mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
12b54f3847
commit
e9538fac23
@ -53,20 +53,30 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://pridels0.blogspot.com/2006/06/phpmydirectory-xss-vuln.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://pridels0.blogspot.com/2006/06/phpmydirectory-xss-vuln.html"
|
||||
},
|
||||
{
|
||||
"name" : "18539",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/18539"
|
||||
"name": "26671",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/26671"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-2427",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/2427"
|
||||
},
|
||||
{
|
||||
"name": "http://pridels0.blogspot.com/2006/06/phpmydirectory-xss-vuln.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://pridels0.blogspot.com/2006/06/phpmydirectory-xss-vuln.html"
|
||||
},
|
||||
{
|
||||
"name": "phpmydirectory-multiple-scripts-xss(27211)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27211"
|
||||
},
|
||||
{
|
||||
"name": "18539",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18539"
|
||||
},
|
||||
{
|
||||
"name": "26669",
|
||||
"refsource": "OSVDB",
|
||||
@ -77,20 +87,10 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/26670"
|
||||
},
|
||||
{
|
||||
"name" : "26671",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/26671"
|
||||
},
|
||||
{
|
||||
"name": "20718",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20718"
|
||||
},
|
||||
{
|
||||
"name" : "phpmydirectory-multiple-scripts-xss(27211)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27211"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060629 NewsPHP 2006 PRO XSS SQL injection Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/438858/100/0/threaded"
|
||||
"name": "newsphp-rssfeed-sql-injection(27509)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27509"
|
||||
},
|
||||
{
|
||||
"name": "18726",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/18726"
|
||||
},
|
||||
{
|
||||
"name" : "26978",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/26978"
|
||||
},
|
||||
{
|
||||
"name": "1188",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1188"
|
||||
},
|
||||
{
|
||||
"name" : "newsphp-rssfeed-sql-injection(27509)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27509"
|
||||
"name": "20060629 NewsPHP 2006 PRO XSS SQL injection Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/438858/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "26978",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/26978"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "mybb-user-groups-unspecified(27446)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27446"
|
||||
},
|
||||
{
|
||||
"name": "http://community.mybboard.net/showthread.php?tid=10115",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "20873",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/20873"
|
||||
},
|
||||
{
|
||||
"name" : "mybb-user-groups-unspecified(27446)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27446"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/443171/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "1413",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/1413"
|
||||
},
|
||||
{
|
||||
"name": "virtualwar-calendar-xss(28552)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28552"
|
||||
},
|
||||
{
|
||||
"name": "1413",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/1413"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,60 +52,60 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20060913 Cisco IOS VTP issues",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/445896/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060913 Re: Cisco IOS VTP issues",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/445938/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.phenoelit.de/stuff/CiscoVTP.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.phenoelit.de/stuff/CiscoVTP.txt"
|
||||
},
|
||||
{
|
||||
"name" : "20060913 Cisco VLAN Trunking Protocol Vulnerabilities",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "VU#821420",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/821420"
|
||||
},
|
||||
{
|
||||
"name" : "19998",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19998"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-3600",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/3600"
|
||||
},
|
||||
{
|
||||
"name": "28775",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/28775"
|
||||
},
|
||||
{
|
||||
"name" : "1016843",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1016843"
|
||||
},
|
||||
{
|
||||
"name": "21896",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21896"
|
||||
},
|
||||
{
|
||||
"name": "19998",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19998"
|
||||
},
|
||||
{
|
||||
"name": "20060913 Cisco VLAN Trunking Protocol Vulnerabilities",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml"
|
||||
},
|
||||
{
|
||||
"name": "1016843",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1016843"
|
||||
},
|
||||
{
|
||||
"name": "20060913 Re: Cisco IOS VTP issues",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/445938/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "VU#821420",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/821420"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3600",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3600"
|
||||
},
|
||||
{
|
||||
"name": "cisco-ios-vtp-version-dos(28924)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28924"
|
||||
},
|
||||
{
|
||||
"name": "20060913 Cisco IOS VTP issues",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/445896/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,24 +58,24 @@
|
||||
"url": "http://whizzo.uoregon.edu/public/src/alphamail/ChangeLog"
|
||||
},
|
||||
{
|
||||
"name" : "19996",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/19996"
|
||||
"name": "alphamail-logging-password-disclosure(28907)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28907"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-3592",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/3592"
|
||||
},
|
||||
{
|
||||
"name": "19996",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19996"
|
||||
},
|
||||
{
|
||||
"name": "21871",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21871"
|
||||
},
|
||||
{
|
||||
"name" : "alphamail-logging-password-disclosure(28907)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28907"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,30 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/453475/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051096.html"
|
||||
},
|
||||
{
|
||||
"name": "http://gleg.net/vulndisco_meta.shtml",
|
||||
"refsource": "MISC",
|
||||
"url": "http://gleg.net/vulndisco_meta.shtml"
|
||||
},
|
||||
{
|
||||
"name" : "http://gleg.net/fprot.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://gleg.net/fprot.txt"
|
||||
},
|
||||
{
|
||||
"name" : "2893",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/2893"
|
||||
"name": "23328",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23328"
|
||||
},
|
||||
{
|
||||
"name": "http://www.f-prot.com/news/gen_news/061201_release_unix467.html",
|
||||
@ -83,19 +68,9 @@
|
||||
"url": "http://www.f-prot.com/news/gen_news/061201_release_unix467.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200612-12",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200612-12.xml"
|
||||
},
|
||||
{
|
||||
"name" : "21086",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21086"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-4830",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/4830"
|
||||
"name": "22879",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/22879"
|
||||
},
|
||||
{
|
||||
"name": "30406",
|
||||
@ -108,14 +83,39 @@
|
||||
"url": "http://securitytracker.com/id?1017331"
|
||||
},
|
||||
{
|
||||
"name" : "22879",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/22879"
|
||||
"name": "21086",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21086"
|
||||
},
|
||||
{
|
||||
"name" : "23328",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23328"
|
||||
"name": "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/453475/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://gleg.net/fprot.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://gleg.net/fprot.txt"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200612-12",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200612-12.xml"
|
||||
},
|
||||
{
|
||||
"name": "20061204 F-Prot Antivirus for Unix: heap overflow and Denial of Service",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051096.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-4830",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/4830"
|
||||
},
|
||||
{
|
||||
"name": "2893",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2893"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2006-6605",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,31 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://secunia.com/secunia_research/2006-75/advisory/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secunia.com/secunia_research/2006-75/advisory/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mailenable.com/hotfix/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mailenable.com/hotfix/"
|
||||
},
|
||||
{
|
||||
"name" : "21645",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21645"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-5052",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2006/5052"
|
||||
},
|
||||
{
|
||||
"name": "1017395",
|
||||
"refsource": "SECTRACK",
|
||||
@ -91,6 +66,31 @@
|
||||
"name": "2053",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/2053"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mailenable.com/hotfix/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mailenable.com/hotfix/"
|
||||
},
|
||||
{
|
||||
"name": "21645",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21645"
|
||||
},
|
||||
{
|
||||
"name": "20061218 Secunia Research: MailEnable POP Service \"PASS\" Command BufferOverflow",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/454713/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2006-75/advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2006-75/advisory/"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-5052",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2006/5052"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "23376",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/23376"
|
||||
},
|
||||
{
|
||||
"name": "sambar-size-dos(30920)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30920"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securityfocus.com/data/vulnerabilities/exploits/21617.php",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securityfocus.com/data/vulnerabilities/exploits/21617.php"
|
||||
},
|
||||
{
|
||||
"name" : "2934",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/2934"
|
||||
},
|
||||
{
|
||||
"name" : "21617",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/21617"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2006-5041",
|
||||
"refsource": "VUPEN",
|
||||
@ -78,14 +78,14 @@
|
||||
"url": "http://securitytracker.com/id?1017393"
|
||||
},
|
||||
{
|
||||
"name" : "23376",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/23376"
|
||||
"name": "2934",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2934"
|
||||
},
|
||||
{
|
||||
"name" : "sambar-size-dos(30920)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30920"
|
||||
"name": "21617",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/21617"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20061228 OpenSER OSP Module remote code execution",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/455412/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "21801",
|
||||
"refsource": "BID",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "openser-validateospheader-bo(31151)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31151"
|
||||
},
|
||||
{
|
||||
"name": "20061228 OpenSER OSP Module remote code execution",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/455412/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "2257",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/2257"
|
||||
},
|
||||
{
|
||||
"name": "19737",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/19737"
|
||||
},
|
||||
{
|
||||
"name": "2257",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/2257"
|
||||
},
|
||||
{
|
||||
"name": "cliserv-clheaders-file-include(28590)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,29 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20100521 PHP-Calendar \"description\" and \"lastaction\" Cross Site Scripting Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/511395/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/1005-advisories/phpcalendar-xss.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/1005-advisories/phpcalendar-xss.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://php-calendar.blogspot.com/2010/05/php-calendar-20-beta7.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://php-calendar.blogspot.com/2010/05/php-calendar-20-beta7.html"
|
||||
},
|
||||
{
|
||||
"name" : "40334",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/40334"
|
||||
},
|
||||
{
|
||||
"name" : "33899",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33899"
|
||||
"name": "phpcalendar-description-xss(58861)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58861"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1202",
|
||||
@ -83,9 +63,29 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1202"
|
||||
},
|
||||
{
|
||||
"name" : "phpcalendar-description-xss(58861)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58861"
|
||||
"name": "20100521 PHP-Calendar \"description\" and \"lastaction\" Cross Site Scripting Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/511395/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "40334",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/40334"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/1005-advisories/phpcalendar-xss.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/1005-advisories/phpcalendar-xss.txt"
|
||||
},
|
||||
{
|
||||
"name": "33899",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33899"
|
||||
},
|
||||
{
|
||||
"name": "http://php-calendar.blogspot.com/2010/05/php-calendar-20-beta7.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://php-calendar.blogspot.com/2010/05/php-calendar-20-beta7.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,21 +52,36 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "audio-converter-pls-bo(59206)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59206"
|
||||
},
|
||||
{
|
||||
"name": "40081",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/40081"
|
||||
},
|
||||
{
|
||||
"name": "13760",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/13760"
|
||||
},
|
||||
{
|
||||
"name" : "13763",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/13763"
|
||||
"name": "65256",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/65256"
|
||||
},
|
||||
{
|
||||
"name": "http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-048-d-r-software-multiple-products/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-048-d-r-software-multiple-products/"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2010-1387",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1387"
|
||||
},
|
||||
{
|
||||
"name": "40618",
|
||||
"refsource": "BID",
|
||||
@ -78,24 +93,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/40631"
|
||||
},
|
||||
{
|
||||
"name" : "65256",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/65256"
|
||||
},
|
||||
{
|
||||
"name" : "40081",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/40081"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2010-1387",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2010/1387"
|
||||
},
|
||||
{
|
||||
"name" : "audio-converter-pls-bo(59206)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/59206"
|
||||
"name": "13763",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/13763"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "14016",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/14016"
|
||||
},
|
||||
{
|
||||
"name" : "15237",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/15237"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/1006-exploits/adaptcms200-rfi.txt",
|
||||
"refsource": "MISC",
|
||||
@ -76,6 +66,16 @@
|
||||
"name": "adaptcms-init-file-include(59752)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59752"
|
||||
},
|
||||
{
|
||||
"name": "15237",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/15237"
|
||||
},
|
||||
{
|
||||
"name": "14016",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/14016"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2011-0093",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,45 +52,45 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS11-008",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-008"
|
||||
},
|
||||
{
|
||||
"name" : "46138",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/46138"
|
||||
},
|
||||
{
|
||||
"name": "70829",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/70829"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:12469",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12469"
|
||||
},
|
||||
{
|
||||
"name" : "1025043",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1025043"
|
||||
},
|
||||
{
|
||||
"name" : "43254",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43254"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0321",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0321"
|
||||
},
|
||||
{
|
||||
"name": "MS11-008",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-008"
|
||||
},
|
||||
{
|
||||
"name": "ms-visio-data-code-execution(64924)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64924"
|
||||
},
|
||||
{
|
||||
"name": "1025043",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1025043"
|
||||
},
|
||||
{
|
||||
"name": "46138",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/46138"
|
||||
},
|
||||
{
|
||||
"name": "43254",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43254"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:12469",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12469"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2011-0150",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT4554",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT4554"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4564",
|
||||
"refsource": "CONFIRM",
|
||||
@ -77,6 +72,11 @@
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT4554",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT4554"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2011-03-09-2",
|
||||
"refsource": "APPLE",
|
||||
|
@ -52,40 +52,40 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "DSA-2168",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2011/dsa-2168"
|
||||
},
|
||||
{
|
||||
"name": "46428",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/46428"
|
||||
},
|
||||
{
|
||||
"name" : "1025095",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1025095"
|
||||
},
|
||||
{
|
||||
"name" : "43371",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43371"
|
||||
},
|
||||
{
|
||||
"name" : "43407",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43407"
|
||||
"name": "DSA-2168",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2011/dsa-2168"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0410",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0410"
|
||||
},
|
||||
{
|
||||
"name": "43371",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43371"
|
||||
},
|
||||
{
|
||||
"name": "1025095",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1025095"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0411",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2011/0411"
|
||||
},
|
||||
{
|
||||
"name": "43407",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43407"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "15901",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/15901"
|
||||
},
|
||||
{
|
||||
"name": "42790",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/42790"
|
||||
},
|
||||
{
|
||||
"name": "15901",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/15901"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "IY99978",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1IY99978"
|
||||
},
|
||||
{
|
||||
"name": "43030",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43030"
|
||||
},
|
||||
{
|
||||
"name": "IY99978",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg1IY99978"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,19 +58,9 @@
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21473989"
|
||||
},
|
||||
{
|
||||
"name" : "PM35478",
|
||||
"name": "PM35611",
|
||||
"refsource": "AIXAPAR",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1PM35478"
|
||||
},
|
||||
{
|
||||
"name" : "PM35480",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1PM35480"
|
||||
},
|
||||
{
|
||||
"name" : "PM35545",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1PM35545"
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM35611"
|
||||
},
|
||||
{
|
||||
"name": "PM35609",
|
||||
@ -78,20 +68,30 @@
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM35609"
|
||||
},
|
||||
{
|
||||
"name" : "PM35611",
|
||||
"name": "43965",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/43965"
|
||||
},
|
||||
{
|
||||
"name": "PM35545",
|
||||
"refsource": "AIXAPAR",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1PM35611"
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM35545"
|
||||
},
|
||||
{
|
||||
"name": "PM35480",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM35480"
|
||||
},
|
||||
{
|
||||
"name": "PM35478",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg1PM35478"
|
||||
},
|
||||
{
|
||||
"name": "47122",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/47122"
|
||||
},
|
||||
{
|
||||
"name" : "43965",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/43965"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2011-0833",
|
||||
"refsource": "VUPEN",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-1749",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20140425 Re: CVE request: CVE-2011-1089-like flaw in mount.nfs",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/04/25/5"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=697975",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=697975"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:0310",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-0310.html"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/Changelog-nfs-utils-1.2.4/download",
|
||||
@ -63,19 +68,14 @@
|
||||
"url": "http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/Changelog-nfs-utils-1.2.4/download"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=697975",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=697975"
|
||||
"name": "[oss-security] 20140425 Re: CVE request: CVE-2011-1089-like flaw in mount.nfs",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/04/25/5"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:1534",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2011-1534.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2012:0310",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0310.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2011-4427",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-4594",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20111208 Re: CVE Request -- kernel: send(m)msg: user pointer dereferences",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/12/08/4"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bc909d9ddbf7778371e36a651d6e4194b1cc7d4c",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bc909d9ddbf7778371e36a651d6e4194b1cc7d4c"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1",
|
||||
"name": "https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
|
||||
"url": "https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=761646",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761646"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c",
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://github.com/torvalds/linux/commit/bc909d9ddbf7778371e36a651d6e4194b1cc7d4c"
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20111208 Re: CVE Request -- kernel: send(m)msg: user pointer dereferences",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/12/08/4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-4596",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[openstack] 20111213 [OSSA 2011-001] Path traversal issues registering malicious images using EC2 API (CVE-2011-4596)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.launchpad.net/openstack/msg06105.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.launchpad.net/nova/+bug/885167",
|
||||
"name": "https://github.com/openstack/nova/commit/ad3241929ea00569c74505ed002208ce360c667e",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://bugs.launchpad.net/nova/+bug/885167"
|
||||
"url": "https://github.com/openstack/nova/commit/ad3241929ea00569c74505ed002208ce360c667e"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.launchpad.net/nova/+bug/894755",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.launchpad.net/nova/+bug/894755"
|
||||
},
|
||||
{
|
||||
"name": "[openstack] 20111213 [OSSA 2011-001] Path traversal issues registering malicious images using EC2 API (CVE-2011-4596)",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.launchpad.net/openstack/msg06105.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/openstack/nova/commit/76363226bd8533256f7795bba358d7f4b8a6c9e6",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/openstack/nova/commit/76363226bd8533256f7795bba358d7f4b8a6c9e6"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/openstack/nova/commit/ad3241929ea00569c74505ed002208ce360c667e",
|
||||
"name": "https://bugs.launchpad.net/nova/+bug/885167",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "https://github.com/openstack/nova/commit/ad3241929ea00569c74505ed002208ce360c667e"
|
||||
"url": "https://bugs.launchpad.net/nova/+bug/885167"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2011-4881",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2014-123456",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,9 +53,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "32867",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/32867"
|
||||
"name": "105708",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/show/osvdb/105708"
|
||||
},
|
||||
{
|
||||
"name": "https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/"
|
||||
},
|
||||
{
|
||||
"name": "105707",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/show/osvdb/105707"
|
||||
},
|
||||
{
|
||||
"name": "20140411 CSRF and stored XSS in Quick Page/Post Redirect Plugin (WordPress plugin)",
|
||||
@ -68,30 +78,20 @@
|
||||
"url": "http://packetstormsecurity.com/files/126127"
|
||||
},
|
||||
{
|
||||
"name" : "https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/"
|
||||
},
|
||||
{
|
||||
"name" : "https://wordpress.org/plugins/quick-pagepost-redirect-plugin/changelog/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://wordpress.org/plugins/quick-pagepost-redirect-plugin/changelog/"
|
||||
},
|
||||
{
|
||||
"name" : "105707",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/show/osvdb/105707"
|
||||
},
|
||||
{
|
||||
"name" : "105708",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/show/osvdb/105708"
|
||||
"name": "32867",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/32867"
|
||||
},
|
||||
{
|
||||
"name": "57883",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/57883"
|
||||
},
|
||||
{
|
||||
"name": "https://wordpress.org/plugins/quick-pagepost-redirect-plugin/changelog/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wordpress.org/plugins/quick-pagepost-redirect-plugin/changelog/"
|
||||
},
|
||||
{
|
||||
"name": "quickpage-wordpress-cve20142598-csrf(92528)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2014-3264",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20140430 SEC Consult SA-20140430-0 :: SQL injection and persistent XSS in the Typo3 3rd party extension si_bibtex",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/531980/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "20140430 SEC Consult SA-20140430-0 :: SQL injection and persistent XSS in the Typo3 3rd party extension si_bibtex",
|
||||
"refsource": "FULLDISC",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "67145",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/67145"
|
||||
},
|
||||
{
|
||||
"name": "20140430 SEC Consult SA-20140430-0 :: SQL injection and persistent XSS in the Typo3 3rd party extension si_bibtex",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/531980/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Aug/55"
|
||||
},
|
||||
{
|
||||
"name" : "20140830 Re: [The ManageOwnage Series, part I]: blind SQL injection in two servlets (metasploit module included)",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2014/Aug/85"
|
||||
"name": "69305",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/69305"
|
||||
},
|
||||
{
|
||||
"name": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc_pmp_it360_sqli.txt",
|
||||
@ -78,9 +78,9 @@
|
||||
"url": "http://packetstormsecurity.com/files/127973/ManageEngine-Password-Manager-MetadataServlet.dat-SQL-Injection.html"
|
||||
},
|
||||
{
|
||||
"name" : "69305",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/69305"
|
||||
"name": "20140830 Re: [The ManageOwnage Series, part I]: blind SQL injection in two servlets (metasploit module included)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Aug/85"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20141124 Docker 1.3.2 - Security Advisory [24 Nov 2014]",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2014/11/24/5"
|
||||
},
|
||||
{
|
||||
"name" : "https://docs.docker.com/v1.3/release-notes/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://docs.docker.com/v1.3/release-notes/"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2014-15779",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:1596",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html"
|
||||
"name": "60241",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/60241"
|
||||
},
|
||||
{
|
||||
"name": "60171",
|
||||
@ -78,9 +63,24 @@
|
||||
"url": "http://secunia.com/advisories/60171"
|
||||
},
|
||||
{
|
||||
"name" : "60241",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/60241"
|
||||
"name": "https://docs.docker.com/v1.3/release-notes/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://docs.docker.com/v1.3/release-notes/"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2014:1596",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2014-15779",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20141124 Docker 1.3.2 - Security Advisory [24 Nov 2014]",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2014/11/24/5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7470",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
"name": "VU#844385",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/844385"
|
||||
},
|
||||
{
|
||||
"name": "VU#582497",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name" : "VU#844385",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/844385"
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2014-7707",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
},
|
||||
{
|
||||
"name": "VU#319905",
|
||||
"refsource": "CERT-VN",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "VU#582497",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/582497"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2017-04-01.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2017-04-01.html"
|
||||
},
|
||||
{
|
||||
"name": "97347",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97347"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2017-04-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2017-04-01.html"
|
||||
},
|
||||
{
|
||||
"name": "1038201",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"DATE_PUBLIC": "2017-12-04T00:00:00",
|
||||
"ID": "CVE-2017-0880",
|
||||
"STATE": "PUBLIC"
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30a61ddf8117c26ac5b295e1233eaa9629a94ca3",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30a61ddf8117c26ac5b295e1233eaa9629a94ca3"
|
||||
"name": "1041432",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041432"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/torvalds/linux/commit/30a61ddf8117c26ac5b295e1233eaa9629a94ca3",
|
||||
@ -63,9 +63,14 @@
|
||||
"url": "https://github.com/torvalds/linux/commit/30a61ddf8117c26ac5b295e1233eaa9629a94ca3"
|
||||
},
|
||||
{
|
||||
"name" : "1041432",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041432"
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30a61ddf8117c26ac5b295e1233eaa9629a94ca3",
|
||||
"refsource": "MISC",
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30a61ddf8117c26ac5b295e1233eaa9629a94ca3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -74,25 +74,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/136857",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/136857"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22011561",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22011561"
|
||||
},
|
||||
{
|
||||
"name" : "102863",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/102863"
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/136857",
|
||||
"refsource": "MISC",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/136857"
|
||||
},
|
||||
{
|
||||
"name": "1040299",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040299"
|
||||
},
|
||||
{
|
||||
"name": "102863",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-1975",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-040-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-040-01"
|
||||
},
|
||||
{
|
||||
"name": "96147",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96147"
|
||||
},
|
||||
{
|
||||
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-040-01",
|
||||
"refsource": "MISC",
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-040-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2017-5526",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20170118 CVE request Qemu: audio: memory leakage in es1370 device",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2017/01/18/1"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20170118 Re: CVE request Qemu: audio: memory leakage in es1370 device",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2017/01/18/8"
|
||||
"name": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=069eb7b2b8fc47c7cb52e5a4af23ea98d939e3da",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.qemu-project.org/?p=qemu.git;a=commit;h=069eb7b2b8fc47c7cb52e5a4af23ea98d939e3da"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
|
||||
@ -68,14 +63,19 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=069eb7b2b8fc47c7cb52e5a4af23ea98d939e3da",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.qemu-project.org/?p=qemu.git;a=commit;h=069eb7b2b8fc47c7cb52e5a4af23ea98d939e3da"
|
||||
"name": "[oss-security] 20170118 Re: CVE request Qemu: audio: memory leakage in es1370 device",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/01/18/8"
|
||||
},
|
||||
{
|
||||
"name": "95669",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/95669"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20170118 CVE request Qemu: audio: memory leakage in es1370 device",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/01/18/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user