.com/support/news.php"
|
||||
},
|
||||
{
|
||||
"name" : "24098",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/24098"
|
||||
},
|
||||
{
|
||||
"name": "36650",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/36650"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2007-1911",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2007/1911"
|
||||
"name": "20070521 NOD32 Antivirus Long Path Name Stack Overflow Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/469300/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "24098",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/24098"
|
||||
},
|
||||
{
|
||||
"name": "25375",
|
||||
@ -98,14 +78,34 @@
|
||||
"url": "http://secunia.com/advisories/25375"
|
||||
},
|
||||
{
|
||||
"name" : "2733",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/2733"
|
||||
"name": "20070523 Re: NOD32 Antivirus Long Path Name Stack Overflow Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/469337/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "nod32-directoryname-bo(34454)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34454"
|
||||
},
|
||||
{
|
||||
"name": "http://www.eset.com/support/news.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.eset.com/support/news.php"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-1911",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2007/1911"
|
||||
},
|
||||
{
|
||||
"name": "2733",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2733"
|
||||
},
|
||||
{
|
||||
"name": "20070524 Re: NOD32 Antivirus Long Path Name Stack Overflow Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/469468/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20071201 PR06-08: BEA Plumtree portal internal hostname disclosure vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/484467/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://procheckup.com/Vulnerability_PR06-08.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://procheckup.com/Vulnerability_PR06-08.php"
|
||||
},
|
||||
{
|
||||
"name" : "http://procheckup.com/Vulnerability_PR06-09.php",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://procheckup.com/Vulnerability_PR06-09.php"
|
||||
"name": "1019005",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1019005"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2007-4040",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2007/4040"
|
||||
},
|
||||
{
|
||||
"name" : "1019005",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1019005"
|
||||
"name": "20071201 PR06-08: BEA Plumtree portal internal hostname disclosure vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/484467/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://procheckup.com/Vulnerability_PR06-09.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://procheckup.com/Vulnerability_PR06-09.php"
|
||||
},
|
||||
{
|
||||
"name": "27840",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100912 MVSA-10-006 / CVE-2010-0153 - IBM Proventia Network Mail Security System - Cross-Site Request Forgery vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/513627/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ventuneac.net/security-advisories/MVSA-10-006",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.ventuneac.net/security-advisories/MVSA-10-006"
|
||||
},
|
||||
{
|
||||
"name": "20100912 MVSA-10-006 / CVE-2010-0153 - IBM Proventia Network Mail Security System - Cross-Site Request Forgery vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/513627/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2010/mfsa2010-27.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mozilla.org/security/announce/2010/mfsa2010-27.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=557174",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=557174"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2010-10344",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html"
|
||||
"name": "40481",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/40481"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2010-10361",
|
||||
@ -73,9 +63,9 @@
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043405.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SA:2010:030",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html"
|
||||
"name": "1024138",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1024138"
|
||||
},
|
||||
{
|
||||
"name": "41050",
|
||||
@ -83,39 +73,49 @@
|
||||
"url": "http://www.securityfocus.com/bid/41050"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:12586",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12586"
|
||||
},
|
||||
{
|
||||
"name" : "1024138",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1024138"
|
||||
},
|
||||
{
|
||||
"name" : "40326",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/40326"
|
||||
},
|
||||
{
|
||||
"name" : "40481",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/40481"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-1551",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/1551"
|
||||
"name": "http://www.mozilla.org/security/announce/2010/mfsa2010-27.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mozilla.org/security/announce/2010/mfsa2010-27.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1773",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1773"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=557174",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=557174"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1592",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1592"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1551",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1551"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SA:2010:030",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:12586",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12586"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2010-10344",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043369.html"
|
||||
},
|
||||
{
|
||||
"name": "40326",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/40326"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://nomoreroot.blogspot.com/2010/01/little-bug-in-safari-and-google-chrome.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://nomoreroot.blogspot.com/2010/01/little-bug-in-safari-and-google-chrome.html"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:039",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-2722",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/2722"
|
||||
},
|
||||
{
|
||||
"name": "USN-1006-1",
|
||||
"refsource": "UBUNTU",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://secunia.com/advisories/41856"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-2722",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/2722"
|
||||
"name": "http://nomoreroot.blogspot.com/2010/01/little-bug-in-safari-and-google-chrome.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://nomoreroot.blogspot.com/2010/01/little-bug-in-safari-and-google-chrome.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0552",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[zope-announce] 20100112 New Zope2 releases available",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://mail.zope.org/pipermail/zope-announce/2010-January/002229.html"
|
||||
"name": "ADV-2010-0104",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0104"
|
||||
},
|
||||
{
|
||||
"name": "37765",
|
||||
@ -67,20 +67,20 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/61655"
|
||||
},
|
||||
{
|
||||
"name" : "38007",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/38007"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-0104",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/0104"
|
||||
},
|
||||
{
|
||||
"name": "zope-standarderrormessage-xss(55599)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55599"
|
||||
},
|
||||
{
|
||||
"name": "[zope-announce] 20100112 New Zope2 releases available",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://mail.zope.org/pipermail/zope-announce/2010-January/002229.html"
|
||||
},
|
||||
{
|
||||
"name": "38007",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/38007"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20101013 Directory Traversal Vulnerability in FreshFTP",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/514259/100/0/threaded"
|
||||
"name": "http://www.htbridge.ch/advisory/directory_traversal_vulnerability_in_freshftp.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.htbridge.ch/advisory/directory_traversal_vulnerability_in_freshftp.html"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/1010-exploits/freshftp-traversal.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/1010-exploits/freshftp-traversal.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.htbridge.ch/advisory/directory_traversal_vulnerability_in_freshftp.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.htbridge.ch/advisory/directory_traversal_vulnerability_in_freshftp.html"
|
||||
},
|
||||
{
|
||||
"name": "44072",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/44072"
|
||||
},
|
||||
{
|
||||
"name" : "68667",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/68667"
|
||||
"name": "20101013 Directory Traversal Vulnerability in FreshFTP",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/514259/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "freshftp-ftp-dir-traversal(62555)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62555"
|
||||
},
|
||||
{
|
||||
"name": "41798",
|
||||
@ -83,9 +83,9 @@
|
||||
"url": "http://secunia.com/advisories/41798"
|
||||
},
|
||||
{
|
||||
"name" : "freshftp-ftp-dir-traversal(62555)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62555"
|
||||
"name": "68667",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/68667"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://wiki.habariproject.org/en/Release_0.6.6",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://wiki.habariproject.org/en/Release_0.6.6"
|
||||
},
|
||||
{
|
||||
"name": "http://www.htbridge.ch/advisory/xss_vulnerability_in_habari_1.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.htbridge.ch/advisory/xss_vulnerability_in_habari_1.html"
|
||||
},
|
||||
{
|
||||
"name": "15799",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -62,16 +72,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.htbridge.ch/advisory/xss_vulnerability_in_habari.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.htbridge.ch/advisory/xss_vulnerability_in_habari_1.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.htbridge.ch/advisory/xss_vulnerability_in_habari_1.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://wiki.habariproject.org/en/Release_0.6.6",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://wiki.habariproject.org/en/Release_0.6.6"
|
||||
},
|
||||
{
|
||||
"name": "42688",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-0353",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2014-0519",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://helpx.adobe.com/security/products/flash-player/apsb14-14.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://helpx.adobe.com/security/products/flash-player/apsb14-14.html"
|
||||
"name": "openSUSE-SU-2014:0673",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00051.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201406-08",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201406-08.xml"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0496",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0496.html"
|
||||
"name": "http://helpx.adobe.com/security/products/flash-player/apsb14-14.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-14.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0671",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0673",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-05/msg00051.html"
|
||||
"name": "RHSA-2014:0496",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0496.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2014-0583",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "71035",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/71035"
|
||||
},
|
||||
{
|
||||
"name": "http://helpx.adobe.com/security/products/flash-player/apsb14-24.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "openSUSE-SU-2015:0725",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name" : "71035",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/71035"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2014-1334",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT6254",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT6254"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/kb/HT6537",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/kb/HT6537"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2014-05-21-1",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2014-06-30-3",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-06-30-4",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0175.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT6254",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT6254"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-06-30-3",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-06/0174.html"
|
||||
},
|
||||
{
|
||||
"name": "67553",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/67553"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2014-05-21-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-05/0128.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html"
|
||||
"name": "101889",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/101889"
|
||||
},
|
||||
{
|
||||
"name": "64707",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/64707"
|
||||
},
|
||||
{
|
||||
"name" : "101889",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/101889"
|
||||
},
|
||||
{
|
||||
"name": "101890",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/101890"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/124708/Command-School-Student-Management-System-1.06.01-SQL-Injection-CSRF-XSS.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-4881",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "VU#230145",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/230145"
|
||||
},
|
||||
{
|
||||
"name" : "VU#582497",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/582497"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20150111 Re: CVE request: roundcubemail: possible CSRF attacks to some address book operations as well as to the ACL and Managesieve plugins",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2015/01/11/3"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.gentoo.org/show_bug.cgi?id=534766",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugs.gentoo.org/show_bug.cgi?id=534766"
|
||||
},
|
||||
{
|
||||
"name": "http://roundcube.net/news/2014/12/18/update-1.0.4-released/",
|
||||
"refsource": "CONFIRM",
|
||||
@ -72,10 +62,20 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179780"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.gentoo.org/show_bug.cgi?id=534766",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugs.gentoo.org/show_bug.cgi?id=534766"
|
||||
},
|
||||
{
|
||||
"name": "71909",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/71909"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20150111 Re: CVE request: roundcubemail: possible CSRF attacks to some address book operations as well as to the ACL and Managesieve plugins",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/01/11/3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2016-3348",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS16-106",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-106"
|
||||
},
|
||||
{
|
||||
"name": "92782",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "1036786",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036786"
|
||||
},
|
||||
{
|
||||
"name": "MS16-106",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-106"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-3444",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,6 +57,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
||||
},
|
||||
{
|
||||
"name": "1036397",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036397"
|
||||
},
|
||||
{
|
||||
"name": "91787",
|
||||
"refsource": "BID",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "91883",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91883"
|
||||
},
|
||||
{
|
||||
"name" : "1036397",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1036397"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-3473",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2016-3552",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,50 +57,50 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://security.netapp.com/advisory/ntap-20160721-0001/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20160721-0001/"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201610-08",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201610-08"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2016:1475",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2016:1475"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2016:2012",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:1979",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
|
||||
"name": "https://security.netapp.com/advisory/ntap-20160721-0001/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2016:2051",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
|
||||
},
|
||||
{
|
||||
"name" : "91787",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/91787"
|
||||
"name": "RHSA-2016:1475",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2016:1475"
|
||||
},
|
||||
{
|
||||
"name": "92000",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92000"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:2051",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
|
||||
},
|
||||
{
|
||||
"name": "1036365",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036365"
|
||||
},
|
||||
{
|
||||
"name": "91787",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/91787"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2016:1979",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"ID": "CVE-2016-3810",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207421"
|
||||
},
|
||||
{
|
||||
"name": "1037459",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037459"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207422",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "94913",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94913"
|
||||
},
|
||||
{
|
||||
"name" : "1037459",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1037459"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207421",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207421"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207422",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207422"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.apple.com/HT207424",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT207424"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207427",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207427"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201706-15",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201706-15"
|
||||
},
|
||||
{
|
||||
"name": "94907",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94907"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207421",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207421"
|
||||
},
|
||||
{
|
||||
"name": "1037459",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037459"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207422",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207422"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201706-15",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201706-15"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT207424",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT207424"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-7676",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-8060",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "anemec@redhat.com",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2016-8647",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -69,9 +69,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8647",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8647"
|
||||
"name": "RHSA-2017:1685",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1685"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/ansible/ansible-modules-core/pull/5388",
|
||||
@ -79,9 +79,9 @@
|
||||
"url": "https://github.com/ansible/ansible-modules-core/pull/5388"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:1685",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1685"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8647",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8647"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/uclouvain/openjpeg/issues/855",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/uclouvain/openjpeg/issues/855"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201710-26",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201710-26"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/uclouvain/openjpeg/issues/855",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/uclouvain/openjpeg/issues/855"
|
||||
},
|
||||
{
|
||||
"name": "93978",
|
||||
"refsource": "BID",
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-9143",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2016-9162",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20161110 CVE request: MyBB multiple vulnerabilities",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2016/11/10/8"
|
||||
"name": "94395",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/94395"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20161117 Re: CVE request: MyBB multiple vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/11/18/1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20161110 CVE request: MyBB multiple vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/11/10/8"
|
||||
},
|
||||
{
|
||||
"name": "https://blog.mybb.com/2016/03/11/mybb-1-8-7-merge-system-1-8-7-release/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://blog.mybb.com/2016/03/11/mybb-1-8-7-merge-system-1-8-7-release/"
|
||||
},
|
||||
{
|
||||
"name" : "94395",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/94395"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -74,16 +74,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/119733",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/119733"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006607",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22006607"
|
||||
},
|
||||
{
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/119733",
|
||||
"refsource": "MISC",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/119733"
|
||||
},
|
||||
{
|
||||
"name": "100060",
|
||||
"refsource": "BID",
|
||||
|
Loading…
x
Reference in New Issue
Block a user