mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
927fabcb43
commit
0c74917bc3
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080204 Multiple vulnerabilities in SAPlpd 6.28",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
|
||||
"name": "28786",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28786"
|
||||
},
|
||||
{
|
||||
"name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "27613",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27613"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0409",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0409"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0438",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0438"
|
||||
},
|
||||
{
|
||||
"name": "1019300",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1019300"
|
||||
},
|
||||
{
|
||||
"name" : "28786",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28786"
|
||||
"name": "3619",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3619"
|
||||
},
|
||||
{
|
||||
"name": "20080204 Multiple vulnerabilities in SAPlpd 6.28",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0438",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0438"
|
||||
},
|
||||
{
|
||||
"name": "28811",
|
||||
@ -93,9 +93,9 @@
|
||||
"url": "http://secunia.com/advisories/28811"
|
||||
},
|
||||
{
|
||||
"name" : "3619",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/3619"
|
||||
"name": "27613",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27613"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "5168",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/5168"
|
||||
},
|
||||
{
|
||||
"name": "27933",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27933"
|
||||
},
|
||||
{
|
||||
"name": "5168",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5168"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://docs.info.apple.com/article.html?artnum=307563",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://docs.info.apple.com/article.html?artnum=307563"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2008-03-18",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA08-079A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
|
||||
},
|
||||
{
|
||||
"name": "28321",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28321"
|
||||
},
|
||||
{
|
||||
"name" : "28290",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28290"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0920",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0920/references"
|
||||
"name": "safari-errorpage-xss(41333)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41333"
|
||||
},
|
||||
{
|
||||
"name": "1019653",
|
||||
@ -88,9 +68,29 @@
|
||||
"url": "http://www.securitytracker.com/id?1019653"
|
||||
},
|
||||
{
|
||||
"name" : "safari-errorpage-xss(41333)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41333"
|
||||
"name": "TA08-079A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2008-03-18",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html"
|
||||
},
|
||||
{
|
||||
"name": "28290",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28290"
|
||||
},
|
||||
{
|
||||
"name": "http://docs.info.apple.com/article.html?artnum=307563",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://docs.info.apple.com/article.html?artnum=307563"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0920",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0920/references"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,15 +58,20 @@
|
||||
"url": "https://www.exploit-db.com/exploits/5235"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mailenable.com/hotfix/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.mailenable.com/hotfix/"
|
||||
"name": "mailenable-expn-vrfy-dos(41083)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
|
||||
},
|
||||
{
|
||||
"name": "28154",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28154"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mailenable.com/hotfix/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.mailenable.com/hotfix/"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0800",
|
||||
"refsource": "VUPEN",
|
||||
@ -76,11 +81,6 @@
|
||||
"name": "29300",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29300"
|
||||
},
|
||||
{
|
||||
"name" : "mailenable-expn-vrfy-dos(41083)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://deathrow.vistech.net/DEFCON16/VMS.PDF",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://deathrow.vistech.net/DEFCON16/VMS.PDF"
|
||||
},
|
||||
{
|
||||
"name": "hptcpip-openvms-finger-info-disclosure(45135)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45135"
|
||||
},
|
||||
{
|
||||
"name": "http://deathrow.vistech.net/DEFCON16/VMS.PDF",
|
||||
"refsource": "MISC",
|
||||
"url": "http://deathrow.vistech.net/DEFCON16/VMS.PDF"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6471",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6471"
|
||||
},
|
||||
{
|
||||
"name" : "31212",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31212"
|
||||
"name": "4270",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4270"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:5936",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5936"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:6113",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6113"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:7995",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7995"
|
||||
},
|
||||
{
|
||||
"name" : "4270",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4270"
|
||||
"name": "oval:org.mitre.oval:def:6113",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6113"
|
||||
},
|
||||
{
|
||||
"name": "31212",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31212"
|
||||
},
|
||||
{
|
||||
"name": "6471",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6471"
|
||||
},
|
||||
{
|
||||
"name": "quicktime-itunes-checkstackcookie-bo(45311)",
|
||||
|
@ -53,59 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[vnc-list] 20081126 VNC Viewer Vulnerability CVE-2008-4770",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.realvnc.com/pipermail/vnc-list/2008-November/059432.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1"
|
||||
"name": "GLSA-200903-17",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200903-17.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://www.realvnc.com/products/upgrade.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.realvnc.com/products/upgrade.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.realvnc.com/products/free/4.1/release-notes.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.realvnc.com/products/free/4.1/release-notes.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2009-1001",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01025.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200903-17",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200903-17.xml"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2009:0261",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0261.html"
|
||||
},
|
||||
{
|
||||
"name" : "248526",
|
||||
"refsource" : "SUNALERT",
|
||||
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248526-1"
|
||||
},
|
||||
{
|
||||
"name" : "33263",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/33263"
|
||||
},
|
||||
{
|
||||
"name" : "31832",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31832"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:9367",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9367"
|
||||
"name": "http://www.realvnc.com/products/free/4.1/release-notes.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.realvnc.com/products/free/4.1/release-notes.html"
|
||||
},
|
||||
{
|
||||
"name": "33689",
|
||||
@ -117,6 +82,31 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/34184"
|
||||
},
|
||||
{
|
||||
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1"
|
||||
},
|
||||
{
|
||||
"name": "248526",
|
||||
"refsource": "SUNALERT",
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248526-1"
|
||||
},
|
||||
{
|
||||
"name": "31832",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31832"
|
||||
},
|
||||
{
|
||||
"name": "realvnc-cmsgreader-code-execution(45969)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45969"
|
||||
},
|
||||
{
|
||||
"name": "33263",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33263"
|
||||
},
|
||||
{
|
||||
"name": "32317",
|
||||
"refsource": "SECUNIA",
|
||||
@ -127,15 +117,25 @@
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2868"
|
||||
},
|
||||
{
|
||||
"name": "[vnc-list] 20081126 VNC Viewer Vulnerability CVE-2008-4770",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.realvnc.com/pipermail/vnc-list/2008-November/059432.html"
|
||||
},
|
||||
{
|
||||
"name": "realvnc-rfb-protocol-code-execution(47937)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47937"
|
||||
},
|
||||
{
|
||||
"name" : "realvnc-cmsgreader-code-execution(45969)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45969"
|
||||
"name": "oval:org.mitre.oval:def:9367",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9367"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2009:0261",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2009-0261.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,19 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081104 Adobe Acrobat Professional And Reader AcroJS Heap Corruption Vulnerability",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=756"
|
||||
"name": "32700",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32700"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb08-19.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb08-19.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0974",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0974.html"
|
||||
"name": "49541",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/49541"
|
||||
},
|
||||
{
|
||||
"name": "249366",
|
||||
@ -73,9 +68,19 @@
|
||||
"url": "http://download.oracle.com/sunalerts/1019937.1.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2008:026",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html"
|
||||
"name": "32872",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32872"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb08-19.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb08-19.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-0098",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0098"
|
||||
},
|
||||
{
|
||||
"name": "TA08-309A",
|
||||
@ -93,24 +98,19 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3001"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2009-0098",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2009/0098"
|
||||
"name": "SUSE-SR:2008:026",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name" : "49541",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/49541"
|
||||
"name": "RHSA-2008:0974",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0974.html"
|
||||
},
|
||||
{
|
||||
"name" : "32872",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32872"
|
||||
},
|
||||
{
|
||||
"name" : "32700",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32700"
|
||||
"name": "20081104 Adobe Acrobat Professional And Reader AcroJS Heap Corruption Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=756"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-2115",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "60167",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/60167"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=967656",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=967656"
|
||||
},
|
||||
{
|
||||
"name" : "https://cwiki.apache.org/confluence/display/WW/S2-014",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://cwiki.apache.org/confluence/display/WW/S2-014"
|
||||
},
|
||||
{
|
||||
"name": "http://struts.apache.org/development/2.x/docs/s2-014.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://struts.apache.org/development/2.x/docs/s2-014.html"
|
||||
},
|
||||
{
|
||||
"name" : "60167",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/60167"
|
||||
"name": "https://cwiki.apache.org/confluence/display/WW/S2-014",
|
||||
"refsource": "MISC",
|
||||
"url": "https://cwiki.apache.org/confluence/display/WW/S2-014"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2013-2336",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2013-2724",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,14 +58,9 @@
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb13-15.html"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201308-03",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201308-03.xml"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0826",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0826.html"
|
||||
"name": "oval:org.mitre.oval:def:16366",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16366"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0809",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16366",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16366"
|
||||
"name": "RHSA-2013:0826",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0826.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201308-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201308-03.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-3870",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,24 +58,24 @@
|
||||
"url": "http://blogs.technet.com/b/srd/archive/2013/09/10/assessing-risk-for-the-september-2013-security-updates.aspx"
|
||||
},
|
||||
{
|
||||
"name" : "http://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspx",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspx"
|
||||
"name": "oval:org.mitre.oval:def:18857",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18857"
|
||||
},
|
||||
{
|
||||
"name": "MS13-068",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-068"
|
||||
},
|
||||
{
|
||||
"name": "http://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspx",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspx"
|
||||
},
|
||||
{
|
||||
"name": "TA13-253A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:18857",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18857"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-3902",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6406",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6463",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-6728",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://community.enterasys.com/enterasys/topics/ensrt_product_advisory_vu_229804_ospf_lsa_lookup_identifers-il4n3"
|
||||
},
|
||||
{
|
||||
"name" : "https://cp-enterasys.kb.net/article.aspx?article=15134&p=1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://cp-enterasys.kb.net/article.aspx?article=15134&p=1"
|
||||
},
|
||||
{
|
||||
"name": "VU#229804",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/229804"
|
||||
},
|
||||
{
|
||||
"name": "https://cp-enterasys.kb.net/article.aspx?article=15134&p=1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cp-enterasys.kb.net/article.aspx?article=15134&p=1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -82,9 +82,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
"name": "1038934",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038934"
|
||||
},
|
||||
{
|
||||
"name": "99628",
|
||||
@ -92,9 +92,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/99628"
|
||||
},
|
||||
{
|
||||
"name" : "1038934",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1038934"
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,16 +53,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "101362",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101362"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||
},
|
||||
{
|
||||
"name": "1039599",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@qnapsecurity.com.tw",
|
||||
"ASSIGNER": "security@qnap.com",
|
||||
"DATE_PUBLIC": "2017-11-21T00:00:00",
|
||||
"ID": "CVE-2017-13071",
|
||||
"STATE": "PUBLIC"
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "43249",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/43249/"
|
||||
},
|
||||
{
|
||||
"name": "https://packetstormsecurity.com/files/145307/FS-Linkedin-Clone-1.0-SQL-Injection.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://packetstormsecurity.com/files/145307/FS-Linkedin-Clone-1.0-SQL-Injection.html"
|
||||
},
|
||||
{
|
||||
"name": "43249",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/43249/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/Telaxus/EPESI/commit/36be628c2597fd0209224a09b17858294f49c585",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/Telaxus/EPESI/commit/36be628c2597fd0209224a09b17858294f49c585"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Telaxus/EPESI/issues/196",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/Telaxus/EPESI/issues/196"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Telaxus/EPESI/commit/36be628c2597fd0209224a09b17858294f49c585",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/Telaxus/EPESI/commit/36be628c2597fd0209224a09b17858294f49c585"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cybersecurity@se.com",
|
||||
"ASSIGNER": "cybersecurity@schneider-electric.com",
|
||||
"DATE_PUBLIC": "2018-02-12T00:00:00",
|
||||
"ID": "CVE-2017-9966",
|
||||
"STATE": "PUBLIC"
|
||||
|
@ -91,16 +91,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://kb.juniper.net/JSA10859",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kb.juniper.net/JSA10859"
|
||||
},
|
||||
{
|
||||
"name": "104720",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104720"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.juniper.net/JSA10859",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.juniper.net/JSA10859"
|
||||
},
|
||||
{
|
||||
"name": "1041315",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4138",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4138"
|
||||
"name": "103057",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/103057"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4147",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4147"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4138",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4138"
|
||||
},
|
||||
{
|
||||
"name": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201804-19",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201804-19"
|
||||
},
|
||||
{
|
||||
"name" : "103057",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/103057"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "44994",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/44994/"
|
||||
},
|
||||
{
|
||||
"name" : "https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915"
|
||||
},
|
||||
{
|
||||
"name": "https://trac.torproject.org/projects/tor/ticket/24700",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "https://trac.torproject.org/projects/tor/ticket/25117",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://trac.torproject.org/projects/tor/ticket/25117"
|
||||
},
|
||||
{
|
||||
"name": "https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915"
|
||||
},
|
||||
{
|
||||
"name": "44994",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/44994/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "JVN#49995005",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN49995005/index.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.cs.themistruct.com/report/wam20181012",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "https://www.osstech.co.jp/support/am2018-4-1-en",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.osstech.co.jp/support/am2018-4-1-en"
|
||||
},
|
||||
{
|
||||
"name" : "JVN#49995005",
|
||||
"refsource" : "JVN",
|
||||
"url" : "http://jvn.jp/en/jp/JVN49995005/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-19251",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -68,11 +68,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22013500",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22013500"
|
||||
},
|
||||
{
|
||||
"name": "103368",
|
||||
"refsource": "BID",
|
||||
@ -82,6 +77,11 @@
|
||||
"name": "ibm-itcam-cve20181442-csrf(139598)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139598"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22013500",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=swg22013500"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -85,6 +85,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ibm-websphere-cve20181883-dos(151969)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/151969"
|
||||
},
|
||||
{
|
||||
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10738197",
|
||||
"refsource": "CONFIRM",
|
||||
@ -94,11 +99,6 @@
|
||||
"name": "106146",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106146"
|
||||
},
|
||||
{
|
||||
"name" : "ibm-websphere-cve20181883-dos(151969)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/151969"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -79,11 +79,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10744217",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10744217"
|
||||
},
|
||||
{
|
||||
"name": "106201",
|
||||
"refsource": "BID",
|
||||
@ -93,6 +88,11 @@
|
||||
"name": "ibm-marketing-cve20181920-xxe(152855)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/152855"
|
||||
},
|
||||
{
|
||||
"name": "http://www.ibm.com/support/docview.wss?uid=ibm10744217",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10744217"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user