"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:26:14 +00:00
parent 20fc5552f3
commit eff3e589f9
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 4507 additions and 4507 deletions

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "00145",
"refsource" : "SUN",
"url" : "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/145"
},
{ {
"name": "208", "name": "208",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/208" "url": "http://www.securityfocus.com/bid/208"
},
{
"name": "00145",
"refsource": "SUN",
"url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/145"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0072.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0072.html"
}, },
{
"name" : "20001106 Re: FW: Filesystem Access + VolanoChat = VChat admin (fwd)",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-11/0085.html"
},
{ {
"name": "1906", "name": "1906",
"refsource": "BID", "refsource": "BID",
@ -71,6 +66,11 @@
"name": "volanochatpro-plaintext-password(5465)", "name": "volanochatpro-plaintext-password(5465)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5465" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5465"
},
{
"name": "20001106 Re: FW: Filesystem Access + VolanoChat = VChat admin (fwd)",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0085.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://guff.szub.net/2005/07/04/quick-and-dirty-security/",
"refsource" : "CONFIRM",
"url" : "http://guff.szub.net/2005/07/04/quick-and-dirty-security/"
},
{ {
"name": "1014376", "name": "1014376",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -66,6 +61,11 @@
"name": "15900", "name": "15900",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15900" "url": "http://secunia.com/advisories/15900"
},
{
"name": "http://guff.szub.net/2005/07/04/quick-and-dirty-security/",
"refsource": "CONFIRM",
"url": "http://guff.szub.net/2005/07/04/quick-and-dirty-security/"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20050712 Dragonfly Shopping Cart Multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=112121930328341&w=2"
},
{ {
"name": "http://www.digitalparadox.org/viewadvisories.ah?view=46", "name": "http://www.digitalparadox.org/viewadvisories.ah?view=46",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.digitalparadox.org/viewadvisories.ah?view=46" "url": "http://www.digitalparadox.org/viewadvisories.ah?view=46"
}, },
{
"name": "20050712 Dragonfly Shopping Cart Multiple vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112121930328341&w=2"
},
{ {
"name": "1014451", "name": "1014451",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20050716 PowerDNS 2.9.18 fixes two security issues affecting users of LDAP",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=112155941310297&w=2"
},
{ {
"name": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18", "name": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -68,14 +63,19 @@
"url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html" "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
}, },
{ {
"name" : "14290", "name": "20050716 PowerDNS 2.9.18 fixes two security issues affecting users of LDAP",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/14290" "url": "http://marc.info/?l=bugtraq&m=112155941310297&w=2"
}, },
{ {
"name": "1014504", "name": "1014504",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014504" "url": "http://securitytracker.com/id?1014504"
},
{
"name": "14290",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14290"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20050813 Low security hole affecting Mentor's ADSLFR4II router",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=112394620905095&w=2"
},
{ {
"name": "14557", "name": "14557",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/14557" "url": "http://www.securityfocus.com/bid/14557"
}, },
{
"name": "20050813 Low security hole affecting Mentor's ADSLFR4II router",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112394620905095&w=2"
},
{ {
"name": "16445", "name": "16445",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20050922 PhpMyFAQ 1.5.1 multiple vulnerabilities", "name": "16933",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://marc.info/?l=bugtraq&m=112749230124091&w=2" "url": "http://secunia.com/advisories/16933"
},
{
"name" : "http://rgod.altervista.org/phpmyfuck151.html",
"refsource" : "MISC",
"url" : "http://rgod.altervista.org/phpmyfuck151.html"
}, },
{ {
"name": "14930", "name": "14930",
@ -73,19 +68,24 @@
"url": "http://www.osvdb.org/19670" "url": "http://www.osvdb.org/19670"
}, },
{ {
"name" : "1014968", "name": "http://rgod.altervista.org/phpmyfuck151.html",
"refsource" : "SECTRACK", "refsource": "MISC",
"url" : "http://securitytracker.com/id?1014968" "url": "http://rgod.altervista.org/phpmyfuck151.html"
}, },
{ {
"name" : "16933", "name": "20050922 PhpMyFAQ 1.5.1 multiple vulnerabilities",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/16933" "url": "http://marc.info/?l=bugtraq&m=112749230124091&w=2"
}, },
{ {
"name": "phpmyfaq-log-user-information-disclosure(22405)", "name": "phpmyfaq-log-user-information-disclosure(22405)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22405" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22405"
},
{
"name": "1014968",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014968"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "900345",
"refsource" : "MSKB",
"url" : "http://support.microsoft.com/kb/900345"
},
{ {
"name": "883639", "name": "883639",
"refsource": "MSKB", "refsource": "MSKB",
"url": "http://support.microsoft.com/kb/883639" "url": "http://support.microsoft.com/kb/883639"
},
{
"name": "900345",
"refsource": "MSKB",
"url": "http://support.microsoft.com/kb/900345"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20051025 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=113026417802703&w=2"
},
{ {
"name": "20051026 Update for the magic byte bug", "name": "20051026 Update for the magic byte bug",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=113036131526435&w=2" "url": "http://marc.info/?l=bugtraq&m=113036131526435&w=2"
},
{
"name": "20051025 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=113026417802703&w=2"
} }
] ]
} }

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20051104 Clam AntiVirus Cabinet-file handling Denial of Service Vulnerability", "name": "17451",
"refsource" : "IDEFENSE", "refsource": "SECUNIA",
"url" : "http://www.idefense.com/application/poi/display?id=334&type=vulnerabilities" "url": "http://secunia.com/advisories/17451"
},
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=368319",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=368319"
},
{
"name" : "DSA-887",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-887"
}, },
{ {
"name": "GLSA-200511-04", "name": "GLSA-200511-04",
@ -73,9 +63,9 @@
"url": "http://www.gentoo.org/security/en/glsa/glsa-200511-04.xml" "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-04.xml"
}, },
{ {
"name" : "MDKSA-2005:205", "name": "17501",
"refsource" : "MANDRIVA", "refsource": "SECUNIA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:205" "url": "http://secunia.com/advisories/17501"
}, },
{ {
"name": "15317", "name": "15317",
@ -83,24 +73,19 @@
"url": "http://www.securityfocus.com/bid/15317" "url": "http://www.securityfocus.com/bid/15317"
}, },
{ {
"name" : "ADV-2005-2294", "name": "17184",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2294"
},
{
"name" : "20484",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/20484"
},
{
"name" : "1015154",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015154"
},
{
"name" : "17434",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/17434" "url": "http://secunia.com/advisories/17184"
},
{
"name": "20051104 Clam AntiVirus Cabinet-file handling Denial of Service Vulnerability",
"refsource": "IDEFENSE",
"url": "http://www.idefense.com/application/poi/display?id=334&type=vulnerabilities"
},
{
"name": "MDKSA-2005:205",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:205"
}, },
{ {
"name": "17559", "name": "17559",
@ -108,24 +93,39 @@
"url": "http://secunia.com/advisories/17559" "url": "http://secunia.com/advisories/17559"
}, },
{ {
"name" : "17184", "name": "20484",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/17184" "url": "http://www.osvdb.org/20484"
}, },
{ {
"name" : "17451", "name": "http://sourceforge.net/project/shownotes.php?release_id=368319",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/17451" "url": "http://sourceforge.net/project/shownotes.php?release_id=368319"
}, },
{ {
"name" : "17501", "name": "ADV-2005-2294",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/17501" "url": "http://www.vupen.com/english/advisories/2005/2294"
}, },
{ {
"name": "150", "name": "150",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/150" "url": "http://securityreason.com/securityalert/150"
},
{
"name": "DSA-887",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-887"
},
{
"name": "17434",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17434"
},
{
"name": "1015154",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015154"
} }
] ]
} }

View File

@ -53,54 +53,54 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20051128 Free Web Stat Multiple XSS Vulnerabilities", "name": "freewebstat-stat-search-xss(23391)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/417902/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23391"
},
{
"name" : "http://www.ush.it/2005/11/25/free-web-stat/",
"refsource" : "MISC",
"url" : "http://www.ush.it/2005/11/25/free-web-stat/"
},
{
"name" : "http://www.freewebstat.com/changelog-english.html",
"refsource" : "MISC",
"url" : "http://www.freewebstat.com/changelog-english.html"
},
{
"name" : "15601",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15601"
},
{
"name" : "ADV-2005-2646",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2646"
},
{
"name" : "21207",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/21207"
},
{
"name" : "1015301",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015301"
}, },
{ {
"name": "17783", "name": "17783",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17783" "url": "http://secunia.com/advisories/17783"
}, },
{
"name": "20051128 Free Web Stat Multiple XSS Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/417902/100/0/threaded"
},
{
"name": "1015301",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015301"
},
{
"name": "ADV-2005-2646",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2646"
},
{
"name": "15601",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15601"
},
{
"name": "http://www.freewebstat.com/changelog-english.html",
"refsource": "MISC",
"url": "http://www.freewebstat.com/changelog-english.html"
},
{
"name": "21207",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/21207"
},
{
"name": "http://www.ush.it/2005/11/25/free-web-stat/",
"refsource": "MISC",
"url": "http://www.ush.it/2005/11/25/free-web-stat/"
},
{ {
"name": "freewebstat-logdb-xss(23387)", "name": "freewebstat-logdb-xss(23387)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23387" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23387"
},
{
"name" : "freewebstat-stat-search-xss(23391)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23391"
} }
] ]
} }

View File

@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20051128 Php Web Statistik Multiple Vulnerabilities", "name": "ADV-2005-2645",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://cert.uni-stuttgart.de/archive/bugtraq/2005/11/msg00325.html" "url": "http://www.vupen.com/english/advisories/2005/2645"
},
{
"name" : "http://www.ush.it/2005/11/19/php-web-statistik/",
"refsource" : "MISC",
"url" : "http://www.ush.it/2005/11/19/php-web-statistik/"
}, },
{ {
"name": "http://freewebstat.com/changelog-english.html", "name": "http://freewebstat.com/changelog-english.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://freewebstat.com/changelog-english.html" "url": "http://freewebstat.com/changelog-english.html"
}, },
{
"name" : "ADV-2005-2645",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2645"
},
{ {
"name": "21211", "name": "21211",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/21211" "url": "http://www.osvdb.org/21211"
}, },
{
"name": "phpwebstatistik-stat-dos(23384)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23384"
},
{
"name": "20051128 Php Web Statistik Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://cert.uni-stuttgart.de/archive/bugtraq/2005/11/msg00325.html"
},
{ {
"name": "17789", "name": "17789",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17789" "url": "http://secunia.com/advisories/17789"
}, },
{ {
"name" : "phpwebstatistik-stat-dos(23384)", "name": "http://www.ush.it/2005/11/19/php-web-statistik/",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23384" "url": "http://www.ush.it/2005/11/19/php-web-statistik/"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "17972",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17972"
},
{ {
"name": "http://pridels0.blogspot.com/2005/12/ckgold-xss-vuln.html", "name": "http://pridels0.blogspot.com/2005/12/ckgold-xss-vuln.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://pridels0.blogspot.com/2005/12/ckgold-xss-vuln.html" "url": "http://pridels0.blogspot.com/2005/12/ckgold-xss-vuln.html"
}, },
{
"name" : "15854",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15854"
},
{
"name" : "ADV-2005-2873",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2873"
},
{ {
"name": "21675", "name": "21675",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/21675" "url": "http://www.osvdb.org/21675"
}, },
{ {
"name" : "17972", "name": "ADV-2005-2873",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/17972" "url": "http://www.vupen.com/english/advisories/2005/2873"
},
{
"name": "15854",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15854"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20051221 Tolva PHP website system Remote File Include",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/419992/100/0/threaded"
},
{ {
"name": "16000", "name": "16000",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/16000" "url": "http://www.securityfocus.com/bid/16000"
}, },
{
"name": "20051221 Tolva PHP website system Remote File Include",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/419992/100/0/threaded"
},
{ {
"name": "288", "name": "288",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2005-3010",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/3010"
},
{
"name": "15972",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15972"
},
{ {
"name": "20051220 [ACSSEC-2005-11-25-0x5] FTGate 4.4 [Build 4.4.000 Oct 26 2005] Fo rmat String Overflow", "name": "20051220 [ACSSEC-2005-11-25-0x5] FTGate 4.4 [Build 4.4.000 Oct 26 2005] Fo rmat String Overflow",
"refsource": "FULLDISC", "refsource": "FULLDISC",
@ -61,16 +71,6 @@
"name": "20051220 [ACSSEC-2005-11-25-0x6] FTGate 4.4 [Build 4.4.000 Oct 26 2005] Fo rmat String Overflow", "name": "20051220 [ACSSEC-2005-11-25-0x6] FTGate 4.4 [Build 4.4.000 Oct 26 2005] Fo rmat String Overflow",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-12/1019.html" "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-12/1019.html"
},
{
"name" : "15972",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15972"
},
{
"name" : "ADV-2005-3010",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/3010"
} }
] ]
} }

View File

@ -52,31 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20050705 Quickblogger",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0090.html"
},
{
"name" : "http://exploitlabs.com/files/advisories/EXPL-A-2005-011-quickblogger.txt",
"refsource" : "MISC",
"url" : "http://exploitlabs.com/files/advisories/EXPL-A-2005-011-quickblogger.txt"
},
{
"name" : "14152",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/14152"
},
{
"name" : "ADV-2005-0987",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/0987"
},
{
"name" : "15942",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/15942"
},
{ {
"name": "1014386", "name": "1014386",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -86,6 +61,31 @@
"name": "quickblogger-xss(21244)", "name": "quickblogger-xss(21244)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21244" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21244"
},
{
"name": "http://exploitlabs.com/files/advisories/EXPL-A-2005-011-quickblogger.txt",
"refsource": "MISC",
"url": "http://exploitlabs.com/files/advisories/EXPL-A-2005-011-quickblogger.txt"
},
{
"name": "15942",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15942"
},
{
"name": "ADV-2005-0987",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/0987"
},
{
"name": "20050705 Quickblogger",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0090.html"
},
{
"name": "14152",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14152"
} }
] ]
} }

View File

@ -57,55 +57,25 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://isc.sans.org/diary.html?storyid=5929" "url": "http://isc.sans.org/diary.html?storyid=5929"
}, },
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb09-01.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb09-01.html"
},
{ {
"name": "http://support.apple.com/kb/HT3549", "name": "http://support.apple.com/kb/HT3549",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3549" "url": "http://support.apple.com/kb/HT3549"
}, },
{
"name" : "APPLE-SA-2009-05-12",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name" : "GLSA-200903-23",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200903-23.xml"
},
{
"name" : "254909",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-254909-1"
},
{
"name" : "TA09-133A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name" : "oval:org.mitre.oval:def:6662",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6662"
},
{ {
"name": "oval:org.mitre.oval:def:16419", "name": "oval:org.mitre.oval:def:16419",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16419" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16419"
}, },
{ {
"name" : "1021751", "name": "35074",
"refsource" : "SECTRACK", "refsource": "SECUNIA",
"url" : "http://securitytracker.com/id?1021751" "url": "http://secunia.com/advisories/35074"
}, },
{ {
"name" : "34293", "name": "oval:org.mitre.oval:def:6662",
"refsource" : "SECUNIA", "refsource": "OVAL",
"url" : "http://secunia.com/advisories/34293" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6662"
}, },
{ {
"name": "34226", "name": "34226",
@ -113,29 +83,59 @@
"url": "http://secunia.com/advisories/34226" "url": "http://secunia.com/advisories/34226"
}, },
{ {
"name" : "35074", "name": "flash-settings-manager-click-hijacking(48902)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/35074" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48902"
}, },
{ {
"name" : "ADV-2009-0513", "name": "APPLE-SA-2009-05-12",
"refsource" : "VUPEN", "refsource": "APPLE",
"url" : "http://www.vupen.com/english/advisories/2009/0513" "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "1021751",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021751"
}, },
{ {
"name": "ADV-2009-0743", "name": "ADV-2009-0743",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0743" "url": "http://www.vupen.com/english/advisories/2009/0743"
}, },
{
"name": "http://www.adobe.com/support/security/bulletins/apsb09-01.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb09-01.html"
},
{
"name": "ADV-2009-0513",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0513"
},
{
"name": "GLSA-200903-23",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200903-23.xml"
},
{
"name": "TA09-133A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{ {
"name": "ADV-2009-1297", "name": "ADV-2009-1297",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1297" "url": "http://www.vupen.com/english/advisories/2009/1297"
}, },
{ {
"name" : "flash-settings-manager-click-hijacking(48902)", "name": "34293",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/48902" "url": "http://secunia.com/advisories/34293"
},
{
"name": "254909",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-254909-1"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/9013" "url": "http://www.exploit-db.com/exploits/9013"
}, },
{
"name" : "20090626 false? AN Guestbook LFI",
"refsource" : "VIM",
"url" : "http://www.attrition.org/pipermail/vim/2009-June/002196.html"
},
{ {
"name": "35486", "name": "35486",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/35486" "url": "http://www.securityfocus.com/bid/35486"
},
{
"name": "20090626 false? AN Guestbook LFI",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2009-June/002196.html"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "http://drupal.org/node/507572" "url": "http://drupal.org/node/507572"
}, },
{ {
"name" : "55525", "name": "35681",
"refsource" : "OSVDB", "refsource": "SECUNIA",
"url" : "http://osvdb.org/55525" "url": "http://secunia.com/advisories/35681"
}, },
{ {
"name": "1022497", "name": "1022497",
@ -68,9 +68,9 @@
"url": "http://www.securitytracker.com/id?1022497" "url": "http://www.securitytracker.com/id?1022497"
}, },
{ {
"name" : "35681", "name": "55525",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/35681" "url": "http://osvdb.org/55525"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-2469", "ID": "CVE-2009-2469",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,65 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2009/mfsa2009-37.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2009/mfsa2009-37.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=488995",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=488995"
},
{
"name" : "FEDORA-2009-7961",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html"
},
{
"name" : "RHSA-2009:1162",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2009-1162.html"
},
{ {
"name": "265068", "name": "265068",
"refsource": "SUNALERT", "refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1"
}, },
{
"name": "http://www.mozilla.org/security/announce/2009/mfsa2009-37.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-37.html"
},
{ {
"name": "1020800", "name": "1020800",
"refsource": "SUNALERT", "refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1"
}, },
{ {
"name" : "SUSE-SA:2009:042", "name": "FEDORA-2009-7961",
"refsource" : "SUSE", "refsource": "FEDORA",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html"
},
{
"name" : "SUSE-SA:2009:039",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html"
},
{
"name" : "35758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35758"
},
{
"name" : "oval:org.mitre.oval:def:10030",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10030"
},
{
"name" : "35914",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35914"
},
{
"name" : "35944",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35944"
}, },
{ {
"name": "36145", "name": "36145",
@ -118,19 +78,59 @@
"url": "http://secunia.com/advisories/36145" "url": "http://secunia.com/advisories/36145"
}, },
{ {
"name" : "36005", "name": "35944",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/36005" "url": "http://secunia.com/advisories/35944"
}, },
{ {
"name" : "ADV-2009-1972", "name": "SUSE-SA:2009:039",
"refsource" : "VUPEN", "refsource": "SUSE",
"url" : "http://www.vupen.com/english/advisories/2009/1972" "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html"
},
{
"name": "oval:org.mitre.oval:def:10030",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10030"
},
{
"name": "RHSA-2009:1162",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2009-1162.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=488995",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=488995"
},
{
"name": "35758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35758"
}, },
{ {
"name": "ADV-2009-2152", "name": "ADV-2009-2152",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2152" "url": "http://www.vupen.com/english/advisories/2009/2152"
},
{
"name": "36005",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36005"
},
{
"name": "SUSE-SA:2009:042",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html"
},
{
"name": "35914",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35914"
},
{
"name": "ADV-2009-1972",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1972"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2009-2513", "ID": "CVE-2009-2513",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-065" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-065"
}, },
{
"name" : "TA09-314A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-314A.html"
},
{ {
"name": "oval:org.mitre.oval:def:6277", "name": "oval:org.mitre.oval:def:6277",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6277" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6277"
},
{
"name": "TA09-314A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-314A.html"
} }
] ]
} }

View File

@ -58,24 +58,24 @@
"url": "http://www.opera.com/docs/changelogs/freebsd/1000/" "url": "http://www.opera.com/docs/changelogs/freebsd/1000/"
}, },
{ {
"name" : "http://www.opera.com/docs/changelogs/linux/1000/", "name": "oval:org.mitre.oval:def:5679",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://www.opera.com/docs/changelogs/linux/1000/" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5679"
}, },
{ {
"name": "http://www.opera.com/docs/changelogs/solaris/1000/", "name": "http://www.opera.com/docs/changelogs/solaris/1000/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/solaris/1000/" "url": "http://www.opera.com/docs/changelogs/solaris/1000/"
}, },
{
"name": "http://www.opera.com/docs/changelogs/linux/1000/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/linux/1000/"
},
{ {
"name": "http://www.opera.com/support/kb/view/931/", "name": "http://www.opera.com/support/kb/view/931/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.opera.com/support/kb/view/931/" "url": "http://www.opera.com/support/kb/view/931/"
},
{
"name" : "oval:org.mitre.oval:def:5679",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5679"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-3070", "ID": "CVE-2009-3070",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2009/mfsa2009-47.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2009/mfsa2009-47.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=430569",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=430569"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=437565", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=437565",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=437565" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=437565"
}, },
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=465651",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=465651"
},
{ {
"name": "DSA-1885", "name": "DSA-1885",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1885" "url": "http://www.debian.org/security/2009/dsa-1885"
}, },
{ {
"name" : "RHSA-2009:1430", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=430569",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1430.html" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=430569"
},
{
"name": "36343",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36343"
}, },
{ {
"name": "SUSE-SA:2009:048", "name": "SUSE-SA:2009:048",
@ -88,9 +78,34 @@
"url": "http://www.novell.com/linux/security/advisories/2009_48_firefox.html" "url": "http://www.novell.com/linux/security/advisories/2009_48_firefox.html"
}, },
{ {
"name" : "36343", "name": "RHSA-2009:1430",
"refsource" : "BID", "refsource": "REDHAT",
"url" : "http://www.securityfocus.com/bid/36343" "url": "http://www.redhat.com/support/errata/RHSA-2009-1430.html"
},
{
"name": "36692",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36692"
},
{
"name": "36670",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36670"
},
{
"name": "36671",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36671"
},
{
"name": "http://www.mozilla.org/security/announce/2009/mfsa2009-47.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2009/mfsa2009-47.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=465651",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=465651"
}, },
{ {
"name": "oval:org.mitre.oval:def:11702", "name": "oval:org.mitre.oval:def:11702",
@ -102,25 +117,10 @@
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6073" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6073"
}, },
{
"name" : "36671",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36671"
},
{ {
"name": "37098", "name": "37098",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37098" "url": "http://secunia.com/advisories/37098"
},
{
"name" : "36670",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36670"
},
{
"name" : "36692",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36692"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg24024414", "name": "58320",
"refsource" : "CONFIRM", "refsource": "OSVDB",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg24024414" "url": "http://osvdb.org/58320"
},
{
"name" : "LO44244",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1LO44244"
}, },
{ {
"name": "36513", "name": "36513",
@ -68,29 +63,34 @@
"url": "http://www.securityfocus.com/bid/36513" "url": "http://www.securityfocus.com/bid/36513"
}, },
{ {
"name" : "58320", "name": "LO44244",
"refsource" : "OSVDB", "refsource": "AIXAPAR",
"url" : "http://osvdb.org/58320" "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO44244"
},
{
"name" : "1022945",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1022945"
}, },
{ {
"name": "36849", "name": "36849",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36849" "url": "http://secunia.com/advisories/36849"
}, },
{
"name": "lotus-connections-simplesearch-xss(53460)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53460"
},
{ {
"name": "ADV-2009-2760", "name": "ADV-2009-2760",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2760" "url": "http://www.vupen.com/english/advisories/2009/2760"
}, },
{ {
"name" : "lotus-connections-simplesearch-xss(53460)", "name": "1022945",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/53460" "url": "http://www.securitytracker.com/id?1022945"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg24024414",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg24024414"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20091123 CORE-2009-0908: Autodesk SoftImage Scene TOC Arbitrary Command Execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/508011/100/0/threaded"
},
{ {
"name": "http://www.coresecurity.com/content/softimage-arbitrary-command-execution", "name": "http://www.coresecurity.com/content/softimage-arbitrary-command-execution",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.coresecurity.com/content/softimage-arbitrary-command-execution" "url": "http://www.coresecurity.com/content/softimage-arbitrary-command-execution"
}, },
{ {
"name" : "36637", "name": "20091123 CORE-2009-0908: Autodesk SoftImage Scene TOC Arbitrary Command Execution",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/36637" "url": "http://www.securityfocus.com/archive/1/508011/100/0/threaded"
}, },
{ {
"name": "1023229", "name": "1023229",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023229" "url": "http://securitytracker.com/id?1023229"
},
{
"name": "36637",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/36637"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/59079" "url": "http://osvdb.org/59079"
}, },
{
"name" : "36943",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36943"
},
{ {
"name": "formmax-aim-bo(53890)", "name": "formmax-aim-bo(53890)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53890" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53890"
},
{
"name": "36943",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36943"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20091110 [MORNINGSTAR-2009-02] Multiple security issues in Cute News and UTF-8 Cute News", "name": "cutenews-categories-code-execution(54243)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/507782/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54243"
}, },
{ {
"name": "http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt", "name": "http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt",
@ -63,9 +63,9 @@
"url": "http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt" "url": "http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt"
}, },
{ {
"name" : "cutenews-categories-code-execution(54243)", "name": "20091110 [MORNINGSTAR-2009-02] Multiple security issues in Cute News and UTF-8 Cute News",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54243" "url": "http://www.securityfocus.com/archive/1/507782/100/0/threaded"
} }
] ]
} }

View File

@ -52,60 +52,60 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "IC64019",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC64019"
},
{ {
"name": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT", "name": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT" "url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT"
}, },
{
"name" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT",
"refsource" : "CONFIRM",
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT"
},
{ {
"name": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v97/APARLIST.TXT", "name": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v97/APARLIST.TXT",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v97/APARLIST.TXT" "url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v97/APARLIST.TXT"
}, },
{
"name": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT",
"refsource": "CONFIRM",
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT"
},
{ {
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21293566", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21293566",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21293566" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21293566"
}, },
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21412902",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21412902"
},
{
"name" : "IC64019",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IC64019"
},
{
"name" : "IZ48106",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ48106"
},
{ {
"name": "IZ50355", "name": "IZ50355",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ50355" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ50355"
}, },
{
"name": "ADV-2009-3520",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3520"
},
{ {
"name": "37332", "name": "37332",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/37332" "url": "http://www.securityfocus.com/bid/37332"
}, },
{
"name": "IZ48106",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ48106"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21412902",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21412902"
},
{ {
"name": "37759", "name": "37759",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37759" "url": "http://secunia.com/advisories/37759"
},
{
"name" : "ADV-2009-3520",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/3520"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0319", "ID": "CVE-2015-0319",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,75 +52,75 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html"
},
{
"name" : "https://technet.microsoft.com/library/security/2755801",
"refsource" : "CONFIRM",
"url" : "https://technet.microsoft.com/library/security/2755801"
},
{ {
"name": "GLSA-201502-02", "name": "GLSA-201502-02",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
}, },
{
"name" : "RHSA-2015:0140",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0140.html"
},
{
"name" : "SUSE-SU-2015:0236",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html"
},
{
"name" : "SUSE-SU-2015:0239",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html"
},
{
"name" : "openSUSE-SU-2015:0237",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html"
},
{ {
"name": "openSUSE-SU-2015:0238", "name": "openSUSE-SU-2015:0238",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html"
}, },
{ {
"name" : "72514", "name": "62895",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/72514" "url": "http://secunia.com/advisories/62895"
}, },
{ {
"name": "1031706", "name": "1031706",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031706" "url": "http://www.securitytracker.com/id/1031706"
}, },
{
"name" : "62777",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/62777"
},
{ {
"name": "62886", "name": "62886",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62886" "url": "http://secunia.com/advisories/62886"
}, },
{ {
"name" : "62895", "name": "https://technet.microsoft.com/library/security/2755801",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/62895" "url": "https://technet.microsoft.com/library/security/2755801"
}, },
{ {
"name": "adobe-flash-cve20150319-code-exec(100707)", "name": "adobe-flash-cve20150319-code-exec(100707)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100707" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100707"
},
{
"name": "62777",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62777"
},
{
"name": "openSUSE-SU-2015:0237",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html"
},
{
"name": "SUSE-SU-2015:0236",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html"
},
{
"name": "72514",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72514"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html"
},
{
"name": "RHSA-2015:0140",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html"
},
{
"name": "SUSE-SU-2015:0239",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0347", "ID": "CVE-2015-0347",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", "name": "openSUSE-SU-2015:0718",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html"
},
{
"name" : "GLSA-201504-07",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201504-07"
},
{
"name" : "RHSA-2015:0813",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0813.html"
}, },
{ {
"name": "SUSE-SU-2015:0722", "name": "SUSE-SU-2015:0722",
@ -73,14 +63,29 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html"
}, },
{ {
"name" : "SUSE-SU-2015:0723", "name": "74062",
"refsource" : "SUSE", "refsource": "BID",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html" "url": "http://www.securityfocus.com/bid/74062"
}, },
{ {
"name" : "openSUSE-SU-2015:0718", "name": "GLSA-201504-07",
"refsource" : "SUSE", "refsource": "GENTOO",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html" "url": "https://security.gentoo.org/glsa/201504-07"
},
{
"name": "1032105",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032105"
},
{
"name": "RHSA-2015:0813",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html"
}, },
{ {
"name": "openSUSE-SU-2015:0725", "name": "openSUSE-SU-2015:0725",
@ -88,14 +93,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html"
}, },
{ {
"name" : "74062", "name": "SUSE-SU-2015:0723",
"refsource" : "BID", "refsource": "SUSE",
"url" : "http://www.securityfocus.com/bid/74062" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html"
},
{
"name" : "1032105",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032105"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-0619", "ID": "CVE-2015-0619",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20150211 Cisco Adaptive Security Appliance WebVPN Embedded Web Server Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0619"
},
{ {
"name": "72579", "name": "72579",
"refsource": "BID", "refsource": "BID",
@ -67,6 +62,11 @@
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031745" "url": "http://www.securitytracker.com/id/1031745"
}, },
{
"name": "20150211 Cisco Adaptive Security Appliance WebVPN Embedded Web Server Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0619"
},
{ {
"name": "cisco-asa-cve20150619-dos(100864)", "name": "cisco-asa-cve20150619-dos(100864)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-1079", "ID": "CVE-2015-1079",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/HT204560",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT204560"
},
{
"name" : "https://support.apple.com/HT204661",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT204661"
},
{
"name" : "https://support.apple.com/HT204662",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT204662"
},
{
"name" : "https://support.apple.com/kb/HT204949",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT204949"
},
{
"name" : "APPLE-SA-2015-03-17-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html"
},
{ {
"name": "APPLE-SA-2015-04-08-3", "name": "APPLE-SA-2015-04-08-3",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html" "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html"
}, },
{
"name" : "APPLE-SA-2015-04-08-4",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html"
},
{ {
"name": "APPLE-SA-2015-06-30-6", "name": "APPLE-SA-2015-06-30-6",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html" "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html"
}, },
{
"name": "APPLE-SA-2015-03-17-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html"
},
{
"name": "https://support.apple.com/kb/HT204949",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT204949"
},
{ {
"name": "1031936", "name": "1031936",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031936" "url": "http://www.securitytracker.com/id/1031936"
},
{
"name": "https://support.apple.com/HT204662",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT204662"
},
{
"name": "https://support.apple.com/HT204560",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT204560"
},
{
"name": "APPLE-SA-2015-04-08-4",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html"
},
{
"name": "https://support.apple.com/HT204661",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT204661"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-1721", "ID": "CVE-2015-1721",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1032525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032525"
},
{ {
"name": "38274", "name": "38274",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "MS15-061", "name": "MS15-061",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-061" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-061"
},
{
"name" : "1032525",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032525"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4234", "ID": "CVE-2015-4234",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20150630 Cisco Nexus Devices Python Subsystem Local Privilege Escalation Vulnerabilities",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=39571"
},
{ {
"name": "75502", "name": "75502",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75502" "url": "http://www.securityfocus.com/bid/75502"
}, },
{
"name": "20150630 Cisco Nexus Devices Python Subsystem Local Privilege Escalation Vulnerabilities",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39571"
},
{ {
"name": "1032765", "name": "1032765",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2015-4235", "ID": "CVE-2015-4235",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-4942", "ID": "CVE-2015-4942",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21974169",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21974169"
},
{ {
"name": "1034698", "name": "1034698",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034698" "url": "http://www.securitytracker.com/id/1034698"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21974169",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21974169"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2015-5035", "ID": "CVE-2015-5035",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,160 +52,160 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20150717 OpenSSH keyboard-interactive authentication brute force vulnerability (MaxAuthTries bypass)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Jul/92"
},
{
"name" : "[oss-security] 20150723 Re: CVE Request for OpenSSH vulnerability - authentication limits bypass",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2015/07/23/4"
},
{
"name" : "[debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html"
},
{
"name" : "http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c",
"refsource" : "CONFIRM",
"url" : "http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c"
},
{
"name" : "http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c.diff?r1=1.42&r2=1.43&f=h",
"refsource" : "CONFIRM",
"url" : "http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c.diff?r1=1.42&r2=1.43&f=h"
},
{
"name" : "https://support.apple.com/kb/HT205031",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/kb/HT205031"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128992",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128992"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
}, },
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10157",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10157"
},
{
"name" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480",
"refsource" : "CONFIRM",
"url" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480"
},
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10136",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10136"
},
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10697",
"refsource" : "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10697"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20151106-0001/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20151106-0001/"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name" : "APPLE-SA-2015-08-13-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
},
{
"name" : "FEDORA-2015-11981",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162955.html"
},
{
"name" : "FEDORA-2015-13469",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165170.html"
},
{
"name" : "GLSA-201512-04",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201512-04"
},
{
"name" : "RHSA-2016:0466",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0466.html"
},
{
"name" : "SUSE-SU-2015:1581",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html"
},
{
"name" : "USN-2710-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2710-1"
},
{ {
"name": "USN-2710-2", "name": "USN-2710-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2710-2" "url": "http://www.ubuntu.com/usn/USN-2710-2"
}, },
{ {
"name" : "91787", "name": "FEDORA-2015-13469",
"refsource" : "BID", "refsource": "FEDORA",
"url" : "http://www.securityfocus.com/bid/91787" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165170.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128992",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128992"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name": "GLSA-201512-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201512-04"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10136",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10136"
},
{
"name": "https://security.netapp.com/advisory/ntap-20151106-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20151106-0001/"
},
{
"name": "RHSA-2016:0466",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0466.html"
},
{
"name": "http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c.diff?r1=1.42&r2=1.43&f=h",
"refsource": "CONFIRM",
"url": "http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c.diff?r1=1.42&r2=1.43&f=h"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10697",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10697"
},
{
"name": "APPLE-SA-2015-08-13-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
},
{
"name": "http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c",
"refsource": "CONFIRM",
"url": "http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth2-chall.c"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10157",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10157"
}, },
{ {
"name": "75990", "name": "75990",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75990" "url": "http://www.securityfocus.com/bid/75990"
}, },
{
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
},
{
"name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480",
"refsource": "CONFIRM",
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480"
},
{
"name": "SUSE-SU-2015:1581",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html"
},
{ {
"name": "92012", "name": "92012",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/92012" "url": "http://www.securityfocus.com/bid/92012"
}, },
{
"name": "https://support.apple.com/kb/HT205031",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT205031"
},
{
"name": "[debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html"
},
{
"name": "[oss-security] 20150723 Re: CVE Request for OpenSSH vulnerability - authentication limits bypass",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2015/07/23/4"
},
{
"name": "USN-2710-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2710-1"
},
{
"name": "FEDORA-2015-11981",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162955.html"
},
{ {
"name": "1032988", "name": "1032988",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032988" "url": "http://www.securitytracker.com/id/1032988"
},
{
"name": "20150717 OpenSSH keyboard-interactive authentication brute force vulnerability (MaxAuthTries bypass)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Jul/92"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-5667", "ID": "CVE-2015-5667",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,29 +58,29 @@
"url": "https://metacpan.org/release/HTML-Scrubber" "url": "https://metacpan.org/release/HTML-Scrubber"
}, },
{ {
"name" : "FEDORA-2015-84a95e39d4", "name": "JVNDB-2015-000171",
"refsource" : "FEDORA", "refsource": "JVNDB",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172934.html" "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000171"
},
{
"name" : "FEDORA-2015-95f5ff8d44",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172983.html"
}, },
{ {
"name": "FEDORA-2015-fed35dffd7", "name": "FEDORA-2015-fed35dffd7",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172997.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172997.html"
}, },
{
"name": "FEDORA-2015-95f5ff8d44",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172983.html"
},
{ {
"name": "JVN#53973084", "name": "JVN#53973084",
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN53973084/index.html" "url": "http://jvn.jp/en/jp/JVN53973084/index.html"
}, },
{ {
"name" : "JVNDB-2015-000171", "name": "FEDORA-2015-84a95e39d4",
"refsource" : "JVNDB", "refsource": "FEDORA",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000171" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172934.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-5805", "ID": "CVE-2015-5805",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,36 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/HT205212",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205212"
},
{ {
"name": "https://support.apple.com/HT205221", "name": "https://support.apple.com/HT205221",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT205221" "url": "https://support.apple.com/HT205221"
}, },
{
"name": "1033609",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033609"
},
{
"name": "https://support.apple.com/HT205212",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205212"
},
{
"name": "76763",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76763"
},
{
"name": "openSUSE-SU-2016:0761",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html"
},
{ {
"name": "https://support.apple.com/HT205265", "name": "https://support.apple.com/HT205265",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT205265" "url": "https://support.apple.com/HT205265"
}, },
{
"name" : "APPLE-SA-2015-09-16-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
},
{ {
"name": "APPLE-SA-2015-09-16-3", "name": "APPLE-SA-2015-09-16-3",
"refsource": "APPLE", "refsource": "APPLE",
@ -83,19 +93,9 @@
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00007.html" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00007.html"
}, },
{ {
"name" : "openSUSE-SU-2016:0761", "name": "APPLE-SA-2015-09-16-1",
"refsource" : "SUSE", "refsource": "APPLE",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
},
{
"name" : "76763",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/76763"
},
{
"name" : "1033609",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033609"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "104695",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104695"
},
{ {
"name": "https://launchpad.support.sap.com/#/notes/2624762", "name": "https://launchpad.support.sap.com/#/notes/2624762",
"refsource": "MISC", "refsource": "MISC",
@ -66,11 +71,6 @@
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=497256000", "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=497256000",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=497256000" "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=497256000"
},
{
"name" : "104695",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104695"
} }
] ]
}, },

View File

@ -65,25 +65,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://obtruse.syfrtext.com/2018/07/oracle-privilege-escalation-via.html",
"refsource" : "MISC",
"url" : "http://obtruse.syfrtext.com/2018/07/oracle-privilege-escalation-via.html"
},
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
}, },
{
"name": "1041299",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041299"
},
{ {
"name": "104805", "name": "104805",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/104805" "url": "http://www.securityfocus.com/bid/104805"
}, },
{ {
"name" : "1041299", "name": "http://obtruse.syfrtext.com/2018/07/oracle-privilege-escalation-via.html",
"refsource" : "SECTRACK", "refsource": "MISC",
"url" : "http://www.securitytracker.com/id/1041299" "url": "http://obtruse.syfrtext.com/2018/07/oracle-privilege-escalation-via.html"
} }
] ]
} }

View File

@ -70,15 +70,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
}, },
{
"name" : "104793",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104793"
},
{ {
"name": "1041307", "name": "1041307",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041307" "url": "http://www.securitytracker.com/id/1041307"
},
{
"name": "104793",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104793"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com", "ASSIGNER": "security@google.com",
"ID": "CVE-2018-6151", "ID": "CVE-2018-6151",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,20 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://crbug.com/805905",
"refsource" : "MISC",
"url" : "https://crbug.com/805905"
},
{ {
"name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html", "name": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html" "url": "https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html"
}, },
{ {
"name" : "DSA-4256", "name": "RHSA-2018:2282",
"refsource" : "DEBIAN", "refsource": "REDHAT",
"url" : "https://www.debian.org/security/2018/dsa-4256" "url": "https://access.redhat.com/errata/RHSA-2018:2282"
}, },
{ {
"name": "GLSA-201808-01", "name": "GLSA-201808-01",
@ -74,9 +69,14 @@
"url": "https://security.gentoo.org/glsa/201808-01" "url": "https://security.gentoo.org/glsa/201808-01"
}, },
{ {
"name" : "RHSA-2018:2282", "name": "DSA-4256",
"refsource" : "REDHAT", "refsource": "DEBIAN",
"url" : "https://access.redhat.com/errata/RHSA-2018:2282" "url": "https://www.debian.org/security/2018/dsa-4256"
},
{
"name": "https://crbug.com/805905",
"refsource": "MISC",
"url": "https://crbug.com/805905"
}, },
{ {
"name": "104887", "name": "104887",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cybersecurity@se.com", "ASSIGNER": "cybersecurity@schneider-electric.com",
"DATE_PUBLIC": "2018-03-01T00:00:00", "DATE_PUBLIC": "2018-03-01T00:00:00",
"ID": "CVE-2018-7228", "ID": "CVE-2018-7228",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.filerun.com/changelog",
"refsource" : "MISC",
"url" : "http://www.filerun.com/changelog"
},
{ {
"name": "https://feedback.filerun.com/communities/1/topics/189-critical-security-update-available", "name": "https://feedback.filerun.com/communities/1/topics/189-critical-security-update-available",
"refsource": "MISC", "refsource": "MISC",
"url": "https://feedback.filerun.com/communities/1/topics/189-critical-security-update-available" "url": "https://feedback.filerun.com/communities/1/topics/189-critical-security-update-available"
}, },
{
"name": "http://www.filerun.com/changelog",
"refsource": "MISC",
"url": "http://www.filerun.com/changelog"
},
{ {
"name": "https://www.scanfsec.com/FileRun_2017_09_25_Blind_SQL.html", "name": "https://www.scanfsec.com/FileRun_2017_09_25_Blind_SQL.html",
"refsource": "MISC", "refsource": "MISC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cybersecurity@se.com", "ASSIGNER": "cybersecurity@schneider-electric.com",
"ID": "CVE-2018-7810", "ID": "CVE-2018-7810",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8347", "ID": "CVE-2018-8347",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8376", "ID": "CVE-2018-8376",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -55,16 +55,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8376",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8376"
},
{ {
"name": "104991", "name": "104991",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/104991" "url": "http://www.securityfocus.com/bid/104991"
}, },
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8376",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8376"
},
{ {
"name": "1041464", "name": "1041464",
"refsource": "SECTRACK", "refsource": "SECTRACK",