"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:29:28 +00:00
parent 927fabcb43
commit 0c74917bc3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
55 changed files with 3486 additions and 3486 deletions

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "20080204 Multiple vulnerabilities in SAPlpd 6.28",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
"name": "28786",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28786"
},
{
"name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
},
{
"name" : "27613",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27613"
},
{
"name": "ADV-2008-0409",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0409"
},
{
"name" : "ADV-2008-0438",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0438"
},
{
"name": "1019300",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019300"
},
{
"name" : "28786",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28786"
"name": "3619",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3619"
},
{
"name": "20080204 Multiple vulnerabilities in SAPlpd 6.28",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
},
{
"name": "ADV-2008-0438",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0438"
},
{
"name": "28811",
@ -93,9 +93,9 @@
"url": "http://secunia.com/advisories/28811"
},
{
"name" : "3619",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3619"
"name": "27613",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27613"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "5168",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5168"
},
{
"name": "27933",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27933"
},
{
"name": "5168",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5168"
}
]
}

View File

@ -52,35 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://docs.info.apple.com/article.html?artnum=307563",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=307563"
},
{
"name" : "APPLE-SA-2008-03-18",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html"
},
{
"name" : "TA08-079A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
},
{
"name": "28321",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28321"
},
{
"name" : "28290",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28290"
},
{
"name" : "ADV-2008-0920",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0920/references"
"name": "safari-errorpage-xss(41333)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41333"
},
{
"name": "1019653",
@ -88,9 +68,29 @@
"url": "http://www.securitytracker.com/id?1019653"
},
{
"name" : "safari-errorpage-xss(41333)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41333"
"name": "TA08-079A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
},
{
"name": "APPLE-SA-2008-03-18",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00000.html"
},
{
"name": "28290",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28290"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307563",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307563"
},
{
"name": "ADV-2008-0920",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0920/references"
}
]
}

View File

@ -58,15 +58,20 @@
"url": "https://www.exploit-db.com/exploits/5235"
},
{
"name" : "http://www.mailenable.com/hotfix/",
"refsource" : "CONFIRM",
"url" : "http://www.mailenable.com/hotfix/"
"name": "mailenable-expn-vrfy-dos(41083)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
},
{
"name": "28154",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28154"
},
{
"name": "http://www.mailenable.com/hotfix/",
"refsource": "CONFIRM",
"url": "http://www.mailenable.com/hotfix/"
},
{
"name": "ADV-2008-0800",
"refsource": "VUPEN",
@ -76,11 +81,6 @@
"name": "29300",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29300"
},
{
"name" : "mailenable-expn-vrfy-dos(41083)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41083"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://deathrow.vistech.net/DEFCON16/VMS.PDF",
"refsource" : "MISC",
"url" : "http://deathrow.vistech.net/DEFCON16/VMS.PDF"
},
{
"name": "hptcpip-openvms-finger-info-disclosure(45135)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45135"
},
{
"name": "http://deathrow.vistech.net/DEFCON16/VMS.PDF",
"refsource": "MISC",
"url": "http://deathrow.vistech.net/DEFCON16/VMS.PDF"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "6471",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6471"
},
{
"name" : "31212",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31212"
"name": "4270",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4270"
},
{
"name": "oval:org.mitre.oval:def:5936",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5936"
},
{
"name" : "oval:org.mitre.oval:def:6113",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6113"
},
{
"name": "oval:org.mitre.oval:def:7995",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7995"
},
{
"name" : "4270",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4270"
"name": "oval:org.mitre.oval:def:6113",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6113"
},
{
"name": "31212",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31212"
},
{
"name": "6471",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6471"
},
{
"name": "quicktime-itunes-checkstackcookie-bo(45311)",

View File

@ -53,59 +53,24 @@
"references": {
"reference_data": [
{
"name" : "[vnc-list] 20081126 VNC Viewer Vulnerability CVE-2008-4770",
"refsource" : "MLIST",
"url" : "http://www.realvnc.com/pipermail/vnc-list/2008-November/059432.html"
},
{
"name" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1",
"refsource" : "CONFIRM",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1"
"name": "GLSA-200903-17",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200903-17.xml"
},
{
"name": "http://www.realvnc.com/products/upgrade.html",
"refsource": "CONFIRM",
"url": "http://www.realvnc.com/products/upgrade.html"
},
{
"name" : "http://www.realvnc.com/products/free/4.1/release-notes.html",
"refsource" : "CONFIRM",
"url" : "http://www.realvnc.com/products/free/4.1/release-notes.html"
},
{
"name": "FEDORA-2009-1001",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01025.html"
},
{
"name" : "GLSA-200903-17",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200903-17.xml"
},
{
"name" : "RHSA-2009:0261",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0261.html"
},
{
"name" : "248526",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248526-1"
},
{
"name" : "33263",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33263"
},
{
"name" : "31832",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31832"
},
{
"name" : "oval:org.mitre.oval:def:9367",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9367"
"name": "http://www.realvnc.com/products/free/4.1/release-notes.html",
"refsource": "CONFIRM",
"url": "http://www.realvnc.com/products/free/4.1/release-notes.html"
},
{
"name": "33689",
@ -117,6 +82,31 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34184"
},
{
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1",
"refsource": "CONFIRM",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-140455-01-1"
},
{
"name": "248526",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248526-1"
},
{
"name": "31832",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31832"
},
{
"name": "realvnc-cmsgreader-code-execution(45969)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45969"
},
{
"name": "33263",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33263"
},
{
"name": "32317",
"refsource": "SECUNIA",
@ -127,15 +117,25 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2868"
},
{
"name": "[vnc-list] 20081126 VNC Viewer Vulnerability CVE-2008-4770",
"refsource": "MLIST",
"url": "http://www.realvnc.com/pipermail/vnc-list/2008-November/059432.html"
},
{
"name": "realvnc-rfb-protocol-code-execution(47937)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47937"
},
{
"name" : "realvnc-cmsgreader-code-execution(45969)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45969"
"name": "oval:org.mitre.oval:def:9367",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9367"
},
{
"name": "RHSA-2009:0261",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0261.html"
}
]
}

View File

@ -53,19 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20081104 Adobe Acrobat Professional And Reader AcroJS Heap Corruption Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=756"
"name": "32700",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32700"
},
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb08-19.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb08-19.html"
},
{
"name" : "RHSA-2008:0974",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0974.html"
"name": "49541",
"refsource": "OSVDB",
"url": "http://osvdb.org/49541"
},
{
"name": "249366",
@ -73,9 +68,19 @@
"url": "http://download.oracle.com/sunalerts/1019937.1.html"
},
{
"name" : "SUSE-SR:2008:026",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html"
"name": "32872",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32872"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb08-19.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb08-19.html"
},
{
"name": "ADV-2009-0098",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0098"
},
{
"name": "TA08-309A",
@ -93,24 +98,19 @@
"url": "http://www.vupen.com/english/advisories/2008/3001"
},
{
"name" : "ADV-2009-0098",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0098"
"name": "SUSE-SR:2008:026",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html"
},
{
"name" : "49541",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/49541"
"name": "RHSA-2008:0974",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0974.html"
},
{
"name" : "32872",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32872"
},
{
"name" : "32700",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32700"
"name": "20081104 Adobe Acrobat Professional And Reader AcroJS Heap Corruption Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=756"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2115",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "60167",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/60167"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=967656",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=967656"
},
{
"name" : "https://cwiki.apache.org/confluence/display/WW/S2-014",
"refsource" : "MISC",
"url" : "https://cwiki.apache.org/confluence/display/WW/S2-014"
},
{
"name": "http://struts.apache.org/development/2.x/docs/s2-014.html",
"refsource": "CONFIRM",
"url": "http://struts.apache.org/development/2.x/docs/s2-014.html"
},
{
"name" : "60167",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/60167"
"name": "https://cwiki.apache.org/confluence/display/WW/S2-014",
"refsource": "MISC",
"url": "https://cwiki.apache.org/confluence/display/WW/S2-014"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2013-2336",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-2724",
"STATE": "PUBLIC"
},
@ -58,14 +58,9 @@
"url": "http://www.adobe.com/support/security/bulletins/apsb13-15.html"
},
{
"name" : "GLSA-201308-03",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201308-03.xml"
},
{
"name" : "RHSA-2013:0826",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0826.html"
"name": "oval:org.mitre.oval:def:16366",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16366"
},
{
"name": "SUSE-SU-2013:0809",
@ -73,9 +68,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html"
},
{
"name" : "oval:org.mitre.oval:def:16366",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16366"
"name": "RHSA-2013:0826",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0826.html"
},
{
"name": "GLSA-201308-03",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201308-03.xml"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3870",
"STATE": "PUBLIC"
},
@ -58,24 +58,24 @@
"url": "http://blogs.technet.com/b/srd/archive/2013/09/10/assessing-risk-for-the-september-2013-security-updates.aspx"
},
{
"name" : "http://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspx",
"refsource" : "CONFIRM",
"url" : "http://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspx"
"name": "oval:org.mitre.oval:def:18857",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18857"
},
{
"name": "MS13-068",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-068"
},
{
"name": "http://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspx"
},
{
"name": "TA13-253A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A"
},
{
"name" : "oval:org.mitre.oval:def:18857",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18857"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3902",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6406",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6463",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-6728",
"STATE": "PUBLIC"
},

View File

@ -62,15 +62,15 @@
"refsource": "CONFIRM",
"url": "https://community.enterasys.com/enterasys/topics/ensrt_product_advisory_vu_229804_ospf_lsa_lookup_identifers-il4n3"
},
{
"name" : "https://cp-enterasys.kb.net/article.aspx?article=15134&p=1",
"refsource" : "CONFIRM",
"url" : "https://cp-enterasys.kb.net/article.aspx?article=15134&p=1"
},
{
"name": "VU#229804",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/229804"
},
{
"name": "https://cp-enterasys.kb.net/article.aspx?article=15134&p=1",
"refsource": "CONFIRM",
"url": "https://cp-enterasys.kb.net/article.aspx?article=15134&p=1"
}
]
}

View File

@ -82,9 +82,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
"name": "1038934",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038934"
},
{
"name": "99628",
@ -92,9 +92,9 @@
"url": "http://www.securityfocus.com/bid/99628"
},
{
"name" : "1038934",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038934"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
}
]
}

View File

@ -53,16 +53,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "101362",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101362"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "1039599",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@qnapsecurity.com.tw",
"ASSIGNER": "security@qnap.com",
"DATE_PUBLIC": "2017-11-21T00:00:00",
"ID": "CVE-2017-13071",
"STATE": "PUBLIC"

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "43249",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/43249/"
},
{
"name": "https://packetstormsecurity.com/files/145307/FS-Linkedin-Clone-1.0-SQL-Injection.html",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/145307/FS-Linkedin-Clone-1.0-SQL-Injection.html"
},
{
"name": "43249",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43249/"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/Telaxus/EPESI/commit/36be628c2597fd0209224a09b17858294f49c585",
"refsource" : "CONFIRM",
"url" : "https://github.com/Telaxus/EPESI/commit/36be628c2597fd0209224a09b17858294f49c585"
},
{
"name": "https://github.com/Telaxus/EPESI/issues/196",
"refsource": "CONFIRM",
"url": "https://github.com/Telaxus/EPESI/issues/196"
},
{
"name": "https://github.com/Telaxus/EPESI/commit/36be628c2597fd0209224a09b17858294f49c585",
"refsource": "CONFIRM",
"url": "https://github.com/Telaxus/EPESI/commit/36be628c2597fd0209224a09b17858294f49c585"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cybersecurity@se.com",
"ASSIGNER": "cybersecurity@schneider-electric.com",
"DATE_PUBLIC": "2018-02-12T00:00:00",
"ID": "CVE-2017-9966",
"STATE": "PUBLIC"

View File

@ -91,16 +91,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://kb.juniper.net/JSA10859",
"refsource" : "CONFIRM",
"url" : "https://kb.juniper.net/JSA10859"
},
{
"name": "104720",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104720"
},
{
"name": "https://kb.juniper.net/JSA10859",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA10859"
},
{
"name": "1041315",
"refsource": "SECTRACK",

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01",
"refsource" : "CONFIRM",
"url" : "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01"
},
{
"name" : "DSA-4138",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4138"
"name": "103057",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103057"
},
{
"name": "DSA-4147",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4147"
},
{
"name": "DSA-4138",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4138"
},
{
"name": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01",
"refsource": "CONFIRM",
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01"
},
{
"name": "GLSA-201804-19",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201804-19"
},
{
"name" : "103057",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/103057"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "44994",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/44994/"
},
{
"name" : "https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915",
"refsource" : "CONFIRM",
"url" : "https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915"
},
{
"name": "https://trac.torproject.org/projects/tor/ticket/24700",
"refsource": "CONFIRM",
@ -71,6 +61,16 @@
"name": "https://trac.torproject.org/projects/tor/ticket/25117",
"refsource": "CONFIRM",
"url": "https://trac.torproject.org/projects/tor/ticket/25117"
},
{
"name": "https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915",
"refsource": "CONFIRM",
"url": "https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915"
},
{
"name": "44994",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44994/"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "JVN#49995005",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN49995005/index.html"
},
{
"name": "https://www.cs.themistruct.com/report/wam20181012",
"refsource": "MISC",
@ -61,11 +66,6 @@
"name": "https://www.osstech.co.jp/support/am2018-4-1-en",
"refsource": "MISC",
"url": "https://www.osstech.co.jp/support/am2018-4-1-en"
},
{
"name" : "JVN#49995005",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN49995005/index.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-19251",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -68,11 +68,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22013500",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22013500"
},
{
"name": "103368",
"refsource": "BID",
@ -82,6 +77,11 @@
"name": "ibm-itcam-cve20181442-csrf(139598)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139598"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22013500",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22013500"
}
]
}

View File

@ -85,6 +85,11 @@
},
"references": {
"reference_data": [
{
"name": "ibm-websphere-cve20181883-dos(151969)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/151969"
},
{
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10738197",
"refsource": "CONFIRM",
@ -94,11 +99,6 @@
"name": "106146",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106146"
},
{
"name" : "ibm-websphere-cve20181883-dos(151969)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/151969"
}
]
}

View File

@ -79,11 +79,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10744217",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10744217"
},
{
"name": "106201",
"refsource": "BID",
@ -93,6 +88,11 @@
"name": "ibm-marketing-cve20181920-xxe(152855)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/152855"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=ibm10744217",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10744217"
}
]
}