"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:43:15 +00:00
parent 26564f5ae6
commit d58d3446d3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 3387 additions and 3387 deletions

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "CA-2002-02",
"refsource": "CERT",
"url": "http://www.cert.org/advisories/CA-2002-02.html"
},
{
"name": "20020106 ICQ remote buffer overflow vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=101043894627851&w=2"
},
{
"name" : "20020107 ICQ remote buffer overflow vulnerability",
"refsource" : "VULN-DEV",
"url" : "http://marc.info/?l=vuln-dev&m=101043076806401&w=2"
},
{
"name" : "CA-2002-02",
"refsource" : "CERT",
"url" : "http://www.cert.org/advisories/CA-2002-02.html"
"name": "aim-game-overflow(7743)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7743"
},
{
"name": "VU#570167",
@ -78,9 +78,9 @@
"url": "http://www.securityfocus.com/bid/3813"
},
{
"name" : "aim-game-overflow(7743)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7743"
"name": "20020107 ICQ remote buffer overflow vulnerability",
"refsource": "VULN-DEV",
"url": "http://marc.info/?l=vuln-dev&m=101043076806401&w=2"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20020209 Account theft vulnerability in MakeBid Auction Deluxe 3.30",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=101328880521775&w=2"
},
{
"name": "http://www.netcreations.addr.com/dcforum/DCForumID2/126.html",
"refsource": "CONFIRM",
"url": "http://www.netcreations.addr.com/dcforum/DCForumID2/126.html"
},
{
"name": "20020209 Account theft vulnerability in MakeBid Auction Deluxe 3.30",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=101328880521775&w=2"
},
{
"name": "makebid-description-css(8161)",
"refsource": "XF",

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "quake2-unexpanded-var-disclosure(9095)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9095.php"
},
{
"name": "20020514 Remote quake 2 3.2x server cvar leak",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/272548"
},
{
"name" : "http://www.quakesrc.org/forum/topicDisplay.php?topicID=160",
"refsource" : "MISC",
"url" : "http://www.quakesrc.org/forum/topicDisplay.php?topicID=160"
},
{
"name": "VU#970915",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/970915"
},
{
"name" : "4744",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/4744"
},
{
"name": "11187",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/11187"
},
{
"name" : "quake2-unexpanded-var-disclosure(9095)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/9095.php"
"name": "http://www.quakesrc.org/forum/topicDisplay.php?topicID=160",
"refsource": "MISC",
"url": "http://www.quakesrc.org/forum/topicDisplay.php?topicID=160"
},
{
"name": "4744",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4744"
}
]
}

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "20020620 [VulnWatch] KPMG-2002025: Apache Tomcat Denial of Service",
"refsource" : "VULNWATCH",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0120.html"
},
{
"name": "20020620 KPMG-2002025: Apache Tomcat Denial of Service",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/277940"
},
{
"name" : "tomcat-null-thread-dos(9396)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/9396.php"
"name": "20020620 [VulnWatch] KPMG-2002025: Apache Tomcat Denial of Service",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0120.html"
},
{
"name": "5051",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/5051"
},
{
"name": "5067",
@ -73,9 +73,9 @@
"url": "http://www.securityfocus.com/bid/5067"
},
{
"name" : "5051",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/5051"
"name": "tomcat-null-thread-dos(9396)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9396.php"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20021112 EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html"
},
{
"name" : "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
"refsource" : "VULNWATCH",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html"
},
{
"name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
"refsource": "BUGTRAQ",
@ -71,6 +61,16 @@
"name": "AD20021112",
"refsource": "EEYE",
"url": "http://www.eeye.com/html/Research/Advisories/AD20021112.html"
},
{
"name": "20021112 EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-11/0149.html"
},
{
"name": "20021119 Update: EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0080.html"
}
]
}

View File

@ -53,34 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20021209 Cyrus SASL library buffer overflows",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=103946297703402&w=2"
},
{
"name" : "APPLE-SA-2005-03-21",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html"
},
{
"name" : "000557",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000557"
},
{
"name" : "DSA-215",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2002/dsa-215"
},
{
"name" : "200212-10",
"refsource" : "GENTOO",
"url" : "http://www.securityfocus.com/advisories/4826"
},
{
"name" : "RHSA-2002:283",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2002-283.html"
"name": "cyrus-sasl-logwriter-bo(10812)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10812"
},
{
"name": "SuSE-SA:2002:048",
@ -88,14 +63,9 @@
"url": "http://archives.neohapsis.com/archives/linux/suse/2002-q4/1275.html"
},
{
"name" : "6347",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/6347"
},
{
"name" : "6348",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/6348"
"name": "000557",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000557"
},
{
"name": "6349",
@ -103,9 +73,14 @@
"url": "http://www.securityfocus.com/bid/6349"
},
{
"name" : "cyrus-sasl-username-bo(10810)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/10810"
"name": "20021209 Cyrus SASL library buffer overflows",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=103946297703402&w=2"
},
{
"name": "DSA-215",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2002/dsa-215"
},
{
"name": "cyrus-sasl-saslauthd-bo(10811)",
@ -113,9 +88,34 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10811"
},
{
"name" : "cyrus-sasl-logwriter-bo(10812)",
"name": "6348",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6348"
},
{
"name": "APPLE-SA-2005-03-21",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html"
},
{
"name": "6347",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6347"
},
{
"name": "200212-10",
"refsource": "GENTOO",
"url": "http://www.securityfocus.com/advisories/4826"
},
{
"name": "cyrus-sasl-username-bo(10810)",
"refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/10812"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10810"
},
{
"name": "RHSA-2002:283",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2002-283.html"
}
]
}

View File

@ -53,20 +53,30 @@
"references": {
"reference_data": [
{
"name" : "http://www.nextgenss.com/papers/hpoas.pdf",
"refsource" : "MISC",
"url" : "http://www.nextgenss.com/papers/hpoas.pdf"
"name": "default-oracle-applsys(972)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/972"
},
{
"name": "VU#712723",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/712723"
},
{
"name": "http://www.nextgenss.com/papers/hpoas.pdf",
"refsource": "MISC",
"url": "http://www.nextgenss.com/papers/hpoas.pdf"
},
{
"name": "default-oracle-system(968)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/968"
},
{
"name": "default-oracle-apps(971)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/971"
},
{
"name": "default-oracle-sys(969)",
"refsource": "XF",
@ -76,16 +86,6 @@
"name": "default-oracle-scott(970)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/970"
},
{
"name" : "default-oracle-apps(971)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/971"
},
{
"name" : "default-oracle-applsys(972)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/972"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20030319 EEYE: XDR Integer Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=104810574423662&w=2"
},
{
"name" : "20030331 GLSA: dietlibc (200303-29)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/316931/30/25250/threaded"
},
{
"name" : "20030331 GLSA: krb5 & mit-krb5 (200303-28)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/316960/30/25250/threaded"
},
{
"name" : "20030319 RE: EEYE: XDR Integer Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/315638/30/25430/threaded"
"name": "ESA-20030321-010",
"refsource": "ENGARDE",
"url": "http://www.linuxsecurity.com/advisories/engarde_advisory-3024.html"
},
{
"name": "20030319 EEYE: XDR Integer Overflow",
@ -78,34 +63,9 @@
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0140.html"
},
{
"name" : "AD20030318",
"refsource" : "EEYE",
"url" : "http://www.eeye.com/html/Research/Advisories/AD20030318.html"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20150122-0002/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20150122-0002/"
},
{
"name" : "CA-2003-10",
"refsource" : "CERT",
"url" : "http://www.cert.org/advisories/CA-2003-10.html"
},
{
"name" : "VU#516825",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/516825"
},
{
"name" : "DSA-282",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2003/dsa-282"
},
{
"name" : "RHSA-2003:051",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2003-051.html"
"name": "MDKSA-2003:037",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:037"
},
{
"name": "RHSA-2003:052",
@ -113,69 +73,109 @@
"url": "http://www.redhat.com/support/errata/RHSA-2003-052.html"
},
{
"name" : "RHSA-2003:089",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2003-089.html"
"name": "CA-2003-10",
"refsource": "CERT",
"url": "http://www.cert.org/advisories/CA-2003-10.html"
},
{
"name" : "RHSA-2003:091",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2003-091.html"
"name": "https://security.netapp.com/advisory/ntap-20150122-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20150122-0002/"
},
{
"name" : "20030319 MITKRB5-SA-2003-003: faulty length checks in xdrmem_getbytes",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=104811415301340&w=2"
},
{
"name" : "ESA-20030321-010",
"refsource" : "ENGARDE",
"url" : "http://www.linuxsecurity.com/advisories/engarde_advisory-3024.html"
},
{
"name" : "DSA-266",
"name": "DSA-282",
"refsource": "DEBIAN",
"url" : "http://www.debian.org/security/2003/dsa-266"
"url": "http://www.debian.org/security/2003/dsa-282"
},
{
"name" : "DSA-272",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2003/dsa-272"
},
{
"name" : "20030325 GLSA: glibc (200303-22)",
"name": "20030331 GLSA: krb5 & mit-krb5 (200303-28)",
"refsource": "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=104860855114117&w=2"
},
{
"name" : "MDKSA-2003:037",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2003:037"
},
{
"name" : "NetBSD-SA2003-008",
"refsource" : "NETBSD",
"url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-008.txt.asc"
"url": "http://www.securityfocus.com/archive/1/316960/30/25250/threaded"
},
{
"name": "SuSE-SA:2003:027",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2003_027_glibc.html"
},
{
"name": "20030319 RE: EEYE: XDR Integer Overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/315638/30/25430/threaded"
},
{
"name": "RHSA-2003:091",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2003-091.html"
},
{
"name": "AD20030318",
"refsource": "EEYE",
"url": "http://www.eeye.com/html/Research/Advisories/AD20030318.html"
},
{
"name": "VU#516825",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/516825"
},
{
"name": "20030325 GLSA: glibc (200303-22)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=104860855114117&w=2"
},
{
"name": "NetBSD-SA2003-008",
"refsource": "NETBSD",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-008.txt.asc"
},
{
"name": "2003-0014",
"refsource": "TRUSTIX",
"url": "http://marc.info/?l=bugtraq&m=104878237121402&w=2"
},
{
"name": "20030331 GLSA: dietlibc (200303-29)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/316931/30/25250/threaded"
},
{
"name": "RHSA-2003:051",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2003-051.html"
},
{
"name": "20030319 EEYE: XDR Integer Overflow",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=104810574423662&w=2"
},
{
"name": "oval:org.mitre.oval:def:230",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A230"
},
{
"name": "DSA-266",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2003/dsa-266"
},
{
"name": "RHSA-2003:089",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2003-089.html"
},
{
"name": "20030319 MITKRB5-SA-2003-003: faulty length checks in xdrmem_getbytes",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=104811415301340&w=2"
},
{
"name": "20030522 [slackware-security] glibc XDR overflow fix (SSA:2003-141-03)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=105362148313082&w=2"
},
{
"name" : "oval:org.mitre.oval:def:230",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A230"
"name": "DSA-272",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2003/dsa-272"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20030331 NSFOCUS SA2003-03: Solaris dtsession Heap Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/316948/30/25250/threaded"
},
{
"name" : "20030331 NSFOCUS SA2003-03: Solaris dtsession Heap Buffer Overflow Vulnerability",
"refsource" : "VULNWATCH",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0163.html"
},
{
"name" : "52388",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52388-1"
"name": "oval:org.mitre.oval:def:1905",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1905"
},
{
"name": "7240",
@ -73,9 +63,19 @@
"url": "http://www.securityfocus.com/bid/7240"
},
{
"name" : "oval:org.mitre.oval:def:1905",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1905"
"name": "20030331 NSFOCUS SA2003-03: Solaris dtsession Heap Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/316948/30/25250/threaded"
},
{
"name": "52388",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52388-1"
},
{
"name": "20030331 NSFOCUS SA2003-03: Solaris dtsession Heap Buffer Overflow Vulnerability",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0163.html"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20030510 BitchX: Crash when channel modes change",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=105259643606984&w=2"
},
{
"name" : "CLA-2003:655",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000655"
},
{
"name" : "MDKSA-2003:069",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2003:069"
"name": "bitchx-mode-change-dos(12008)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12008"
},
{
"name": "7551",
@ -73,9 +63,19 @@
"url": "http://www.securityfocus.com/bid/7551"
},
{
"name" : "bitchx-mode-change-dos(12008)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/12008"
"name": "20030510 BitchX: Crash when channel modes change",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=105259643606984&w=2"
},
{
"name": "MDKSA-2003:069",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:069"
},
{
"name": "CLA-2003:655",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000655"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20031027 Libnids <= 1.17 buffer overflow",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=106728224210446&w=2"
"name": "10543",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/10543"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=191323",
@ -67,15 +67,15 @@
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000773"
},
{
"name": "20031027 Libnids <= 1.17 buffer overflow",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=106728224210446&w=2"
},
{
"name": "DSA-410",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-410"
},
{
"name" : "10543",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/10543"
}
]
}

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "50626",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-50626-1"
},
{
"name" : "6883",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/6883"
"name": "solaris-udp-rpc-dos(11368)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11368"
},
{
"name": "1006131",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1006131"
},
{
"name": "6883",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6883"
},
{
"name": "8092",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/8092/"
},
{
"name" : "solaris-udp-rpc-dos(11368)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/11368"
"name": "50626",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-50626-1"
}
]
}

View File

@ -57,16 +57,16 @@
"refsource": "NTBUGTRAQ",
"url": "http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0321.html"
},
{
"name" : "http://www.aqtronix.com/Advisories/AQ-2003-02.txt",
"refsource" : "MISC",
"url" : "http://www.aqtronix.com/Advisories/AQ-2003-02.txt"
},
{
"name": "VU#288308",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/288308"
},
{
"name": "http://www.aqtronix.com/Advisories/AQ-2003-02.txt",
"refsource": "MISC",
"url": "http://www.aqtronix.com/Advisories/AQ-2003-02.txt"
},
{
"name": "5648",
"refsource": "OSVDB",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-0522",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
},
{
"name" : "MDVSA-2013:150",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name": "53053",
"refsource": "BID",
@ -76,6 +66,16 @@
"name": "48863",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48863"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
},
{
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0846",
"STATE": "PUBLIC"
},
@ -52,25 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20120119 Webcalendar 1.2.4 'location' XSS",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-01/0129.html"
},
{
"name" : "[oss-security] 20120211 CVE-request: Webcalendar 1.2.4 location XSS",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/02/11/2"
},
{
"name": "[oss-security] 20120211 Re: CVE-request: Webcalendar 1.2.4 location XSS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/02/12/1"
},
{
"name" : "[oss-security] 20120212 Re: CVE-request: Webcalendar 1.2.4 location XSS",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/02/12/3"
"name": "webcalendar-location-xss(72563)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72563"
},
{
"name": "[oss-security] 20120213 Re: CVE-request: Webcalendar 1.2.4 location XSS",
@ -78,9 +68,19 @@
"url": "http://www.openwall.com/lists/oss-security/2012/02/13/6"
},
{
"name" : "http://sourceforge.net/tracker/?func=detail&aid=3472745&group_id=3870&atid=103870",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/tracker/?func=detail&aid=3472745&group_id=3870&atid=103870"
"name": "[oss-security] 20120211 CVE-request: Webcalendar 1.2.4 location XSS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/02/11/2"
},
{
"name": "[oss-security] 20120212 Re: CVE-request: Webcalendar 1.2.4 location XSS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/02/12/3"
},
{
"name": "20120119 Webcalendar 1.2.4 'location' XSS",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0129.html"
},
{
"name": "http://sourceforge.net/tracker/?func=detail&aid=3488543&group_id=3870&atid=303870",
@ -93,9 +93,9 @@
"url": "http://www.securityfocus.com/bid/51600"
},
{
"name" : "webcalendar-location-xss(72563)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72563"
"name": "http://sourceforge.net/tracker/?func=detail&aid=3472745&group_id=3870&atid=103870",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/tracker/?func=detail&aid=3472745&group_id=3870&atid=103870"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2012-1501",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -57,6 +57,11 @@
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb12-18.html"
},
{
"name": "RHSA-2012:1203",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1203.html"
},
{
"name": "GLSA-201209-01",
"refsource": "GENTOO",
@ -67,11 +72,6 @@
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139455789818399&w=2"
},
{
"name" : "RHSA-2012:1203",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1203.html"
},
{
"name": "SUSE-SU-2012:1001",
"refsource": "SUSE",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10022",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10022"
},
{
"name": "mcafee-emm-portal-info-disc(78220)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78220"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10022",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10022"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2012-5943",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21628658",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21628658"
},
{
"name": "inotes-mail-xss(80538)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80538"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21628658",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21628658"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-2072",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,25 +53,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0394",
"refsource" : "MISC",
"url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0394"
},
{
"name": "DSA-4177",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4177"
},
{
"name" : "DSA-4184",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4184"
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0394",
"refsource": "MISC",
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0394"
},
{
"name": "101215",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101215"
},
{
"name": "DSA-4184",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4184"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1037630",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037630"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "95477",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95477"
},
{
"name" : "1037630",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037630"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
},
{
"name" : "97786",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/97786"
},
{
"name": "1038304",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038304"
},
{
"name": "97786",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97786"
}
]
}

View File

@ -82,15 +82,15 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
},
{
"name" : "97871",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/97871"
},
{
"name": "1038304",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038304"
},
{
"name": "97871",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97871"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-075-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-075-01"
},
{
"name": "96942",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96942"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-075-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-075-01"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "41438",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/41438/"
"name": "https://wpvulndb.com/vulnerabilities/8740",
"refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/8740"
},
{
"name": "https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin",
@ -63,9 +63,9 @@
"url": "https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin"
},
{
"name" : "https://wpvulndb.com/vulnerabilities/8740",
"refsource" : "MISC",
"url" : "https://wpvulndb.com/vulnerabilities/8740"
"name": "41438",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41438/"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.veritas.com/content/support/en_US/security/VTS17-003.html#Issue6",
"refsource" : "CONFIRM",
"url" : "https://www.veritas.com/content/support/en_US/security/VTS17-003.html#Issue6"
},
{
"name": "96493",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96493"
},
{
"name": "https://www.veritas.com/content/support/en_US/security/VTS17-003.html#Issue6",
"refsource": "CONFIRM",
"url": "https://www.veritas.com/content/support/en_US/security/VTS17-003.html#Issue6"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://github.com/mantisbt/mantisbt/commit/a85b0b96c8ebe3e010d0d016cf88ab3c8bfc196a",
"refsource" : "CONFIRM",
"url" : "http://github.com/mantisbt/mantisbt/commit/a85b0b96c8ebe3e010d0d016cf88ab3c8bfc196a"
},
{
"name": "https://mantisbt.org/bugs/view.php?id=22266",
"refsource": "CONFIRM",
"url": "https://mantisbt.org/bugs/view.php?id=22266"
},
{
"name": "http://github.com/mantisbt/mantisbt/commit/a85b0b96c8ebe3e010d0d016cf88ab3c8bfc196a",
"refsource": "CONFIRM",
"url": "http://github.com/mantisbt/mantisbt/commit/a85b0b96c8ebe3e010d0d016cf88ab3c8bfc196a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "anemec@redhat.com",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-7539",
"STATE": "PUBLIC"
},
@ -69,14 +69,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20170721 CVE-2017-7539 Qemu: qemu-nbd crashes due to undefined I/O coroutine",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2017/07/21/4"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7539",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7539"
"name": "RHSA-2017:2628",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2628"
},
{
"name": "https://git.qemu.org/?p=qemu.git;a=commitdiff;h=2b0bbc4f8809c972bad134bc1a2570dbb01dea0b",
@ -84,45 +79,50 @@
"url": "https://git.qemu.org/?p=qemu.git;a=commitdiff;h=2b0bbc4f8809c972bad134bc1a2570dbb01dea0b"
},
{
"name" : "https://git.qemu.org/?p=qemu.git;a=commitdiff;h=ff82911cd3f69f028f2537825c9720ff78bc3f19",
"refsource" : "CONFIRM",
"url" : "https://git.qemu.org/?p=qemu.git;a=commitdiff;h=ff82911cd3f69f028f2537825c9720ff78bc3f19"
},
{
"name" : "RHSA-2017:2628",
"name": "RHSA-2017:3473",
"refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:2628"
},
{
"name" : "RHSA-2017:3466",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:3466"
"url": "https://access.redhat.com/errata/RHSA-2017:3473"
},
{
"name": "RHSA-2017:3470",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3470"
},
{
"name" : "RHSA-2017:3471",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:3471"
},
{
"name": "RHSA-2017:3472",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3472"
},
{
"name" : "RHSA-2017:3473",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:3473"
},
{
"name": "RHSA-2017:3474",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3474"
},
{
"name": "RHSA-2017:3471",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3471"
},
{
"name": "https://git.qemu.org/?p=qemu.git;a=commitdiff;h=ff82911cd3f69f028f2537825c9720ff78bc3f19",
"refsource": "CONFIRM",
"url": "https://git.qemu.org/?p=qemu.git;a=commitdiff;h=ff82911cd3f69f028f2537825c9720ff78bc3f19"
},
{
"name": "[oss-security] 20170721 CVE-2017-7539 Qemu: qemu-nbd crashes due to undefined I/O coroutine",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/07/21/4"
},
{
"name": "RHSA-2017:3466",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3466"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7539",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7539"
},
{
"name": "99944",
"refsource": "BID",

View File

@ -54,24 +54,24 @@
"references": {
"reference_data": [
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1356596",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1356596"
"name": "1039465",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039465"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2017-21/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-21/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1356596",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1356596"
},
{
"name": "101057",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101057"
},
{
"name" : "1039465",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039465"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-20246",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20180626 PRTG < 18.2.39 Command Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/542103/100/0/threaded"
"name": "http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html"
},
{
"name": "46527",
@ -63,9 +63,9 @@
"url": "https://www.exploit-db.com/exploits/46527/"
},
{
"name" : "http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html"
"name": "20180626 PRTG < 18.2.39 Command Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/542103/100/0/threaded"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://zerodayinitiative.com/advisories/ZDI-18-380",
"refsource" : "MISC",
"url" : "https://zerodayinitiative.com/advisories/ZDI-18-380"
},
{
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://zerodayinitiative.com/advisories/ZDI-18-380",
"refsource": "MISC",
"url": "https://zerodayinitiative.com/advisories/ZDI-18-380"
}
]
}