"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:58:18 +00:00
parent 7e07cca963
commit dacd1d8003
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3850 additions and 3850 deletions

View File

@ -52,40 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "DSA-641",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-641"
},
{ {
"name": "MDKSA-2005:010", "name": "MDKSA-2005:010",
"refsource": "MANDRAKE", "refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:010" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:010"
}, },
{
"name" : "12274",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/12274"
},
{
"name" : "13049",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/13049"
},
{
"name" : "1012957",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1012957"
},
{ {
"name": "13828", "name": "13828",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13828" "url": "http://secunia.com/advisories/13828"
}, },
{ {
"name" : "13890", "name": "1012957",
"refsource" : "SECUNIA", "refsource": "SECTRACK",
"url" : "http://secunia.com/advisories/13890" "url": "http://securitytracker.com/id?1012957"
},
{
"name": "12274",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12274"
}, },
{ {
"name": "13898", "name": "13898",
@ -96,6 +81,21 @@
"name": "playmidi-bo(18933)", "name": "playmidi-bo(18933)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18933" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18933"
},
{
"name": "DSA-641",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-641"
},
{
"name": "13890",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13890"
},
{
"name": "13049",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/13049"
} }
] ]
} }

View File

@ -62,6 +62,46 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.digitalmunition.com/DMA[2005-0131b].txt" "url": "http://www.digitalmunition.com/DMA[2005-0131b].txt"
}, },
{
"name": "12426",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12426"
},
{
"name": "RHSA-2005:105",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-105.html"
},
{
"name": "14120",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14120"
},
{
"name": "2005-0003",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2005/0003/"
},
{
"name": "RHSA-2005:103",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-103.html"
},
{
"name": "oval:org.mitre.oval:def:10803",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803"
},
{
"name": "55314",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55314"
},
{
"name": "20050202 [USN-72-1] Perl vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110737149402683&w=2"
},
{ {
"name": "CLSA-2006:1056", "name": "CLSA-2006:1056",
"refsource": "CONECTIVA", "refsource": "CONECTIVA",
@ -72,60 +112,20 @@
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://fedoranews.org/updates/FEDORA--.shtml" "url": "http://fedoranews.org/updates/FEDORA--.shtml"
}, },
{
"name" : "GLSA-200502-13",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml"
},
{ {
"name": "MDKSA-2005:031", "name": "MDKSA-2005:031",
"refsource": "MANDRAKE", "refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031"
}, },
{
"name" : "RHSA-2005:103",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-103.html"
},
{
"name" : "RHSA-2005:105",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-105.html"
},
{
"name" : "2005-0003",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2005/0003/"
},
{
"name" : "20050202 [USN-72-1] Perl vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=110737149402683&w=2"
},
{
"name" : "12426",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/12426"
},
{
"name" : "oval:org.mitre.oval:def:10803",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803"
},
{
"name" : "14120",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/14120"
},
{
"name" : "55314",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/55314"
},
{ {
"name": "perl-perliodebug-bo(19208)", "name": "perl-perliodebug-bo(19208)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208"
},
{
"name": "GLSA-200502-13",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110555988111899&w=2" "url": "http://marc.info/?l=bugtraq&m=110555988111899&w=2"
}, },
{
"name": "bitshifters-bitboard-xss(18871)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18871"
},
{ {
"name": "12248", "name": "12248",
"refsource": "BID", "refsource": "BID",
@ -66,11 +71,6 @@
"name": "1012864", "name": "1012864",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1012864" "url": "http://securitytracker.com/id?1012864"
},
{
"name" : "bitshifters-bitboard-xss(18871)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18871"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "kayako-index-xss(18571)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18571"
},
{ {
"name": "20050215 Kayako eSupport v2.3.1 Support Tracker XSS", "name": "20050215 Kayako eSupport v2.3.1 Support Tracker XSS",
"refsource": "FULLDISC", "refsource": "FULLDISC",
@ -61,11 +66,6 @@
"name": "12563", "name": "12563",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/12563" "url": "http://www.securityfocus.com/bid/12563"
},
{
"name" : "kayako-index-xss(18571)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18571"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "getdataback-ntfs-information-disclosure(19967)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19967"
},
{ {
"name": "15210", "name": "15210",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -61,11 +66,6 @@
"name": "1013644", "name": "1013644",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1013644" "url": "http://securitytracker.com/id?1013644"
},
{
"name" : "getdataback-ntfs-information-disclosure(19967)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19967"
} }
] ]
} }

View File

@ -53,54 +53,54 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=88398", "name": "17072",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=88398" "url": "http://secunia.com/advisories/17072"
}, },
{ {
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-015.htm", "name": "18506",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-015.htm" "url": "http://secunia.com/advisories/18506"
},
{
"name" : "GLSA-200505-15",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200505-15.xml"
},
{
"name" : "MDKSA-2005:095",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:095"
},
{
"name" : "RHSA-2005:801",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-801.html"
}, },
{ {
"name": "RHSA-2005:709", "name": "RHSA-2005:709",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-709.html" "url": "http://www.redhat.com/support/errata/RHSA-2005-709.html"
}, },
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-015.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-015.htm"
},
{
"name": "RHSA-2005:801",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-801.html"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=88398",
"refsource": "CONFIRM",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=88398"
},
{
"name": "GLSA-200505-15",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200505-15.xml"
},
{ {
"name": "oval:org.mitre.oval:def:11072", "name": "oval:org.mitre.oval:def:11072",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11072" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11072"
}, },
{ {
"name" : "17072", "name": "MDKSA-2005:095",
"refsource" : "SECUNIA", "refsource": "MANDRAKE",
"url" : "http://secunia.com/advisories/17072" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:095"
}, },
{ {
"name": "17356", "name": "17356",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17356" "url": "http://secunia.com/advisories/17356"
},
{
"name" : "18506",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18506"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20051102 Buffer-overflow and directory traversal in Asus", "name": "20457",
"refsource" : "FULLDISC", "refsource": "OSVDB",
"url" : "http://marc.info/?l=full-disclosure&m=113096055302614&w=2" "url": "http://www.osvdb.org/20457"
},
{
"name": "17419",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17419"
}, },
{ {
"name": "http://aluigi.altervista.org/adv/asusvsbugs-adv.txt", "name": "http://aluigi.altervista.org/adv/asusvsbugs-adv.txt",
@ -73,14 +78,9 @@
"url": "http://www.vupen.com/english/advisories/2005/2289" "url": "http://www.vupen.com/english/advisories/2005/2289"
}, },
{ {
"name" : "20457", "name": "20051102 Buffer-overflow and directory traversal in Asus",
"refsource" : "OSVDB", "refsource": "FULLDISC",
"url" : "http://www.osvdb.org/20457" "url": "http://marc.info/?l=full-disclosure&m=113096055302614&w=2"
},
{
"name" : "17419",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17419"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2005-3621", "ID": "CVE-2005-3621",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-6",
"refsource" : "CONFIRM",
"url" : "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-6"
},
{
"name" : "DSA-1207",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1207"
},
{ {
"name": "SUSE-SR:2005:028", "name": "SUSE-SR:2005:028",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2005_28_sr.html" "url": "http://www.novell.com/linux/security/advisories/2005_28_sr.html"
}, },
{
"name" : "1015213",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015213"
},
{ {
"name": "17578", "name": "17578",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17578" "url": "http://secunia.com/advisories/17578"
}, },
{
"name": "DSA-1207",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1207"
},
{ {
"name": "22781", "name": "22781",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22781" "url": "http://secunia.com/advisories/22781"
},
{
"name": "1015213",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015213"
},
{
"name": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-6",
"refsource": "CONFIRM",
"url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-6"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "102030", "name": "20752",
"refsource" : "SUNALERT", "refsource": "OSVDB",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102030-1" "url": "http://www.osvdb.org/20752"
}, },
{ {
"name": "15384", "name": "15384",
@ -63,29 +63,29 @@
"url": "http://www.securityfocus.com/bid/15384" "url": "http://www.securityfocus.com/bid/15384"
}, },
{ {
"name" : "ADV-2005-2388", "name": "102030",
"refsource" : "VUPEN", "refsource": "SUNALERT",
"url" : "http://www.vupen.com/english/advisories/2005/2388" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102030-1"
},
{
"name" : "20752",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/20752"
},
{
"name" : "1015191",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015191"
}, },
{ {
"name": "17460", "name": "17460",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17460" "url": "http://secunia.com/advisories/17460"
}, },
{
"name": "1015191",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015191"
},
{ {
"name": "solaris-innamed-dns-dos(23062)", "name": "solaris-innamed-dns-dos(23062)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23062" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23062"
},
{
"name": "ADV-2005-2388",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2388"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "17732",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17732"
},
{ {
"name": "http://pridels0.blogspot.com/2005/11/activecampaign-knowledgebuilder-vuln.html", "name": "http://pridels0.blogspot.com/2005/11/activecampaign-knowledgebuilder-vuln.html",
"refsource": "MISC", "refsource": "MISC",
@ -66,11 +71,6 @@
"name": "21098", "name": "21098",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/21098" "url": "http://www.osvdb.org/21098"
},
{
"name" : "17732",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17732"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://pridels0.blogspot.com/2005/12/edatcat-xss-vuln.html",
"refsource" : "MISC",
"url" : "http://pridels0.blogspot.com/2005/12/edatcat-xss-vuln.html"
},
{ {
"name": "15889", "name": "15889",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/15889" "url": "http://www.securityfocus.com/bid/15889"
},
{
"name": "http://pridels0.blogspot.com/2005/12/edatcat-xss-vuln.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2005/12/edatcat-xss-vuln.html"
} }
] ]
} }

View File

@ -52,31 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20051221 [Hat-Squad] Remote Heap Corruption Vulnerability in Interaction SIP Proxy",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/419989/100/0/threaded"
},
{
"name" : "http://www.hat-squad.com/en/000171.html",
"refsource" : "MISC",
"url" : "http://www.hat-squad.com/en/000171.html"
},
{
"name" : "16001",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/16001"
},
{
"name" : "ADV-2005-3029",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/3029"
},
{
"name" : "1015392",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015392"
},
{ {
"name": "18197", "name": "18197",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -91,6 +66,31 @@
"name": "sipproxy-i3sipmsg-bo(23823)", "name": "sipproxy-i3sipmsg-bo(23823)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23823" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23823"
},
{
"name": "20051221 [Hat-Squad] Remote Heap Corruption Vulnerability in Interaction SIP Proxy",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/419989/100/0/threaded"
},
{
"name": "16001",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16001"
},
{
"name": "ADV-2005-3029",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/3029"
},
{
"name": "http://www.hat-squad.com/en/000171.html",
"refsource": "MISC",
"url": "http://www.hat-squad.com/en/000171.html"
},
{
"name": "1015392",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015392"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[netbsd-announce] 20051031 Announcing update 2.0.3 - source only", "name": "1015132",
"refsource" : "MLIST", "refsource": "SECTRACK",
"url" : "http://mail-index.netbsd.org/netbsd-announce/2005/10/31/0000.html" "url": "http://securitytracker.com/id?1015132"
},
{
"name" : "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/miscfs/kernfs/kernfs_vnops.c",
"refsource" : "CONFIRM",
"url" : "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/miscfs/kernfs/kernfs_vnops.c"
}, },
{ {
"name": "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/miscfs/kernfs/kernfs_vnops.c.diff?r1=1.110&r2=1.111&f=h", "name": "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/miscfs/kernfs/kernfs_vnops.c.diff?r1=1.110&r2=1.111&f=h",
@ -72,20 +67,25 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://releng.netbsd.org/cgi-bin/req-3.cgi?show=727" "url": "http://releng.netbsd.org/cgi-bin/req-3.cgi?show=727"
}, },
{
"name" : "NetBSD-SA2006-001",
"refsource" : "NETBSD",
"url" : "http://www.packetstormsecurity.org/0601-advisories/NetBSD-SA2006-001.txt"
},
{ {
"name": "20729", "name": "20729",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/20729" "url": "http://www.osvdb.org/20729"
}, },
{ {
"name" : "1015132", "name": "NetBSD-SA2006-001",
"refsource" : "SECTRACK", "refsource": "NETBSD",
"url" : "http://securitytracker.com/id?1015132" "url": "http://www.packetstormsecurity.org/0601-advisories/NetBSD-SA2006-001.txt"
},
{
"name": "[netbsd-announce] 20051031 Announcing update 2.0.3 - source only",
"refsource": "MLIST",
"url": "http://mail-index.netbsd.org/netbsd-announce/2005/10/31/0000.html"
},
{
"name": "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/miscfs/kernfs/kernfs_vnops.c",
"refsource": "CONFIRM",
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/miscfs/kernfs/kernfs_vnops.c"
} }
] ]
} }

View File

@ -52,6 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "33828",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33828"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511521",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511521"
},
{
"name": "33806",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33806"
},
{
"name": "SUSE-SR:2009:003",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html"
},
{ {
"name": "[oss-security] 20090112 CVE Request -- tsqllib, slurm-llnl, libnasl, libcrypt-openssl-dsa-perl, erlang, boinc-client, m2crypto", "name": "[oss-security] 20090112 CVE Request -- tsqllib, slurm-llnl, libnasl, libcrypt-openssl-dsa-perl, erlang, boinc-client, m2crypto",
"refsource": "MLIST", "refsource": "MLIST",
@ -67,11 +87,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://boinc.berkeley.edu/trac/ticket/823" "url": "http://boinc.berkeley.edu/trac/ticket/823"
}, },
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511521",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511521"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=479664", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=479664",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -81,21 +96,6 @@
"name": "FEDORA-2009-0578", "name": "FEDORA-2009-0578",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00034.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00034.html"
},
{
"name" : "SUSE-SR:2009:003",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html"
},
{
"name" : "33806",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33806"
},
{
"name" : "33828",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33828"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "239886",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-239886-1"
},
{ {
"name": "33506", "name": "33506",
"refsource": "BID", "refsource": "BID",
@ -67,11 +62,6 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0281" "url": "http://www.vupen.com/english/advisories/2009/0281"
}, },
{
"name" : "1021646",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021646"
},
{ {
"name": "33726", "name": "33726",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -81,6 +71,16 @@
"name": "sunfire-elom-unauth-access(48329)", "name": "sunfire-elom-unauth-access(48329)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48329" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48329"
},
{
"name": "239886",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-239886-1"
},
{
"name": "1021646",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021646"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20090218 DDIVRT-2009-20 NetMRI Login Application Cross-site Scripting Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/501033/100/0/threaded"
},
{
"name" : "http://connection.netcordia.com/forums/t/731.aspx",
"refsource" : "CONFIRM",
"url" : "http://connection.netcordia.com/forums/t/731.aspx"
},
{ {
"name": "33824", "name": "33824",
"refsource": "BID", "refsource": "BID",
@ -71,6 +61,16 @@
"name": "33963", "name": "33963",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33963" "url": "http://secunia.com/advisories/33963"
},
{
"name": "20090218 DDIVRT-2009-20 NetMRI Login Application Cross-site Scripting Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/501033/100/0/threaded"
},
{
"name": "http://connection.netcordia.com/forums/t/731.aspx",
"refsource": "CONFIRM",
"url": "http://connection.netcordia.com/forums/t/731.aspx"
} }
] ]
} }

View File

@ -52,55 +52,55 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.opera.com/docs/changelogs/freebsd/964/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/freebsd/964/"
},
{
"name" : "http://www.opera.com/docs/changelogs/linux/964/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/linux/964/"
},
{
"name" : "http://www.opera.com/docs/changelogs/mac/964/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/mac/964/"
},
{
"name" : "http://www.opera.com/docs/changelogs/solaris/964/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/solaris/964/"
},
{
"name" : "http://www.opera.com/docs/changelogs/windows/964/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/windows/964/"
},
{ {
"name": "SUSE-SR:2009:007", "name": "SUSE-SR:2009:007",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"
}, },
{
"name" : "33961",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33961"
},
{ {
"name": "34135", "name": "34135",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34135" "url": "http://secunia.com/advisories/34135"
}, },
{
"name": "http://www.opera.com/docs/changelogs/solaris/964/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/solaris/964/"
},
{
"name": "http://www.opera.com/docs/changelogs/linux/964/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/linux/964/"
},
{ {
"name": "34418", "name": "34418",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34418" "url": "http://secunia.com/advisories/34418"
}, },
{
"name": "http://www.opera.com/docs/changelogs/mac/964/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/mac/964/"
},
{
"name": "33961",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33961"
},
{ {
"name": "ADV-2009-0586", "name": "ADV-2009-0586",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0586" "url": "http://www.vupen.com/english/advisories/2009/0586"
},
{
"name": "http://www.opera.com/docs/changelogs/windows/964/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/windows/964/"
},
{
"name": "http://www.opera.com/docs/changelogs/freebsd/964/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/freebsd/964/"
} }
] ]
} }

View File

@ -57,6 +57,16 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://code.google.com/p/memcachedb/source/browse/trunk/ChangeLog?spec=svn98&r=98" "url": "http://code.google.com/p/memcachedb/source/browse/trunk/ChangeLog?spec=svn98&r=98"
}, },
{
"name": "http://memcached.googlecode.com/files/memcached-1.2.8.tar.gz",
"refsource": "MISC",
"url": "http://memcached.googlecode.com/files/memcached-1.2.8.tar.gz"
},
{
"name": "memcached-processstat-info-disclosure(50444)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50444"
},
{ {
"name": "http://code.google.com/p/memcachedb/source/detail?r=98", "name": "http://code.google.com/p/memcachedb/source/detail?r=98",
"refsource": "MISC", "refsource": "MISC",
@ -71,16 +81,6 @@
"name": "http://groups.google.com/group/memcached/browse_thread/thread/ff96a9b88fb5d40e", "name": "http://groups.google.com/group/memcached/browse_thread/thread/ff96a9b88fb5d40e",
"refsource": "MISC", "refsource": "MISC",
"url": "http://groups.google.com/group/memcached/browse_thread/thread/ff96a9b88fb5d40e" "url": "http://groups.google.com/group/memcached/browse_thread/thread/ff96a9b88fb5d40e"
},
{
"name" : "http://memcached.googlecode.com/files/memcached-1.2.8.tar.gz",
"refsource" : "MISC",
"url" : "http://memcached.googlecode.com/files/memcached-1.2.8.tar.gz"
},
{
"name" : "memcached-processstat-info-disclosure(50444)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50444"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.org/0907-exploits/almondclassifiedsads-bsqlxss.txt", "name": "36003",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://packetstormsecurity.org/0907-exploits/almondclassifiedsads-bsqlxss.txt" "url": "http://secunia.com/advisories/36003"
}, },
{ {
"name": "35816", "name": "35816",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/35816" "url": "http://www.securityfocus.com/bid/35816"
}, },
{ {
"name" : "36003", "name": "http://packetstormsecurity.org/0907-exploits/almondclassifiedsads-bsqlxss.txt",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/36003" "url": "http://packetstormsecurity.org/0907-exploits/almondclassifiedsads-bsqlxss.txt"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2009-3413", "ID": "CVE-2009-3413",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20090928 Local privilege escalation vulnerability in Trustport security software",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/506751/100/0/threaded"
},
{ {
"name": "http://www.trustport.com/en/notices/security-update-of-trustport-products", "name": "http://www.trustport.com/en/notices/security-update-of-trustport-products",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "36880", "name": "36880",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36880" "url": "http://secunia.com/advisories/36880"
},
{
"name": "20090928 Local privilege escalation vulnerability in Trustport security software",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/506751/100/0/threaded"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.org/0910-exploits/X-Cart-submail-XSS.txt" "url": "http://packetstormsecurity.org/0910-exploits/X-Cart-submail-XSS.txt"
}, },
{
"name" : "36601",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/36601"
},
{ {
"name": "xcart-home-xss(53664)", "name": "xcart-home-xss(53664)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53664" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53664"
},
{
"name": "36601",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36601"
} }
] ]
} }

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://aix.software.ibm.com/aix/efixes/security/haport_advisory.asc", "name": "37267",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://aix.software.ibm.com/aix/efixes/security/haport_advisory.asc" "url": "http://secunia.com/advisories/37267"
},
{
"name" : "IZ61323",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=isg1IZ61323"
},
{
"name" : "IZ61325",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=isg1IZ61325"
}, },
{ {
"name": "IZ62630", "name": "IZ62630",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1IZ62630" "url": "http://www-01.ibm.com/support/docview.wss?uid=isg1IZ62630"
}, },
{
"name": "IZ61323",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1IZ61323"
},
{ {
"name": "36931", "name": "36931",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/36931" "url": "http://www.securityfocus.com/bid/36931"
}, },
{ {
"name" : "37267", "name": "aix-powerha-unauth-access(54154)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/37267" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54154"
},
{
"name": "IZ61325",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg1IZ61325"
}, },
{ {
"name": "ADV-2009-3153", "name": "ADV-2009-3153",
@ -88,9 +88,9 @@
"url": "http://www.vupen.com/english/advisories/2009/3153" "url": "http://www.vupen.com/english/advisories/2009/3153"
}, },
{ {
"name" : "aix-powerha-unauth-access(54154)", "name": "http://aix.software.ibm.com/aix/efixes/security/haport_advisory.asc",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54154" "url": "http://aix.software.ibm.com/aix/efixes/security/haport_advisory.asc"
} }
] ]
} }

View File

@ -52,41 +52,51 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://docs.moodle.org/en/Moodle_1.9.7_release_notes",
"refsource": "CONFIRM",
"url": "http://docs.moodle.org/en/Moodle_1.9.7_release_notes"
},
{ {
"name": "http://cvs.moodle.org/moodle/mnet/lib.php?r1=1.16.2.10&r2=1.16.2.11", "name": "http://cvs.moodle.org/moodle/mnet/lib.php?r1=1.16.2.10&r2=1.16.2.11",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://cvs.moodle.org/moodle/mnet/lib.php?r1=1.16.2.10&r2=1.16.2.11" "url": "http://cvs.moodle.org/moodle/mnet/lib.php?r1=1.16.2.10&r2=1.16.2.11"
}, },
{
"name" : "http://cvs.moodle.org/moodle/mnet/lib.php?r1=1.9.2.7&r2=1.9.2.8",
"refsource" : "CONFIRM",
"url" : "http://cvs.moodle.org/moodle/mnet/lib.php?r1=1.9.2.7&r2=1.9.2.8"
},
{ {
"name": "http://docs.moodle.org/en/Moodle_1.8.11_release_notes", "name": "http://docs.moodle.org/en/Moodle_1.8.11_release_notes",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://docs.moodle.org/en/Moodle_1.8.11_release_notes" "url": "http://docs.moodle.org/en/Moodle_1.8.11_release_notes"
}, },
{
"name" : "http://docs.moodle.org/en/Moodle_1.9.7_release_notes",
"refsource" : "CONFIRM",
"url" : "http://docs.moodle.org/en/Moodle_1.9.7_release_notes"
},
{ {
"name": "http://moodle.org/mod/forum/discuss.php?d=139106", "name": "http://moodle.org/mod/forum/discuss.php?d=139106",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://moodle.org/mod/forum/discuss.php?d=139106" "url": "http://moodle.org/mod/forum/discuss.php?d=139106"
}, },
{ {
"name" : "FEDORA-2009-13040", "name": "http://cvs.moodle.org/moodle/mnet/lib.php?r1=1.9.2.7&r2=1.9.2.8",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00704.html" "url": "http://cvs.moodle.org/moodle/mnet/lib.php?r1=1.9.2.7&r2=1.9.2.8"
},
{
"name": "ADV-2009-3455",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3455"
},
{
"name": "37614",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37614"
}, },
{ {
"name": "FEDORA-2009-13065", "name": "FEDORA-2009-13065",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00730.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00730.html"
}, },
{
"name": "FEDORA-2009-13040",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00704.html"
},
{ {
"name": "FEDORA-2009-13080", "name": "FEDORA-2009-13080",
"refsource": "FEDORA", "refsource": "FEDORA",
@ -96,16 +106,6 @@
"name": "37244", "name": "37244",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/37244" "url": "http://www.securityfocus.com/bid/37244"
},
{
"name" : "37614",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37614"
},
{
"name" : "ADV-2009-3455",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/3455"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.portcullis-security.com/338.php",
"refsource" : "MISC",
"url" : "http://www.portcullis-security.com/338.php"
},
{ {
"name": "38176", "name": "38176",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/38176" "url": "http://www.securityfocus.com/bid/38176"
}, },
{
"name": "http://www.portcullis-security.com/338.php",
"refsource": "MISC",
"url": "http://www.portcullis-security.com/338.php"
},
{ {
"name": "fta-menushell-command-execution(56248)", "name": "fta-menushell-command-execution(56248)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2121", "ID": "CVE-2012-2121",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "50732",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50732"
},
{
"name": "RHSA-2012:0743",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0743.html"
},
{
"name": "1027083",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027083"
},
{ {
"name": "[oss-security] 20120419 Re: CVE request -- kernel: kvm: device assignment page leak", "name": "[oss-security] 20120419 Re: CVE request -- kernel: kvm: device assignment page leak",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/19/16" "url": "http://www.openwall.com/lists/oss-security/2012/04/19/16"
}, },
{
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.4",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.4"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=814149", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=814149",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -72,21 +82,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/09ca8e1173bcb12e2a449698c9ae3b86a8a10195" "url": "https://github.com/torvalds/linux/commit/09ca8e1173bcb12e2a449698c9ae3b86a8a10195"
}, },
{
"name" : "RHSA-2012:0743",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0743.html"
},
{
"name" : "RHSA-2012:0676",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0676.html"
},
{ {
"name": "USN-1577-1", "name": "USN-1577-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1577-1" "url": "http://www.ubuntu.com/usn/USN-1577-1"
}, },
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.4",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.4"
},
{ {
"name": "USN-2036-1", "name": "USN-2036-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
@ -98,14 +103,9 @@
"url": "http://www.ubuntu.com/usn/USN-2037-1" "url": "http://www.ubuntu.com/usn/USN-2037-1"
}, },
{ {
"name" : "1027083", "name": "RHSA-2012:0676",
"refsource" : "SECTRACK", "refsource": "REDHAT",
"url" : "http://www.securitytracker.com/id?1027083" "url": "http://rhn.redhat.com/errata/RHSA-2012-0676.html"
},
{
"name" : "50732",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50732"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.org/files/111626/egroupware-xss.txt", "name": "48703",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://packetstormsecurity.org/files/111626/egroupware-xss.txt" "url": "http://secunia.com/advisories/48703"
}, },
{ {
"name": "http://www.egroupware.org/changelog", "name": "http://www.egroupware.org/changelog",
@ -63,9 +63,9 @@
"url": "http://www.egroupware.org/changelog" "url": "http://www.egroupware.org/changelog"
}, },
{ {
"name" : "48703", "name": "http://packetstormsecurity.org/files/111626/egroupware-xss.txt",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/48703" "url": "http://packetstormsecurity.org/files/111626/egroupware-xss.txt"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2332", "ID": "CVE-2012-2332",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20120508 Serendipity 1.6 Backend Cross-Site Scripting and SQL-Injection vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-05/0037.html"
},
{ {
"name": "[oss-security] 20120508 CVE request: XSS and SQL injection in serendipity before 1.7.1", "name": "[oss-security] 20120508 CVE request: XSS and SQL injection in serendipity before 1.7.1",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/08/6" "url": "http://www.openwall.com/lists/oss-security/2012/05/08/6"
}, },
{
"name" : "[oss-security] 20120508 Re: CVE request: XSS and SQL injection in serendipity before 1.7.1",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/05/09/2"
},
{
"name" : "http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-001.txt",
"refsource" : "MISC",
"url" : "http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-001.txt"
},
{ {
"name": "http://www.rul3z.de/index.php?/214-KORAMISADV2012-001-Serendipity-1.6-Backend-Cross-Site-Scripting-and-SQL-Injection-vulnerability.html", "name": "http://www.rul3z.de/index.php?/214-KORAMISADV2012-001-Serendipity-1.6-Backend-Cross-Site-Scripting-and-SQL-Injection-vulnerability.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.rul3z.de/index.php?/214-KORAMISADV2012-001-Serendipity-1.6-Backend-Cross-Site-Scripting-and-SQL-Injection-vulnerability.html" "url": "http://www.rul3z.de/index.php?/214-KORAMISADV2012-001-Serendipity-1.6-Backend-Cross-Site-Scripting-and-SQL-Injection-vulnerability.html"
}, },
{
"name": "53418",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53418"
},
{
"name": "http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-001.txt",
"refsource": "MISC",
"url": "http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-001.txt"
},
{
"name": "[oss-security] 20120508 Re: CVE request: XSS and SQL injection in serendipity before 1.7.1",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/09/2"
},
{ {
"name": "http://blog.s9y.org/archives/240-Serendipity-1.6.1-released.html", "name": "http://blog.s9y.org/archives/240-Serendipity-1.6.1-released.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://blog.s9y.org/archives/240-Serendipity-1.6.1-released.html" "url": "http://blog.s9y.org/archives/240-Serendipity-1.6.1-released.html"
}, },
{ {
"name" : "53418", "name": "20120508 Serendipity 1.6 Backend Cross-Site Scripting and SQL-Injection vulnerability",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/53418" "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0037.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2012-2343", "ID": "CVE-2012-2343",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-2957", "ID": "CVE-2012-2957",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,6 +57,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00" "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00"
}, },
{
"name": "symantec-web-mechanism-file-include(77113)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77113"
},
{ {
"name": "VU#108471", "name": "VU#108471",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -66,11 +71,6 @@
"name": "54429", "name": "54429",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/54429" "url": "http://www.securityfocus.com/bid/54429"
},
{
"name" : "symantec-web-mechanism-file-include(77113)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/77113"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2012-6362", "ID": "CVE-2012-6362",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-0363", "ID": "CVE-2015-0363",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{ {
"name": "72203", "name": "72203",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/72203" "url": "http://www.securityfocus.com/bid/72203"
}, },
{ {
"name" : "1031578", "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1031578" "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
}, },
{ {
"name": "oracle-cpujan2015-cve20150363(100128)", "name": "oracle-cpujan2015-cve20150363(100128)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100128" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100128"
},
{
"name": "1031578",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031578"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2015-0923", "ID": "CVE-2015-0923",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://packetstormsecurity.com/files/130179/NPDS-CMS-Revolution-13-SQL-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/130179/NPDS-CMS-Revolution-13-SQL-Injection.html"
},
{
"name" : "http://websecgeeks.com/npds-cms-sql-injection/",
"refsource" : "MISC",
"url" : "http://websecgeeks.com/npds-cms-sql-injection/"
},
{ {
"name": "http://www.npds.org/viewtopic.php?topic=26189&forum=12", "name": "http://www.npds.org/viewtopic.php?topic=26189&forum=12",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,6 +61,16 @@
"name": "http://www.npds.org/viewtopic.php?topic=26233&forum=12", "name": "http://www.npds.org/viewtopic.php?topic=26233&forum=12",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.npds.org/viewtopic.php?topic=26233&forum=12" "url": "http://www.npds.org/viewtopic.php?topic=26233&forum=12"
},
{
"name": "http://packetstormsecurity.com/files/130179/NPDS-CMS-Revolution-13-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/130179/NPDS-CMS-Revolution-13-SQL-Injection.html"
},
{
"name": "http://websecgeeks.com/npds-cms-sql-injection/",
"refsource": "MISC",
"url": "http://websecgeeks.com/npds-cms-sql-injection/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-1747", "ID": "CVE-2015-1747",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-15-250",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-250"
},
{ {
"name": "MS15-056", "name": "MS15-056",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-056" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-056"
}, },
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-250",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-250"
},
{ {
"name": "74986", "name": "74986",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-1770", "ID": "CVE-2015-1770",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS15-059",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-059"
},
{ {
"name": "75016", "name": "75016",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "1032523", "name": "1032523",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032523" "url": "http://www.securitytracker.com/id/1032523"
},
{
"name": "MS15-059",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-059"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-1921", "ID": "CVE-2015-1921",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21884060",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21884060"
},
{ {
"name": "PI38632", "name": "PI38632",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI38632" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI38632"
}, },
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21884060",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21884060"
},
{ {
"name": "74705", "name": "74705",
"refsource": "BID", "refsource": "BID",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2015-5126", "ID": "CVE-2015-5126",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-5183", "ID": "CVE-2015-5183",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1249182", "name": "1041750",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1249182" "url": "http://www.securitytracker.com/id/1041750"
}, },
{ {
"name": "RHSA-2018:2840", "name": "RHSA-2018:2840",
@ -63,9 +63,9 @@
"url": "https://access.redhat.com/errata/RHSA-2018:2840" "url": "https://access.redhat.com/errata/RHSA-2018:2840"
}, },
{ {
"name" : "1041750", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1249182",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1041750" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1249182"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8650", "ID": "CVE-2018-8650",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },