"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:09:15 +00:00
parent 5983544149
commit fc3737311b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3568 additions and 3568 deletions

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20050110 Multi-vendor AV gateway image inspection bypass vulnerability",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/lists/fulldisclosure/2005/Jan/0332.html"
},
{ {
"name": "20050114 Re: Multi-vendor AV gateway image inspection bypass vulnerability", "name": "20050114 Re: Multi-vendor AV gateway image inspection bypass vulnerability",
"refsource": "FULLDISC", "refsource": "FULLDISC",
@ -67,20 +62,25 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=300116" "url": "http://sourceforge.net/project/shownotes.php?release_id=300116"
}, },
{
"name": "20050110 Multi-vendor AV gateway image inspection bypass vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/lists/fulldisclosure/2005/Jan/0332.html"
},
{ {
"name": "GLSA-200501-46", "name": "GLSA-200501-46",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200501-46.xml" "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-46.xml"
}, },
{
"name" : "MDKSA-2005:025",
"refsource" : "MANDRAKE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:025"
},
{ {
"name": "13900", "name": "13900",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13900/" "url": "http://secunia.com/advisories/13900/"
},
{
"name": "MDKSA-2005:025",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:025"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://sourceforge.net/project/shownotes.php?release_id=307067", "name": "1013260",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=307067" "url": "http://securitytracker.com/id?1013260"
}, },
{ {
"name": "GLSA-200502-33", "name": "GLSA-200502-33",
@ -63,9 +63,9 @@
"url": "http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml" "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml"
}, },
{ {
"name" : "1013260", "name": "http://sourceforge.net/project/shownotes.php?release_id=307067",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://securitytracker.com/id?1013260" "url": "http://sourceforge.net/project/shownotes.php?release_id=307067"
}, },
{ {
"name": "14360", "name": "14360",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-0966", "ID": "CVE-2005-0966",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,45 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20050401 multiple remote denial of service vulnerabilities in Gaim",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=111238715307356&w=2"
},
{
"name" : "http://gaim.sourceforge.net/security/index.php?id=14",
"refsource" : "CONFIRM",
"url" : "http://gaim.sourceforge.net/security/index.php?id=14"
},
{
"name" : "http://sourceforge.net/project/shownotes.php?group_id=235&release_id=317750",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?group_id=235&release_id=317750"
},
{
"name" : "FLSA:158543",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/426078/100/0/threaded"
},
{ {
"name": "MDKSA-2005:071", "name": "MDKSA-2005:071",
"refsource": "MANDRAKE", "refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:071" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:071"
}, },
{ {
"name" : "RHSA-2005:365", "name": "FLSA:158543",
"refsource" : "REDHAT", "refsource": "FEDORA",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-365.html" "url": "http://www.securityfocus.com/archive/1/426078/100/0/threaded"
},
{
"name" : "SUSE-SA:2005:036",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2005_36_sudo.html"
},
{
"name" : "13003",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/13003"
}, },
{ {
"name": "oval:org.mitre.oval:def:9185", "name": "oval:org.mitre.oval:def:9185",
@ -102,15 +72,45 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14815" "url": "http://secunia.com/advisories/14815"
}, },
{
"name": "gaim-ircmsginvite-dos(19939)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19939"
},
{
"name": "13003",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/13003"
},
{
"name": "http://gaim.sourceforge.net/security/index.php?id=14",
"refsource": "CONFIRM",
"url": "http://gaim.sourceforge.net/security/index.php?id=14"
},
{ {
"name": "gaim-irc-plugin-bo(19937)", "name": "gaim-irc-plugin-bo(19937)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19937" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19937"
}, },
{ {
"name" : "gaim-ircmsginvite-dos(19939)", "name": "RHSA-2005:365",
"refsource" : "XF", "refsource": "REDHAT",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19939" "url": "http://www.redhat.com/support/errata/RHSA-2005-365.html"
},
{
"name": "20050401 multiple remote denial of service vulnerabilities in Gaim",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111238715307356&w=2"
},
{
"name": "http://sourceforge.net/project/shownotes.php?group_id=235&release_id=317750",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?group_id=235&release_id=317750"
},
{
"name": "SUSE-SA:2005:036",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2005_36_sudo.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-1410", "ID": "CVE-2005-1410",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.postgresql.org/about/news.315", "name": "oval:org.mitre.oval:def:9343",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://www.postgresql.org/about/news.315" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9343"
},
{
"name" : "[pgsql-announce] 20050502 IMPORTANT: two new PostgreSQL security problems found",
"refsource" : "MLIST",
"url" : "http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php"
},
{
"name" : "FLSA-2006:157366",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/426302/30/6680/threaded"
},
{
"name" : "RHSA-2005:433",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-433.html"
},
{
"name" : "SUSE-SA:2005:036",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2005_36_sudo.html"
}, },
{ {
"name": "13475", "name": "13475",
@ -83,9 +63,19 @@
"url": "http://www.securityfocus.com/bid/13475" "url": "http://www.securityfocus.com/bid/13475"
}, },
{ {
"name" : "oval:org.mitre.oval:def:9343", "name": "oval:org.mitre.oval:def:1086",
"refsource": "OVAL", "refsource": "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9343" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1086"
},
{
"name": "RHSA-2005:433",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-433.html"
},
{
"name": "FLSA-2006:157366",
"refsource": "FEDORA",
"url": "http://www.securityfocus.com/archive/1/426302/30/6680/threaded"
}, },
{ {
"name": "ADV-2005-0453", "name": "ADV-2005-0453",
@ -93,9 +83,19 @@
"url": "http://www.vupen.com/english/advisories/2005/0453" "url": "http://www.vupen.com/english/advisories/2005/0453"
}, },
{ {
"name" : "oval:org.mitre.oval:def:1086", "name": "[pgsql-announce] 20050502 IMPORTANT: two new PostgreSQL security problems found",
"refsource" : "OVAL", "refsource": "MLIST",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1086" "url": "http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php"
},
{
"name": "http://www.postgresql.org/about/news.315",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/about/news.315"
},
{
"name": "SUSE-SA:2005:036",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2005_36_sudo.html"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111592452331677&w=2" "url": "http://marc.info/?l=bugtraq&m=111592452331677&w=2"
}, },
{
"name" : "16445",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/16445"
},
{ {
"name": "15343", "name": "15343",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15343" "url": "http://secunia.com/advisories/15343"
},
{
"name": "16445",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/16445"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20050519 phpATM arbitrary PHP code inclusion", "name": "1014008",
"refsource" : "BUGTRAQ", "refsource": "SECTRACK",
"url" : "http://marc.info/?l=bugtraq&m=111653168810937&w=2" "url": "http://securitytracker.com/id?1014008"
}, },
{ {
"name": "16692", "name": "16692",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/16692" "url": "http://www.osvdb.org/16692"
}, },
{
"name" : "1014008",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1014008"
},
{ {
"name": "15420", "name": "15420",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15420" "url": "http://secunia.com/advisories/15420"
},
{
"name": "20050519 phpATM arbitrary PHP code inclusion",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111653168810937&w=2"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2005-3120", "ID": "CVE-2005-3120",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,79 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060602 Re: [SECURITY] [DSA 1085-1] New lynx-cur packages fix several vulnerabilities", "name": "1015065",
"refsource" : "BUGTRAQ", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/archive/1/435689/30/4740/threaded" "url": "http://securitytracker.com/id?1015065"
}, },
{ {
"name" : "20051017 Lynx Remote Buffer Overflow", "name": "18376",
"refsource" : "FULLDISC", "refsource": "SECUNIA",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html" "url": "http://secunia.com/advisories/18376"
}, },
{ {
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm", "name": "17216",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm" "url": "http://secunia.com/advisories/17216"
}, },
{ {
"name" : "DSA-874", "name": "17480",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2005/dsa-874" "url": "http://secunia.com/advisories/17480"
},
{
"name" : "DSA-876",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-876"
},
{
"name" : "DSA-1085",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2006/dsa-1085"
},
{
"name" : "FLSA:152832",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/419763/100/0/threaded"
},
{
"name" : "GLSA-200510-15",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200510-15.xml"
},
{
"name" : "MDKSA-2005:186",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:186"
},
{
"name" : "OpenPKG-SA-2005.026",
"refsource" : "OPENPKG",
"url" : "http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.html"
},
{
"name" : "RHSA-2005:803",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-803.html"
},
{
"name" : "SCOSA-2005.47",
"refsource" : "SCO",
"url" : "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt"
},
{
"name" : "SCOSA-2006.7",
"refsource" : "SCO",
"url" : "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt"
},
{
"name" : "SSA:2005-310-03",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056"
},
{
"name" : "SUSE-SR:2005:025",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2005_25_sr.html"
}, },
{ {
"name": "TSLSA-2005-0059", "name": "TSLSA-2005-0059",
@ -133,9 +78,74 @@
"url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html" "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
}, },
{ {
"name" : "USN-206-1", "name": "SSA:2005-310-03",
"refsource" : "UBUNTU", "refsource": "SLACKWARE",
"url" : "https://usn.ubuntu.com/206-1/" "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056"
},
{
"name": "OpenPKG-SA-2005.026",
"refsource": "OPENPKG",
"url": "http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.html"
},
{
"name": "SCOSA-2005.47",
"refsource": "SCO",
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt"
},
{
"name": "20051017 Lynx Remote Buffer Overflow",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html"
},
{
"name": "20060602 Re: [SECURITY] [DSA 1085-1] New lynx-cur packages fix several vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435689/30/4740/threaded"
},
{
"name": "17444",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17444"
},
{
"name": "DSA-1085",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1085"
},
{
"name": "GLSA-200510-15",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200510-15.xml"
},
{
"name": "18584",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18584"
},
{
"name": "17238",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17238"
},
{
"name": "SUSE-SR:2005:025",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html"
},
{
"name": "17150",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17150"
},
{
"name": "MDKSA-2005:186",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:186"
},
{
"name": "17248",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17248"
}, },
{ {
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253", "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253",
@ -143,24 +153,14 @@
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253" "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253"
}, },
{ {
"name" : "15117", "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/15117" "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm"
}, },
{ {
"name" : "oval:org.mitre.oval:def:9257", "name": "FLSA:152832",
"refsource" : "OVAL", "refsource": "FEDORA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257" "url": "http://www.securityfocus.com/archive/1/419763/100/0/threaded"
},
{
"name" : "1015065",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015065"
},
{
"name" : "17216",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17216"
}, },
{ {
"name": "17360", "name": "17360",
@ -173,24 +173,24 @@
"url": "http://secunia.com/advisories/17445" "url": "http://secunia.com/advisories/17445"
}, },
{ {
"name" : "18376", "name": "15117",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/18376" "url": "http://www.securityfocus.com/bid/15117"
}, },
{ {
"name" : "17444", "name": "USN-206-1",
"refsource" : "SECUNIA", "refsource": "UBUNTU",
"url" : "http://secunia.com/advisories/17444" "url": "https://usn.ubuntu.com/206-1/"
}, },
{ {
"name" : "17150", "name": "oval:org.mitre.oval:def:9257",
"refsource" : "SECUNIA", "refsource": "OVAL",
"url" : "http://secunia.com/advisories/17150" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257"
}, },
{ {
"name" : "17230", "name": "RHSA-2005:803",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/17230" "url": "http://www.redhat.com/support/errata/RHSA-2005-803.html"
}, },
{ {
"name": "17231", "name": "17231",
@ -198,34 +198,34 @@
"url": "http://secunia.com/advisories/17231" "url": "http://secunia.com/advisories/17231"
}, },
{ {
"name" : "17238", "name": "17230",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/17238" "url": "http://secunia.com/advisories/17230"
},
{
"name" : "17248",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17248"
}, },
{ {
"name": "17340", "name": "17340",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17340" "url": "http://secunia.com/advisories/17340"
}, },
{
"name" : "17480",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/17480"
},
{
"name" : "18584",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/18584"
},
{ {
"name": "20383", "name": "20383",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20383" "url": "http://secunia.com/advisories/20383"
},
{
"name": "SCOSA-2006.7",
"refsource": "SCO",
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt"
},
{
"name": "DSA-874",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-874"
},
{
"name": "DSA-876",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2005/dsa-876"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20051007 Antivirus detection bypass by special crafted archive.",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=112879611919750&w=2"
},
{ {
"name": "http://shadock.net/secubox/AVCraftedArchive.html", "name": "http://shadock.net/secubox/AVCraftedArchive.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://shadock.net/secubox/AVCraftedArchive.html" "url": "http://shadock.net/secubox/AVCraftedArchive.html"
},
{
"name": "20051007 Antivirus detection bypass by special crafted archive.",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=112879611919750&w=2"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20051030 SQL IN FORUM.PHP",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/415299"
},
{
"name" : "15245",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/15245"
},
{ {
"name": "ADV-2005-2258", "name": "ADV-2005-2258",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2005/2258" "url": "http://www.vupen.com/english/advisories/2005/2258"
}, },
{
"name" : "20420",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/20420"
},
{ {
"name": "17373", "name": "17373",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17373" "url": "http://secunia.com/advisories/17373"
}, },
{
"name": "20420",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/20420"
},
{
"name": "20051030 SQL IN FORUM.PHP",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/415299"
},
{ {
"name": "oaboard-forum-script-sql-injection(22932)", "name": "oaboard-forum-script-sql-injection(22932)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22932" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22932"
},
{
"name": "15245",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/15245"
} }
] ]
} }

View File

@ -53,25 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.kerio.com/kwf_history.html", "name": "ADV-2005-2391",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://www.kerio.com/kwf_history.html" "url": "http://www.vupen.com/english/advisories/2005/2391"
}, },
{ {
"name": "15387", "name": "15387",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/15387" "url": "http://www.securityfocus.com/bid/15387"
}, },
{
"name" : "ADV-2005-2391",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2005/2391"
},
{ {
"name": "17519", "name": "17519",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/17519" "url": "http://secunia.com/advisories/17519"
}, },
{
"name": "http://www.kerio.com/kwf_history.html",
"refsource": "CONFIRM",
"url": "http://www.kerio.com/kwf_history.html"
},
{ {
"name": "kerio-winroute-rtsp-dos(23034)", "name": "kerio-winroute-rtsp-dos(23034)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=365508",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=365508"
},
{ {
"name": "20244", "name": "20244",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/20244" "url": "http://www.osvdb.org/20244"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=365508",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=365508"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20050105 IBM DB2 JDBC Applet Server buffer overflow (#NISR05012005D)",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=110495251101381&w=2"
},
{
"name" : "http://www.nextgenss.com/advisories/db205012005D.txt",
"refsource" : "MISC",
"url" : "http://www.nextgenss.com/advisories/db205012005D.txt"
},
{ {
"name": "IY61492", "name": "IY61492",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
@ -72,6 +62,11 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/11401" "url": "http://www.securityfocus.com/bid/11401"
}, },
{
"name": "20050105 IBM DB2 JDBC Applet Server buffer overflow (#NISR05012005D)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110495251101381&w=2"
},
{ {
"name": "12733", "name": "12733",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -81,6 +76,11 @@
"name": "db2-jdbc-bo(17613)", "name": "db2-jdbc-bo(17613)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17613" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17613"
},
{
"name": "http://www.nextgenss.com/advisories/db205012005D.txt",
"refsource": "MISC",
"url": "http://www.nextgenss.com/advisories/db205012005D.txt"
} }
] ]
} }

View File

@ -52,6 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "MDVSA-2009:037",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:037"
},
{
"name": "33559",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33559"
},
{
"name": "ADV-2009-0043",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0043"
},
{
"name": "SSA:2009-014-02",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362"
},
{ {
"name": "http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33", "name": "http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33",
"refsource": "MISC", "refsource": "MISC",
@ -61,26 +81,6 @@
"name": "https://www.isc.org/node/373", "name": "https://www.isc.org/node/373",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.isc.org/node/373" "url": "https://www.isc.org/node/373"
},
{
"name" : "MDVSA-2009:037",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:037"
},
{
"name" : "SSA:2009-014-02",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.540362"
},
{
"name" : "ADV-2009-0043",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0043"
},
{
"name" : "33559",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33559"
} }
] ]
} }

View File

@ -52,6 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "33999",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33999"
},
{
"name": "sunmc-performancereportingmodule-xss(49076)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49076"
},
{
"name": "ADV-2009-0605",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0605"
},
{
"name": "34146",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34146"
},
{ {
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125191-04-1", "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125191-04-1",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,30 +82,10 @@
"refsource": "SUNALERT", "refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-247046-1" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-247046-1"
}, },
{
"name" : "33999",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33999"
},
{ {
"name": "1021809", "name": "1021809",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021809" "url": "http://securitytracker.com/id?1021809"
},
{
"name" : "34146",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34146"
},
{
"name" : "ADV-2009-0605",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0605"
},
{
"name" : "sunmc-performancereportingmodule-xss(49076)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49076"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://bl4cksecurity.blogspot.com/2009/03/microsoft-gdiplus-emf-gpfontsetdata.html",
"refsource" : "MISC",
"url" : "http://bl4cksecurity.blogspot.com/2009/03/microsoft-gdiplus-emf-gpfontsetdata.html"
},
{ {
"name": "http://blogs.technet.com/srd/archive/2009/03/26/new-emf-gdiplus-dll-crash-not-exploitable-for-code-execution.aspx", "name": "http://blogs.technet.com/srd/archive/2009/03/26/new-emf-gdiplus-dll-crash-not-exploitable-for-code-execution.aspx",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://blogs.technet.com/srd/archive/2009/03/26/new-emf-gdiplus-dll-crash-not-exploitable-for-code-execution.aspx" "url": "http://blogs.technet.com/srd/archive/2009/03/26/new-emf-gdiplus-dll-crash-not-exploitable-for-code-execution.aspx"
}, },
{
"name" : "34250",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/34250"
},
{ {
"name": "ADV-2009-0832", "name": "ADV-2009-0832",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0832" "url": "http://www.vupen.com/english/advisories/2009/0832"
}, },
{
"name": "http://bl4cksecurity.blogspot.com/2009/03/microsoft-gdiplus-emf-gpfontsetdata.html",
"refsource": "MISC",
"url": "http://bl4cksecurity.blogspot.com/2009/03/microsoft-gdiplus-emf-gpfontsetdata.html"
},
{ {
"name": "win-gdi-emfplusfont-dos(49438)", "name": "win-gdi-emfplusfont-dos(49438)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49438" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49438"
},
{
"name": "34250",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34250"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "8351", "name": "adaptbb-topic-sql-injection(49681)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/8351" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49681"
}, },
{ {
"name": "34371", "name": "34371",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/34371" "url": "http://www.securityfocus.com/bid/34371"
}, },
{ {
"name" : "adaptbb-topic-sql-injection(49681)", "name": "8351",
"refsource" : "XF", "refsource": "EXPLOIT-DB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49681" "url": "https://www.exploit-db.com/exploits/8351"
} }
] ]
} }

View File

@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "HPSBUX02440",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=124654506100944&w=2"
},
{ {
"name": "SSRT090106", "name": "SSRT090106",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=124654506100944&w=2" "url": "http://marc.info/?l=bugtraq&m=124654506100944&w=2"
}, },
{ {
"name" : "35547", "name": "ADV-2009-1755",
"refsource" : "BID", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/bid/35547" "url": "http://www.vupen.com/english/advisories/2009/1755"
},
{
"name": "HPSBUX02440",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=124654506100944&w=2"
}, },
{ {
"name": "1022493", "name": "1022493",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/35644" "url": "http://secunia.com/advisories/35644"
}, },
{ {
"name" : "ADV-2009-1755", "name": "35547",
"refsource" : "VUPEN", "refsource": "BID",
"url" : "http://www.vupen.com/english/advisories/2009/1755" "url": "http://www.securityfocus.com/bid/35547"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "9606",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/9606"
},
{
"name" : "SUSE-SR:2011:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{ {
"name": "43068", "name": "43068",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -71,6 +61,16 @@
"name": "ADV-2011-0212", "name": "ADV-2011-0212",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212" "url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "9606",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/9606"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://packetstormsecurity.org/0912-exploits/ezblog-xssxsrf.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/0912-exploits/ezblog-xssxsrf.txt"
},
{ {
"name": "61114", "name": "61114",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/61114" "url": "http://osvdb.org/61114"
}, },
{
"name" : "37743",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37743"
},
{ {
"name": "ezblog-admin-csrf(54895)", "name": "ezblog-admin-csrf(54895)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54895" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54895"
},
{
"name": "http://packetstormsecurity.org/0912-exploits/ezblog-xssxsrf.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0912-exploits/ezblog-xssxsrf.txt"
},
{
"name": "37743",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37743"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "10616", "name": "61286",
"refsource" : "EXPLOIT-DB", "refsource": "OSVDB",
"url" : "http://www.exploit-db.com/exploits/10616" "url": "http://osvdb.org/61286"
}, },
{ {
"name": "61285", "name": "61285",
@ -63,19 +63,19 @@
"url": "http://osvdb.org/61285" "url": "http://osvdb.org/61285"
}, },
{ {
"name" : "61286", "name": "37894",
"refsource" : "OSVDB", "refsource": "SECUNIA",
"url" : "http://osvdb.org/61286" "url": "http://secunia.com/advisories/37894"
},
{
"name": "10616",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/10616"
}, },
{ {
"name": "61287", "name": "61287",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/61287" "url": "http://osvdb.org/61287"
},
{
"name" : "37894",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37894"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20091020 South River Technologies WebDrive Service Bad Security Descriptor Local Elevation Of Privileges", "name": "37083",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/507323/100/0/threaded" "url": "http://secunia.com/advisories/37083"
}, },
{ {
"name": "http://retrogod.altervista.org/9sg_south_river_priv.html", "name": "http://retrogod.altervista.org/9sg_south_river_priv.html",
@ -67,16 +67,16 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/59080" "url": "http://osvdb.org/59080"
}, },
{
"name" : "37083",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37083"
},
{ {
"name": "ADV-2009-2994", "name": "ADV-2009-2994",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2994" "url": "http://www.vupen.com/english/advisories/2009/2994"
}, },
{
"name": "20091020 South River Technologies WebDrive Service Bad Security Descriptor Local Elevation Of Privileges",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/507323/100/0/threaded"
},
{ {
"name": "webdrive-webdrive-privilege-escalation(53885)", "name": "webdrive-webdrive-privilege-escalation(53885)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2368", "ID": "CVE-2012-2368",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20120514 CVE request: Bytemark Symbiosis",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/05/14/1"
},
{ {
"name": "[oss-security] 20120514 Re: CVE request: Bytemark Symbiosis", "name": "[oss-security] 20120514 Re: CVE request: Bytemark Symbiosis",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/14/3" "url": "http://www.openwall.com/lists/oss-security/2012/05/14/3"
}, },
{
"name": "[oss-security] 20120514 CVE request: Bytemark Symbiosis",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/14/1"
},
{ {
"name": "https://projects.bytemark.co.uk/projects/symbiosis/repository/diff?rev=1327&rev_to=1322", "name": "https://projects.bytemark.co.uk/projects/symbiosis/repository/diff?rev=1327&rev_to=1322",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2012-2585", "ID": "CVE-2012-2585",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2670", "ID": "CVE-2012-2670",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "53813",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53813"
},
{
"name": "http://www.collabtive.o-dyn.de/blog/?p=426",
"refsource": "CONFIRM",
"url": "http://www.collabtive.o-dyn.de/blog/?p=426"
},
{ {
"name": "20120604 Arbitrary File Upload/Execution in Collabtive", "name": "20120604 Arbitrary File Upload/Execution in Collabtive",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-06/0007.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2012-06/0007.html"
}, },
{
"name": "collabtive-manageuser-file-upload(76101)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76101"
},
{
"name": "http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html",
"refsource": "MISC",
"url": "http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html"
},
{ {
"name": "20120605 Arbitrary File Upload/Execution in Collabtive", "name": "20120605 Arbitrary File Upload/Execution in Collabtive",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -71,26 +91,6 @@
"name": "[oss-security] 20120606 Re: Arbitrary File Upload/Execution in Collabtive", "name": "[oss-security] 20120606 Re: Arbitrary File Upload/Execution in Collabtive",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/06/06/9" "url": "http://www.openwall.com/lists/oss-security/2012/06/06/9"
},
{
"name" : "http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html",
"refsource" : "MISC",
"url" : "http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html"
},
{
"name" : "http://www.collabtive.o-dyn.de/blog/?p=426",
"refsource" : "CONFIRM",
"url" : "http://www.collabtive.o-dyn.de/blog/?p=426"
},
{
"name" : "53813",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/53813"
},
{
"name" : "collabtive-manageuser-file-upload(76101)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/76101"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.opera.com/docs/changelogs/unified/1211/",
"refsource" : "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/unified/1211/"
},
{ {
"name": "http://www.opera.com/support/kb/view/1037/", "name": "http://www.opera.com/support/kb/view/1037/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.opera.com/support/kb/view/1037/" "url": "http://www.opera.com/support/kb/view/1037/"
}, },
{
"name": "http://www.opera.com/docs/changelogs/unified/1211/",
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/unified/1211/"
},
{ {
"name": "56594", "name": "56594",
"refsource": "BID", "refsource": "BID",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix", "name": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2012/11/10/1" "url": "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt"
}, },
{ {
"name": "https://bugs.launchpad.net/zope2/+bug/1071067", "name": "https://bugs.launchpad.net/zope2/+bug/1071067",
@ -63,9 +63,9 @@
"url": "https://bugs.launchpad.net/zope2/+bug/1071067" "url": "https://bugs.launchpad.net/zope2/+bug/1071067"
}, },
{ {
"name" : "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt", "name": "https://plone.org/products/plone/security/advisories/20121106/24",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt" "url": "https://plone.org/products/plone/security/advisories/20121106/24"
}, },
{ {
"name": "https://plone.org/products/plone-hotfix/releases/20121124", "name": "https://plone.org/products/plone-hotfix/releases/20121124",
@ -73,9 +73,9 @@
"url": "https://plone.org/products/plone-hotfix/releases/20121124" "url": "https://plone.org/products/plone-hotfix/releases/20121124"
}, },
{ {
"name" : "https://plone.org/products/plone/security/advisories/20121106/24", "name": "[oss-security] 20121109 Re: Re: CVE Request - Zope / Plone: Multiple vectors corrected within 20121106 fix",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://plone.org/products/plone/security/advisories/20121106/24" "url": "http://www.openwall.com/lists/oss-security/2012/11/10/1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2015-1323", "ID": "CVE-2015-1323",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "USN-2648-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2648-1"
},
{ {
"name": "75221", "name": "75221",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/75221" "url": "http://www.securityfocus.com/bid/75221"
},
{
"name": "USN-2648-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2648-1"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/534616/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/534616/100/0/threaded"
}, },
{
"name" : "http://packetstormsecurity.com/files/130242/Fork-CMS-3.8.5-SQL-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/130242/Fork-CMS-3.8.5-SQL-Injection.html"
},
{ {
"name": "http://www.fork-cms.com/blog/detail/fork-3.8.6-released", "name": "http://www.fork-cms.com/blog/detail/fork-3.8.6-released",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "forkcms-cve20151467-sql-injection(100668)", "name": "forkcms-cve20151467-sql-injection(100668)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100668" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100668"
},
{
"name": "http://packetstormsecurity.com/files/130242/Fork-CMS-3.8.5-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/130242/Fork-CMS-3.8.5-SQL-Injection.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://www.blackhat.com/docs/us-15/materials/us-15-Gong-Fuzzing-Android-System-Services-By-Binder-Call-To-Escalate-Privilege.pdf", "name": "76670",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://www.blackhat.com/docs/us-15/materials/us-15-Gong-Fuzzing-Android-System-Services-By-Binder-Call-To-Escalate-Privilege.pdf" "url": "http://www.securityfocus.com/bid/76670"
}, },
{ {
"name": "https://android.googlesource.com/platform/frameworks/av/+/c82e31a7039a03dca7b37c65b7890ba5c1e18ced%5E%21/#F0", "name": "https://android.googlesource.com/platform/frameworks/av/+/c82e31a7039a03dca7b37c65b7890ba5c1e18ced%5E%21/#F0",
@ -63,9 +63,9 @@
"url": "https://android.googlesource.com/platform/frameworks/av/+/c82e31a7039a03dca7b37c65b7890ba5c1e18ced%5E%21/#F0" "url": "https://android.googlesource.com/platform/frameworks/av/+/c82e31a7039a03dca7b37c65b7890ba5c1e18ced%5E%21/#F0"
}, },
{ {
"name" : "76670", "name": "https://www.blackhat.com/docs/us-15/materials/us-15-Gong-Fuzzing-Android-System-Services-By-Binder-Call-To-Escalate-Privilege.pdf",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/76670" "url": "https://www.blackhat.com/docs/us-15/materials/us-15-Gong-Fuzzing-Android-System-Services-By-Binder-Call-To-Escalate-Privilege.pdf"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-5548", "ID": "CVE-2015-5548",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
},
{ {
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
}, },
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource" : "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name" : "GLSA-201508-01",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201508-01"
},
{
"name" : "RHSA-2015:1603",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1603.html"
},
{
"name" : "openSUSE-SU-2015:1781",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
},
{ {
"name": "76283", "name": "76283",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/76283" "url": "http://www.securityfocus.com/bid/76283"
}, },
{
"name": "GLSA-201508-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201508-01"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-19.html"
},
{
"name": "openSUSE-SU-2015:1781",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html"
},
{ {
"name": "1033235", "name": "1033235",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033235" "url": "http://www.securitytracker.com/id/1033235"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
},
{
"name": "RHSA-2015:1603",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1603.html"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20150713 Remote file upload vulnerability & SQLi in wordpress plugin wp-powerplaygallery v3.3",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2015/Jul/64"
},
{ {
"name": "[oss-security] 20150720 Re: Remote file upload vulnerability & SQLi in wordpress plugin wp-powerplaygallery v3.3", "name": "[oss-security] 20150720 Re: Remote file upload vulnerability & SQLi in wordpress plugin wp-powerplaygallery v3.3",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/07/20/1" "url": "http://www.openwall.com/lists/oss-security/2015/07/20/1"
}, },
{
"name" : "http://packetstormsecurity.com/files/132671/WordPress-WP-PowerPlayGallery-3.3-File-Upload-SQL-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/132671/WordPress-WP-PowerPlayGallery-3.3-File-Upload-SQL-Injection.html"
},
{ {
"name": "http://www.vapid.dhs.org/advisory.php?v=132", "name": "http://www.vapid.dhs.org/advisory.php?v=132",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.vapid.dhs.org/advisory.php?v=132" "url": "http://www.vapid.dhs.org/advisory.php?v=132"
},
{
"name": "20150713 Remote file upload vulnerability & SQLi in wordpress plugin wp-powerplaygallery v3.3",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Jul/64"
},
{
"name": "http://packetstormsecurity.com/files/132671/WordPress-WP-PowerPlayGallery-3.3-File-Upload-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132671/WordPress-WP-PowerPlayGallery-3.3-File-Upload-SQL-Injection.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "secure@dell.com", "ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2018-11071", "ID": "CVE-2018-11071",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "DSA-2018-147: Dell EMC Isilon OneFS and IsilonSD Edge Remote Process Crash Vulnerability " "TITLE": "DSA-2018-147: Dell EMC Isilon OneFS and IsilonSD Edge Remote Process Crash Vulnerability "

View File

@ -54,9 +54,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "name": "1041895",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" "url": "http://www.securitytracker.com/id/1041895"
}, },
{ {
"name": "105605", "name": "105605",
@ -64,9 +64,9 @@
"url": "http://www.securityfocus.com/bid/105605" "url": "http://www.securityfocus.com/bid/105605"
}, },
{ {
"name" : "1041895", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1041895" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8156", "ID": "CVE-2018-8156",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -70,15 +70,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8156" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8156"
}, },
{
"name" : "104048",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104048"
},
{ {
"name": "1040856", "name": "1040856",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040856" "url": "http://www.securitytracker.com/id/1040856"
},
{
"name": "104048",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104048"
} }
] ]
} }

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-114-03",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-114-03"
},
{ {
"name": "103972", "name": "103972",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/103972" "url": "http://www.securityfocus.com/bid/103972"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-114-03",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-114-03"
} }
] ]
} }