"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 07:18:25 +00:00
parent 6621e76abc
commit 13a8384629
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 3924 additions and 3924 deletions

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "A013101-1",
"refsource" : "ATSTAKE",
"url" : "http://www.atstake.com/research/advisories/2001/a013101-1.txt"
},
{
"name": "20010131 Cisco Content Services Switch Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/arrowpoint-cli-filesystem-pub.shtml"
},
{
"name": "A013101-1",
"refsource": "ATSTAKE",
"url": "http://www.atstake.com/research/advisories/2001/a013101-1.txt"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20001218 Stunnel format bug",
"name": "20001209 Trustix Security Advisory - stunnel",
"refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/151719"
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0337.html"
},
{
"name": "RHSA-2000:129",
@ -68,24 +68,24 @@
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000363"
},
{
"name" : "20001209 Trustix Security Advisory - stunnel",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-12/0337.html"
"name": "stunnel-format-logfile(5807)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5807"
},
{
"name": "DSA-009",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2001/dsa-009"
},
{
"name" : "stunnel-format-logfile(5807)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5807"
},
{
"name": "2128",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2128"
},
{
"name": "20001218 Stunnel format bug",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/151719"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "MS00-077",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-077"
},
{
"name": "netmeeting-desktop-sharing-dos(5368)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/5368.php"
},
{
"name": "MS00-077",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-077"
},
{
"name": "5608",
"refsource": "OSVDB",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "SUSE-SA:2008:006",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html"
},
{
"name": "28806",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28806"
},
{
"name": "SUSE-SA:2008:006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2008-1103",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "GLSA-200805-12",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200805-12.xml"
},
{
"name" : "MDVSA-2008:204",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:204"
"name": "29842",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29842"
},
{
"name": "SUSE-SR:2008:010",
@ -73,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/28936"
},
{
"name" : "29957",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29957"
"name": "MDVSA-2008:204",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:204"
},
{
"name": "30151",
@ -83,14 +78,19 @@
"url": "http://secunia.com/advisories/30151"
},
{
"name" : "29842",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29842"
"name": "GLSA-200805-12",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200805-12.xml"
},
{
"name": "blender-file-unspecified(42153)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42153"
},
{
"name": "29957",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29957"
}
]
}

View File

@ -52,20 +52,40 @@
},
"references": {
"reference_data": [
{
"name": "33295",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33295"
},
{
"name": "http://www.php-fusion.co.uk/news.php",
"refsource": "CONFIRM",
"url": "http://www.php-fusion.co.uk/news.php"
},
{
"name": "phpfusion-submit-sql-injection(41914)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41914"
},
{
"name": "5470",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5470"
},
{
"name": "ADV-2008-1318",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1318/references"
},
{
"name": "7576",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7576"
},
{
"name" : "http://www.php-fusion.co.uk/news.php",
"refsource" : "CONFIRM",
"url" : "http://www.php-fusion.co.uk/news.php"
"name": "29930",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29930"
},
{
"name": "28855",
@ -77,26 +97,6 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/51052"
},
{
"name" : "33295",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33295"
},
{
"name" : "ADV-2008-1318",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1318/references"
},
{
"name" : "29930",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29930"
},
{
"name" : "phpfusion-submit-sql-injection(41914)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41914"
},
{
"name": "phpfusion-submitinfo-sql-injection(47610)",
"refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://drupal.org/node/250408",
"refsource" : "CONFIRM",
"url" : "http://drupal.org/node/250408"
"name": "29960",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29960"
},
{
"name": "ADV-2008-1353",
@ -63,9 +63,9 @@
"url": "http://www.vupen.com/english/advisories/2008/1353/references"
},
{
"name" : "29960",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29960"
"name": "http://drupal.org/node/250408",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/250408"
},
{
"name": "epublish-forms-csrf(41978)",

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "IZ28611",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ28611"
},
{
"name" : "IZ37270",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ37270"
},
{
"name" : "32461",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32461"
},
{
"name": "32755",
"refsource": "SECUNIA",
@ -76,6 +61,21 @@
"name": "tivoli-ebusiness-webseal-dos(46821)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46821"
},
{
"name": "32461",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32461"
},
{
"name": "IZ28611",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ28611"
},
{
"name": "IZ37270",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ37270"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2008-5262",
"STATE": "PUBLIC"
},
@ -58,9 +58,19 @@
"url": "http://secunia.com/secunia_research/2008-59/"
},
{
"name" : "DSA-1717",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1717"
"name": "33637",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33637"
},
{
"name": "33470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33470"
},
{
"name": "33801",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33801"
},
{
"name": "FEDORA-2009-0856",
@ -73,19 +83,9 @@
"url": "http://www.securityfocus.com/bid/33231"
},
{
"name" : "33470",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33470"
},
{
"name" : "33637",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33637"
},
{
"name" : "33801",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33801"
"name": "DSA-1717",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1717"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7092"
},
{
"name": "books-bookid-sql-injection(46561)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46561"
},
{
"name": "32255",
"refsource": "BID",
@ -66,11 +71,6 @@
"name": "4774",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4774"
},
{
"name" : "books-bookid-sql-injection(46561)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46561"
}
]
}

View File

@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.voipshield.com/research-details.php?id=121",
"refsource" : "MISC",
"url" : "http://www.voipshield.com/research-details.php?id=121"
},
{
"name" : "http://www.voipshield.com/research-details.php?id=122",
"refsource" : "MISC",
"url" : "http://www.voipshield.com/research-details.php?id=122"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-391.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-391.htm"
"name": "avaya-cm-backuphistory-cmd-execution(45747)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45747"
},
{
"name": "31645",
@ -77,20 +67,30 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2772"
},
{
"name": "http://www.voipshield.com/research-details.php?id=122",
"refsource": "MISC",
"url": "http://www.voipshield.com/research-details.php?id=122"
},
{
"name": "32204",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32204"
},
{
"name" : "avaya-cm-backuphistory-cmd-execution(45747)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45747"
},
{
"name": "avaya-cm-setstatic-command-execution(45749)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45749"
},
{
"name": "http://www.voipshield.com/research-details.php?id=121",
"refsource": "MISC",
"url": "http://www.voipshield.com/research-details.php?id=121"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-391.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-391.htm"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-2545",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0265",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130206 CVE request: Insecure default log file path in xNBD",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/02/06/2"
},
{
"name": "[oss-security] 20130206 Re: CVE request: Insecure default log file path in xNBD",
"refsource": "MLIST",
@ -66,6 +61,11 @@
"name": "90008",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/90008"
},
{
"name": "[oss-security] 20130206 CVE request: Insecure default log file path in xNBD",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/06/2"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0302",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-0536",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21633827",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21633827"
},
{
"name": "notes-cve20130536-code-exec(82658)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/82658"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21633827",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21633827"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-0655",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.us-cert.gov/control_systems/pdf/ICSA-13-016-01.pdf",
"refsource" : "MISC",
"url" : "http://www.us-cert.gov/control_systems/pdf/ICSA-13-016-01.pdf"
},
{
"name": "http://www.schneider-electric.com/download/ww/en/details/29960967-SE-Software-Update-Utility-Vulnerability-Disclosure/?reference=SEVD-2013-009-01",
"refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "http://www2.schneider-electric.com/corporate/en/support/cybersecurity/viewer-news.page?c_filepath=/templatedata/Content/News/data/en/local/cybersecurity/general_information/2013/01/20130109_advisory_of_vulnerability_affecting_schneider_electric_s_software_upda.xml",
"refsource": "CONFIRM",
"url": "http://www2.schneider-electric.com/corporate/en/support/cybersecurity/viewer-news.page?c_filepath=/templatedata/Content/News/data/en/local/cybersecurity/general_information/2013/01/20130109_advisory_of_vulnerability_affecting_schneider_electric_s_software_upda.xml"
},
{
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-016-01.pdf",
"refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-016-01.pdf"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-0963",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5642"
},
{
"name" : "APPLE-SA-2013-01-28-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
},
{
"name": "APPLE-SA-2013-03-14-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html"
},
{
"name": "APPLE-SA-2013-01-28-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1272",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:16443",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16443"
},
{
"name": "MS13-016",
"refsource": "MS",
@ -61,11 +66,6 @@
"name": "TA13-043B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
},
{
"name" : "oval:org.mitre.oval:def:16443",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16443"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1896",
"STATE": "PUBLIC"
},
@ -52,75 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?r1=1482522&r2=1485668&diff_format=h",
"refsource" : "CONFIRM",
"url" : "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?r1=1482522&r2=1485668&diff_format=h"
},
{
"name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?view=log",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?view=log"
},
{
"name" : "http://www.apache.org/dist/httpd/Announcement2.2.html",
"refsource" : "CONFIRM",
"url" : "http://www.apache.org/dist/httpd/Announcement2.2.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21644047",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644047"
},
{
"name" : "http://support.apple.com/kb/HT6150",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6150"
},
{
"name" : "https://httpd.apache.org/security/vulnerabilities_24.html",
"refsource" : "CONFIRM",
"url" : "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"name" : "20130822 Apache HTTP Server MERGE Request Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1896"
},
{
"name" : "HPSBUX02927",
"refsource" : "HP",
"url" : "https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken"
},
{
"name": "SSRT101288",
"refsource": "HP",
"url": "https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken"
},
{
"name" : "RHSA-2013:1156",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1156.html"
},
{
"name" : "RHSA-2013:1207",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1207.html"
},
{
"name" : "RHSA-2013:1208",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1208.html"
},
{
"name": "RHSA-2013:1209",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1209.html"
},
{
"name" : "openSUSE-SU-2013:1337",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html"
"name": "oval:org.mitre.oval:def:18835",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18835"
},
{
"name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?r1=1482522&r2=1485668&diff_format=h",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?r1=1482522&r2=1485668&diff_format=h"
},
{
"name": "openSUSE-SU-2013:1340",
@ -128,34 +88,74 @@
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html"
},
{
"name" : "openSUSE-SU-2013:1341",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html"
"name": "oval:org.mitre.oval:def:19747",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19747"
},
{
"name": "http://support.apple.com/kb/HT6150",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6150"
},
{
"name": "RHSA-2013:1156",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1156.html"
},
{
"name": "USN-1903-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1903-1"
},
{
"name": "HPSBUX02927",
"refsource": "HP",
"url": "https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken"
},
{
"name": "RHSA-2013:1207",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1207.html"
},
{
"name": "61129",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61129"
},
{
"name" : "oval:org.mitre.oval:def:18835",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18835"
"name": "http://www.apache.org/dist/httpd/Announcement2.2.html",
"refsource": "CONFIRM",
"url": "http://www.apache.org/dist/httpd/Announcement2.2.html"
},
{
"name" : "oval:org.mitre.oval:def:19747",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19747"
"name": "RHSA-2013:1208",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1208.html"
},
{
"name": "20130822 Apache HTTP Server MERGE Request Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1896"
},
{
"name": "https://httpd.apache.org/security/vulnerabilities_24.html",
"refsource": "CONFIRM",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"name": "openSUSE-SU-2013:1341",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html"
},
{
"name": "55032",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55032"
},
{
"name": "openSUSE-SU-2013:1337",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html"
}
]
}

View File

@ -52,20 +52,45 @@
},
"references": {
"reference_data": [
{
"name": "MDVSA-2013:160",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:160"
},
{
"name": "20130424 [waraxe-2013-SA#103] - Multiple Vulnerabilities in phpMyAdmin",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0217.html"
},
{
"name": "FEDORA-2013-6928",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html"
},
{
"name": "openSUSE-SU-2013:1065",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html"
},
{
"name": "https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48",
"refsource": "CONFIRM",
"url": "https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48"
},
{
"name": "FEDORA-2013-6977",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html"
},
{
"name": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php",
"refsource": "CONFIRM",
"url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-3.php"
},
{
"name" : "https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48",
"refsource" : "CONFIRM",
"url" : "https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48"
"name": "FEDORA-2013-7000",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html"
},
{
"name": "https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a",
@ -76,31 +101,6 @@
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0133"
},
{
"name" : "FEDORA-2013-6928",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104936.html"
},
{
"name" : "FEDORA-2013-6977",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104770.html"
},
{
"name" : "FEDORA-2013-7000",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104725.html"
},
{
"name" : "MDVSA-2013:160",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:160"
},
{
"name" : "openSUSE-SU-2013:1065",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00181.html"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=971637",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=971637"
},
{
"name": "https://www.halock.com/blog/cve-2013-3734-jboss-administration-console-password-returned-response/",
"refsource": "MISC",
@ -66,6 +61,11 @@
"name": "60429",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/60429"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=971637",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=971637"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2013-3930",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4232",
"STATE": "PUBLIC"
},
@ -52,21 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130809 Re: CVE Request -- Four (stack-based) buffer overflows and one use-after-free in libtiff v4.0.3 reported by Pedro Ribeiro",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/08/10/2"
},
{
"name" : "[tiff] 20130801 Vulnerabilities in libtiff 4.0.3",
"refsource" : "MLIST",
"url" : "http://www.asmail.be/msg0055359936.html"
},
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2449",
"refsource": "CONFIRM",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2449"
},
{
"name": "RHSA-2014:0223",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0223.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=995975",
"refsource": "CONFIRM",
@ -77,20 +72,25 @@
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2744"
},
{
"name" : "RHSA-2014:0223",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0223.html"
},
{
"name": "54543",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54543"
},
{
"name": "[tiff] 20130801 Vulnerabilities in libtiff 4.0.3",
"refsource": "MLIST",
"url": "http://www.asmail.be/msg0055359936.html"
},
{
"name": "54628",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54628"
},
{
"name": "[oss-security] 20130809 Re: CVE Request -- Four (stack-based) buffer overflows and one use-after-free in libtiff v4.0.3 reported by Pedro Ribeiro",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/08/10/2"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-002/",
"refsource" : "MISC",
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-002/"
"name": "53283",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53283"
},
{
"name": "http://typo3.org/extensions/repository/view/lonewsseo",
@ -63,9 +63,9 @@
"url": "http://typo3.org/extensions/repository/view/lonewsseo"
},
{
"name" : "53283",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/53283"
"name": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-002/",
"refsource": "MISC",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-002/"
},
{
"name": "typo3-ttnews-unspecified-sql-injection(81574)",

View File

@ -52,26 +52,26 @@
},
"references": {
"reference_data": [
{
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=50083",
"refsource" : "CONFIRM",
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=50083"
},
{
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8826",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8826"
},
{
"name": "54425",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54425"
},
{
"name": "https://www.wireshark.org/security/wnpa-sec-2013-42.html",
"refsource": "CONFIRM",
"url": "https://www.wireshark.org/security/wnpa-sec-2013-42.html"
},
{
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html"
},
{
"name": "GLSA-201308-05",
"refsource": "GENTOO",
@ -88,9 +88,9 @@
"url": "http://secunia.com/advisories/54296"
},
{
"name" : "54425",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54425"
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=50083",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=50083"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=852101",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=852101"
},
{
"name": "SUSE-SU-2013:1813",
"refsource": "SUSE",
"url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131813-1.html"
},
{
"name" : "100652",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/100652"
"name": "https://bugzilla.novell.com/show_bug.cgi?id=852101",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=852101"
},
{
"name": "slms-cve20137042-information-disclosure(89897)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89897"
},
{
"name": "100652",
"refsource": "OSVDB",
"url": "http://osvdb.org/100652"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20131206 CVE request for Drupal core, and contributed modules",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/12/06/7"
},
{
"name": "[oss-security] 20131211 Re: CVE request for Drupal core, and contributed modules",
"refsource": "MLIST",
@ -71,6 +66,11 @@
"name": "https://drupal.org/node/2140209",
"refsource": "CONFIRM",
"url": "https://drupal.org/node/2140209"
},
{
"name": "[oss-security] 20131206 CVE request for Drupal core, and contributed modules",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/12/06/7"
}
]
}

View File

@ -57,6 +57,11 @@
},
"references": {
"reference_data": [
{
"name": "1038932",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038932"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "99806",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99806"
},
{
"name" : "1038932",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038932"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/ImageMagick/ImageMagick/issues/682",
"refsource" : "CONFIRM",
"url" : "https://github.com/ImageMagick/ImageMagick/issues/682"
},
{
"name" : "DSA-4032",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2017/dsa-4032"
},
{
"name": "DSA-4040",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4040"
},
{
"name": "USN-3681-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3681-1/"
},
{
"name": "GLSA-201711-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201711-07"
},
{
"name" : "USN-3681-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3681-1/"
"name": "DSA-4032",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4032"
},
{
"name": "https://github.com/ImageMagick/ImageMagick/issues/682",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/ImageMagick/issues/682"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.tcpdump.org/tcpdump-changes.txt",
"refsource" : "CONFIRM",
"url" : "http://www.tcpdump.org/tcpdump-changes.txt"
},
{
"name" : "https://github.com/the-tcpdump-group/tcpdump/commit/c177cb3800a9a68d79b2812f0ffcb9479abd6eb8",
"refsource" : "CONFIRM",
"url" : "https://github.com/the-tcpdump-group/tcpdump/commit/c177cb3800a9a68d79b2812f0ffcb9479abd6eb8"
"name": "GLSA-201709-23",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201709-23"
},
{
"name": "https://support.apple.com/HT208221",
@ -73,19 +68,24 @@
"url": "http://www.debian.org/security/2017/dsa-3971"
},
{
"name" : "GLSA-201709-23",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201709-23"
},
{
"name" : "RHEA-2018:0705",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHEA-2018:0705"
"name": "https://github.com/the-tcpdump-group/tcpdump/commit/c177cb3800a9a68d79b2812f0ffcb9479abd6eb8",
"refsource": "CONFIRM",
"url": "https://github.com/the-tcpdump-group/tcpdump/commit/c177cb3800a9a68d79b2812f0ffcb9479abd6eb8"
},
{
"name": "1039307",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039307"
},
{
"name": "http://www.tcpdump.org/tcpdump-changes.txt",
"refsource": "CONFIRM",
"url": "http://www.tcpdump.org/tcpdump-changes.txt"
},
{
"name": "RHEA-2018:0705",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHEA-2018:0705"
}
]
}

View File

@ -52,6 +52,31 @@
},
"references": {
"reference_data": [
{
"name": "USN-3696-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3696-1/"
},
{
"name": "USN-3762-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3762-1/"
},
{
"name": "100497",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100497"
},
{
"name": "USN-3762-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3762-2/"
},
{
"name": "USN-3696-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3696-2/"
},
{
"name": "https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5",
"refsource": "MISC",
@ -61,31 +86,6 @@
"name": "https://patchwork.kernel.org/patch/9850567/",
"refsource": "MISC",
"url": "https://patchwork.kernel.org/patch/9850567/"
},
{
"name" : "USN-3696-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3696-1/"
},
{
"name" : "USN-3696-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3696-2/"
},
{
"name" : "USN-3762-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3762-1/"
},
{
"name" : "USN-3762-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3762-2/"
},
{
"name" : "100497",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/100497"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
"name": "1039791",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039791"
},
{
"name": "101814",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/101814"
},
{
"name" : "1039791",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039791"
"name": "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb17-36.html"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "https://seccops.com/centos-web-panel-0-9-8-480-multiple-vulnerabilities/",
"refsource": "MISC",
"url": "https://seccops.com/centos-web-panel-0-9-8-480-multiple-vulnerabilities/"
},
{
"name": "45610",
"refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "https://0day.today/exploit/31304",
"refsource": "MISC",
"url": "https://0day.today/exploit/31304"
},
{
"name" : "https://seccops.com/centos-web-panel-0-9-8-480-multiple-vulnerabilities/",
"refsource" : "MISC",
"url" : "https://seccops.com/centos-web-panel-0-9-8-480-multiple-vulnerabilities/"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-1181",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -100,15 +100,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10875318",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10875318"
},
{
"name": "ibm-rqm-cve20181759-xss(148613)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/148613"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=ibm10875318",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10875318"
}
]
}

View File

@ -85,15 +85,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10787785",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10787785"
},
{
"name": "ibm-sam-cve20181814-info-disc(150018)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150018"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=ibm10787785",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10787785"
}
]
}

View File

@ -68,15 +68,15 @@
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K50254952"
},
{
"name" : "1041022",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041022"
},
{
"name": "1041023",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041023"
},
{
"name": "1041022",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041022"
}
]
}