"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:46:21 +00:00
parent b1c93576cd
commit 167c9a29ec
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 3766 additions and 3766 deletions

View File

@ -52,25 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20010402 (no subject)",
"refsource" : "VULN-DEV",
"url" : "http://archives.neohapsis.com/archives/vuln-dev/2001-q2/0020.html"
},
{
"name" : "20010420 Novell BorderManager 3.5 VPN Denial of Service",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=98779821207867&w=2"
},
{ {
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2959062.htm", "name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2959062.htm",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2959062.htm" "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2959062.htm"
}, },
{ {
"name" : "20010429 Proof of concept DoS against novell border manager enterprise", "name": "20010420 Novell BorderManager 3.5 VPN Denial of Service",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=98865027328391&w=2" "url": "http://marc.info/?l=bugtraq&m=98779821207867&w=2"
}, },
{ {
"name": "20010501 Re: Proof of concept DoS against novell border manager enterprise edition 3.5", "name": "20010501 Re: Proof of concept DoS against novell border manager enterprise edition 3.5",
@ -82,6 +72,16 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/2623" "url": "http://www.securityfocus.com/bid/2623"
}, },
{
"name": "20010402 (no subject)",
"refsource": "VULN-DEV",
"url": "http://archives.neohapsis.com/archives/vuln-dev/2001-q2/0020.html"
},
{
"name": "20010429 Proof of concept DoS against novell border manager enterprise",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=98865027328391&w=2"
},
{ {
"name": "bordermanager-vpn-syn-dos(6429)", "name": "bordermanager-vpn-syn-dos(6429)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20010430 some ftpd implementations mishandle CWD ~{", "name": "SuSE-SA:2001:043",
"refsource" : "VULN-DEV", "refsource": "SUSE",
"url" : "http://www.securityfocus.com/archive/82/180823" "url": "http://www.novell.com/linux/security/advisories/2001_043_wuftpd_txt.html"
}, },
{ {
"name": "20011128 CORE-20011001: Wu-FTP glob heap corruption vulnerability", "name": "20011128 CORE-20011001: Wu-FTP glob heap corruption vulnerability",
@ -68,59 +68,59 @@
"url": "http://www.cert.org/advisories/CA-2001-33.html" "url": "http://www.cert.org/advisories/CA-2001-33.html"
}, },
{ {
"name" : "VU#886083", "name": "wuftp-glob-heap-corruption(7611)",
"refsource" : "CERT-VN", "refsource": "XF",
"url" : "http://www.kb.cert.org/vuls/id/886083" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7611"
},
{
"name" : "CSSA-2001-041.0",
"refsource" : "CALDERA",
"url" : "http://www.caldera.com/support/security/advisories/CSSA-2001-041.0.txt"
},
{
"name" : "CLA-2001:442",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000442"
},
{
"name" : "DSA-087",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2001/dsa-087"
},
{
"name" : "HPSBUX0107-162",
"refsource" : "HP",
"url" : "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0107-162"
},
{
"name" : "IMNX-2001-70-036-01",
"refsource" : "IMMUNIX",
"url" : "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-036-01"
}, },
{ {
"name": "MDKSA-2001:090", "name": "MDKSA-2001:090",
"refsource": "MANDRAKE", "refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-090.php3" "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-090.php3"
}, },
{
"name": "CLA-2001:442",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000442"
},
{
"name": "HPSBUX0107-162",
"refsource": "HP",
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0107-162"
},
{
"name": "20010430 some ftpd implementations mishandle CWD ~{",
"refsource": "VULN-DEV",
"url": "http://www.securityfocus.com/archive/82/180823"
},
{
"name": "CSSA-2001-041.0",
"refsource": "CALDERA",
"url": "http://www.caldera.com/support/security/advisories/CSSA-2001-041.0.txt"
},
{
"name": "DSA-087",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2001/dsa-087"
},
{
"name": "IMNX-2001-70-036-01",
"refsource": "IMMUNIX",
"url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-036-01"
},
{ {
"name": "RHSA-2001:157", "name": "RHSA-2001:157",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2001-157.html" "url": "http://www.redhat.com/support/errata/RHSA-2001-157.html"
}, },
{ {
"name" : "SuSE-SA:2001:043", "name": "VU#886083",
"refsource" : "SUSE", "refsource": "CERT-VN",
"url" : "http://www.novell.com/linux/security/advisories/2001_043_wuftpd_txt.html" "url": "http://www.kb.cert.org/vuls/id/886083"
}, },
{ {
"name": "3581", "name": "3581",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/3581" "url": "http://www.securityfocus.com/bid/3581"
},
{
"name" : "wuftp-glob-heap-corruption(7611)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7611"
} }
] ]
} }

View File

@ -53,8 +53,8 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20010621 SECURITY.NNOV: KAV (AVP) for sendmail format string vulnerability ",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"name": "20010621 SECURITY.NNOV: KAV (AVP) for sendmail format string vulnerability",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0274.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0274.html"
} }
] ]

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "6795",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6795"
},
{ {
"name": "20011120 IIS logging issue", "name": "20011120 IIS logging issue",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -66,11 +71,6 @@
"name": "iis-fake-log-entry(7613)", "name": "iis-fake-log-entry(7613)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7613" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7613"
},
{
"name" : "6795",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/6795"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "RHSA-2001:144",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2001-144.html"
},
{ {
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325", "name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325" "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325"
},
{
"name": "RHSA-2001:144",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2001-144.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "APPLE-SA-2008-05-28", "name": "29481",
"refsource" : "APPLE", "refsource": "BID",
"url" : "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" "url": "http://www.securityfocus.com/bid/29481"
}, },
{ {
"name": "TA08-150A", "name": "TA08-150A",
@ -63,19 +63,14 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html"
}, },
{ {
"name" : "29412", "name": "30430",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/29412" "url": "http://secunia.com/advisories/30430"
}, },
{ {
"name" : "29481", "name": "APPLE-SA-2008-05-28",
"refsource" : "BID", "refsource": "APPLE",
"url" : "http://www.securityfocus.com/bid/29481" "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html"
},
{
"name" : "ADV-2008-1697",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1697"
}, },
{ {
"name": "1020137", "name": "1020137",
@ -83,14 +78,19 @@
"url": "http://securitytracker.com/id?1020137" "url": "http://securitytracker.com/id?1020137"
}, },
{ {
"name" : "30430", "name": "ADV-2008-1697",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/30430" "url": "http://www.vupen.com/english/advisories/2008/1697"
}, },
{ {
"name": "macosx-coretypes-weak-security(42711)", "name": "macosx-coretypes-weak-security(42711)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42711" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42711"
},
{
"name": "29412",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29412"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5143" "url": "https://www.exploit-db.com/exploits/5143"
}, },
{
"name" : "ADV-2008-0597",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0597"
},
{ {
"name": "29005", "name": "29005",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29005" "url": "http://secunia.com/advisories/29005"
},
{
"name": "ADV-2008-0597",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0597"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080325 aeries browser interface(ABI) 3.8.3.14 Remote SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/490033/100/0/threaded"
},
{ {
"name": "28436", "name": "28436",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/28436" "url": "http://www.securityfocus.com/bid/28436"
}, },
{
"name": "abi-loginproc-login-xss(41430)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41430"
},
{ {
"name": "29533", "name": "29533",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -73,9 +73,9 @@
"url": "http://securityreason.com/securityalert/3787" "url": "http://securityreason.com/securityalert/3787"
}, },
{ {
"name" : "abi-loginproc-login-xss(41430)", "name": "20080325 aeries browser interface(ABI) 3.8.3.14 Remote SQL Injection",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41430" "url": "http://www.securityfocus.com/archive/1/490033/100/0/threaded"
} }
] ]
} }

View File

@ -58,9 +58,24 @@
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4153" "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4153"
}, },
{ {
"name" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154", "name": "oval:org.mitre.oval:def:5321",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5321"
},
{
"name": "28467",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28467"
},
{
"name": "1019606",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019606"
},
{
"name": "IZ06663",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ06663"
}, },
{ {
"name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155", "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155",
@ -78,29 +93,14 @@
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ06505" "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ06505"
}, },
{ {
"name" : "IZ06663", "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154",
"refsource" : "AIXAPAR", "refsource": "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=isg1IZ06663" "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154"
},
{
"name" : "28467",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28467"
},
{
"name" : "oval:org.mitre.oval:def:5321",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5321"
}, },
{ {
"name": "ADV-2008-0865", "name": "ADV-2008-0865",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0865" "url": "http://www.vupen.com/english/advisories/2008/0865"
},
{
"name" : "1019606",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019606"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-1951", "ID": "CVE-2008-1951",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=447705", "name": "30803",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=447705" "url": "http://secunia.com/advisories/30803"
},
{
"name" : "RHSA-2008:0497",
"refsource" : "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2008-0497.html"
},
{
"name" : "29913",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29913"
}, },
{ {
"name": "oval:org.mitre.oval:def:9635", "name": "oval:org.mitre.oval:def:9635",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9635" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9635"
}, },
{
"name": "redhat-sblim-privilege-escalation(43315)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43315"
},
{
"name": "RHSA-2008:0497",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2008-0497.html"
},
{ {
"name": "1020354", "name": "1020354",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020354" "url": "http://www.securitytracker.com/id?1020354"
}, },
{ {
"name" : "30803", "name": "29913",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/30803" "url": "http://www.securityfocus.com/bid/29913"
}, },
{ {
"name" : "redhat-sblim-privilege-escalation(43315)", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=447705",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43315" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447705"
} }
] ]
} }

View File

@ -53,34 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20081124 Amaya (URL Bar) Remote Stack Overflow Vulnerability", "name": "http://www.bmgsec.com.au/advisory/40/",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://www.securityfocus.com/archive/1/498578/100/0/threaded" "url": "http://www.bmgsec.com.au/advisory/40/"
}, },
{ {
"name": "20081124 Amaya (id) Remote Stack Overflow Vulnerability", "name": "20081124 Amaya (id) Remote Stack Overflow Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/498583/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/498583/100/0/threaded"
}, },
{
"name" : "http://www.bmgsec.com.au/advisory/40/",
"refsource" : "MISC",
"url" : "http://www.bmgsec.com.au/advisory/40/"
},
{
"name" : "http://www.bmgsec.com.au/advisory/41/",
"refsource" : "MISC",
"url" : "http://www.bmgsec.com.au/advisory/41/"
},
{ {
"name": "32442", "name": "32442",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32442" "url": "http://www.securityfocus.com/bid/32442"
}, },
{ {
"name" : "ADV-2008-3255", "name": "4657",
"refsource" : "VUPEN", "refsource": "SREASON",
"url" : "http://www.vupen.com/english/advisories/2008/3255" "url": "http://securityreason.com/securityalert/4657"
}, },
{ {
"name": "50282", "name": "50282",
@ -92,15 +82,25 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/50283" "url": "http://osvdb.org/50283"
}, },
{
"name": "20081124 Amaya (URL Bar) Remote Stack Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/498578/100/0/threaded"
},
{ {
"name": "32848", "name": "32848",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32848" "url": "http://secunia.com/advisories/32848"
}, },
{ {
"name" : "4657", "name": "ADV-2008-3255",
"refsource" : "SREASON", "refsource": "VUPEN",
"url" : "http://securityreason.com/securityalert/4657" "url": "http://www.vupen.com/english/advisories/2008/3255"
},
{
"name": "http://www.bmgsec.com.au/advisory/41/",
"refsource": "MISC",
"url": "http://www.bmgsec.com.au/advisory/41/"
} }
] ]
} }

View File

@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html", "name": "1021246",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html" "url": "http://www.securitytracker.com/id?1021246"
}, },
{ {
"name": "http://seer.entsupport.symantec.com/docs/314528.htm", "name": "http://seer.entsupport.symantec.com/docs/314528.htm",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://seer.entsupport.symantec.com/docs/314528.htm" "url": "http://seer.entsupport.symantec.com/docs/314528.htm"
}, },
{
"name" : "32346",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32346"
},
{ {
"name": "ADV-2008-3209", "name": "ADV-2008-3209",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3209" "url": "http://www.vupen.com/english/advisories/2008/3209"
}, },
{
"name" : "1021246",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021246"
},
{ {
"name": "32810", "name": "32810",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32810" "url": "http://secunia.com/advisories/32810"
}, },
{
"name": "http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html",
"refsource": "CONFIRM",
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html"
},
{ {
"name": "backupexec-dataprotocol-bo(46731)", "name": "backupexec-dataprotocol-bo(46731)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46731" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46731"
},
{
"name": "32346",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32346"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7121" "url": "https://www.exploit-db.com/exploits/7121"
}, },
{
"name" : "32300",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32300"
},
{ {
"name": "4717", "name": "4717",
"refsource": "SREASON", "refsource": "SREASON",
@ -71,6 +66,11 @@
"name": "slimcms-edit-sql-injection(46633)", "name": "slimcms-edit-sql-injection(46633)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46633" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46633"
},
{
"name": "32300",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32300"
} }
] ]
} }

View File

@ -53,25 +53,40 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20081028 Quassel IRC: connection hijacking", "name": "32470",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/497882/30/0/threaded" "url": "http://secunia.com/advisories/32470"
}, },
{ {
"name": "20081028 Re: Quassel IRC: connection hijacking", "name": "20081028 Re: Quassel IRC: connection hijacking",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497884" "url": "http://www.securityfocus.com/archive/1/497884"
}, },
{
"name" : "http://wouter.coekaerts.be/site/security/quassel-ctcp",
"refsource" : "MISC",
"url" : "http://wouter.coekaerts.be/site/security/quassel-ctcp"
},
{ {
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506550", "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506550",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506550" "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506550"
}, },
{
"name": "quasselirc-ctcp-command-execution(46195)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46195"
},
{
"name": "20081028 Quassel IRC: connection hijacking",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497882/30/0/threaded"
},
{
"name": "ADV-2008-3164",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3164"
},
{
"name": "http://wouter.coekaerts.be/site/security/quassel-ctcp",
"refsource": "MISC",
"url": "http://wouter.coekaerts.be/site/security/quassel-ctcp"
},
{ {
"name": "http://quassel-irc.org/node/89", "name": "http://quassel-irc.org/node/89",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -82,30 +97,15 @@
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00354.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00354.html"
}, },
{
"name" : "31973",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31973"
},
{
"name" : "32470",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32470"
},
{ {
"name": "32692", "name": "32692",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32692" "url": "http://secunia.com/advisories/32692"
}, },
{ {
"name" : "ADV-2008-3164", "name": "31973",
"refsource" : "VUPEN", "refsource": "BID",
"url" : "http://www.vupen.com/english/advisories/2008/3164" "url": "http://www.securityfocus.com/bid/31973"
},
{
"name" : "quasselirc-ctcp-command-execution(46195)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46195"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2188", "ID": "CVE-2011-2188",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "48123",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48123"
},
{ {
"name": "[oss-security] 20110606 CVE Request -- LuaExpat -- Prone to XML \"billion laughs attack\"", "name": "[oss-security] 20110606 CVE Request -- LuaExpat -- Prone to XML \"billion laughs attack\"",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/06/4" "url": "http://www.openwall.com/lists/oss-security/2011/06/06/4"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=711027",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711027"
},
{ {
"name": "[oss-security] 20110606 Re: CVE Request -- LuaExpat -- Prone to XML \"billion laughs attack\"", "name": "[oss-security] 20110606 Re: CVE Request -- LuaExpat -- Prone to XML \"billion laughs attack\"",
"refsource": "MLIST", "refsource": "MLIST",
@ -68,24 +78,14 @@
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629225" "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629225"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=711027", "name": "luaexpat-xml-dos(67862)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=711027" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67862"
},
{
"name" : "48123",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/48123"
}, },
{ {
"name": "44866", "name": "44866",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44866" "url": "http://secunia.com/advisories/44866"
},
{
"name" : "luaexpat-xml-dos(67862)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67862"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-2302", "ID": "CVE-2011-2302",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
},
{ {
"name": "50221", "name": "50221",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/50221" "url": "http://www.securityfocus.com/bid/50221"
}, },
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
},
{ {
"name": "46504", "name": "46504",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2011-2735", "ID": "CVE-2011-2735",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20110818 ESA-2011-025: Multiple buffer overflow vulnerabilities in EMC AutoStart", "name": "8352",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/519371/100/0/threaded" "url": "http://securityreason.com/securityalert/8352"
},
{
"name" : "49238",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/49238"
},
{
"name" : "1025958",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1025958"
}, },
{ {
"name": "45703", "name": "45703",
@ -73,14 +63,24 @@
"url": "http://secunia.com/advisories/45703" "url": "http://secunia.com/advisories/45703"
}, },
{ {
"name" : "8352", "name": "1025958",
"refsource" : "SREASON", "refsource": "SECTRACK",
"url" : "http://securityreason.com/securityalert/8352" "url": "http://securitytracker.com/id?1025958"
},
{
"name": "49238",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49238"
}, },
{ {
"name": "autostart-multiple-bo(69296)", "name": "autostart-multiple-bo(69296)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69296" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69296"
},
{
"name": "20110818 ESA-2011-025: Multiple buffer overflow vulnerabilities in EMC AutoStart",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/519371/100/0/threaded"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20110713 CVE Request: hplip/foomatic-filters", "name": "MDVSA-2011:125",
"refsource" : "MLIST", "refsource": "MANDRIVA",
"url" : "http://www.openwall.com/lists/oss-security/2011/07/13/3" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:125"
}, },
{ {
"name": "[oss-security] 20110718 Re: CVE Request: hplip/foomatic-filters", "name": "[oss-security] 20110718 Re: CVE Request: hplip/foomatic-filters",
@ -63,14 +63,9 @@
"url": "http://www.openwall.com/lists/oss-security/2011/07/18/3" "url": "http://www.openwall.com/lists/oss-security/2011/07/18/3"
}, },
{ {
"name" : "[oss-security] 20110728 Re: CVE Request: hplip/foomatic-filters", "name": "[oss-security] 20110713 CVE Request: hplip/foomatic-filters",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/07/28/1" "url": "http://www.openwall.com/lists/oss-security/2011/07/13/3"
},
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=698451",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=698451"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=721001", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=721001",
@ -78,30 +73,20 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=721001" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=721001"
}, },
{ {
"name" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", "name": "[oss-security] 20110728 Re: CVE Request: hplip/foomatic-filters",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" "url": "http://www.openwall.com/lists/oss-security/2011/07/28/1"
},
{
"name" : "GLSA-201203-07",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201203-07.xml"
},
{
"name" : "MDVSA-2011:125",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:125"
},
{
"name" : "RHSA-2011:1110",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1110.html"
}, },
{ {
"name": "USN-1194-1", "name": "USN-1194-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1194-1" "url": "http://www.ubuntu.com/usn/USN-1194-1"
}, },
{
"name": "RHSA-2011:1110",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1110.html"
},
{ {
"name": "45477", "name": "45477",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -111,6 +96,21 @@
"name": "foomatic-foomatic-code-execution(68994)", "name": "foomatic-foomatic-code-execution(68994)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68994" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68994"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=698451",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=698451"
},
{
"name": "GLSA-201203-07",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201203-07.xml"
},
{
"name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
"refsource": "CONFIRM",
"url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-0150", "ID": "CVE-2013-0150",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0331", "ID": "CVE-2013-0331",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=914879",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914879"
},
{
"name": "RHSA-2013:0638",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0638.html"
},
{ {
"name": "[oss-security] 20130220 Re: Jenkins CVE request for Jenkins Security Advisory 2013-02-16", "name": "[oss-security] 20130220 Re: Jenkins CVE request for Jenkins Security Advisory 2013-02-16",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/21/7" "url": "http://www.openwall.com/lists/oss-security/2013/02/21/7"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=914879", "name": "57994",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=914879" "url": "http://www.securityfocus.com/bid/57994"
}, },
{ {
"name": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb", "name": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb",
@ -71,16 +81,6 @@
"name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16", "name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16" "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16"
},
{
"name" : "RHSA-2013:0638",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0638.html"
},
{
"name" : "57994",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/57994"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2013-0841", "ID": "CVE-2013-0841",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update_22.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update_22.html"
},
{ {
"name": "https://code.google.com/p/chromium/issues/detail?id=169770", "name": "https://code.google.com/p/chromium/issues/detail?id=169770",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "oval:org.mitre.oval:def:16000", "name": "oval:org.mitre.oval:def:16000",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16000" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16000"
},
{
"name": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update_22.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update_22.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2013-1064", "ID": "CVE-2013-1064",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1104", "ID": "CVE-2013-1104",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20130123 Multiple Vulnerabilities in Cisco Wireless LAN Controllers", "name": "89533",
"refsource" : "CISCO", "refsource": "OSVDB",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc" "url": "http://osvdb.org/89533"
},
{
"name": "51965",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51965"
}, },
{ {
"name": "57524", "name": "57524",
@ -63,20 +68,15 @@
"url": "http://www.securityfocus.com/bid/57524" "url": "http://www.securityfocus.com/bid/57524"
}, },
{ {
"name" : "89533", "name": "20130123 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
"refsource" : "OSVDB", "refsource": "CISCO",
"url" : "http://osvdb.org/89533" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc"
}, },
{ {
"name": "1028027", "name": "1028027",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1028027" "url": "http://www.securitytracker.com/id/1028027"
}, },
{
"name" : "51965",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51965"
},
{ {
"name": "cisco-wlc-profiling-code-exec(81489)", "name": "cisco-wlc-profiling-code-exec(81489)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-1541", "ID": "CVE-2013-1541",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-3289", "ID": "CVE-2013-3289",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-3827", "ID": "CVE-2013-3827",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html", "name": "63052",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" "url": "http://www.securityfocus.com/bid/63052"
}, },
{ {
"name": "RHSA-2014:0029", "name": "RHSA-2014:0029",
@ -68,9 +68,9 @@
"url": "http://www.kb.cert.org/vuls/id/526012" "url": "http://www.kb.cert.org/vuls/id/526012"
}, },
{ {
"name" : "63052", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/63052" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
}, },
{ {
"name": "1029190", "name": "1029190",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4221", "ID": "CVE-2013-4221",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,15 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html", "name": "RHSA-2013:1862",
"refsource" : "MISC", "refsource": "REDHAT",
"url" : "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-1862.html"
}, },
{ {
"name": "http://restlet.org/learn/2.1/changes", "name": "http://restlet.org/learn/2.1/changes",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://restlet.org/learn/2.1/changes" "url": "http://restlet.org/learn/2.1/changes"
}, },
{
"name": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html",
"refsource": "MISC",
"url": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=995275", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=995275",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -76,11 +81,6 @@
"name": "RHSA-2013:1410", "name": "RHSA-2013:1410",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1410.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-1410.html"
},
{
"name" : "RHSA-2013:1862",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1862.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4389", "ID": "CVE-2013-4389",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"refsource" : "MLIST",
"url" : "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{ {
"name": "DSA-2887", "name": "DSA-2887",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2887" "url": "http://www.debian.org/security/2014/dsa-2887"
}, },
{ {
"name" : "DSA-2888", "name": "openSUSE-SU-2014:0009",
"refsource" : "DEBIAN", "refsource": "SUSE",
"url" : "http://www.debian.org/security/2014/dsa-2888" "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
}, },
{ {
"name" : "openSUSE-SU-2013:1928", "name": "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"refsource" : "SUSE", "refsource": "MLIST",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html" "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
}, },
{ {
"name": "openSUSE-SU-2013:1931", "name": "openSUSE-SU-2013:1931",
@ -78,9 +73,14 @@
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
}, },
{ {
"name" : "openSUSE-SU-2014:0009", "name": "openSUSE-SU-2013:1928",
"refsource": "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"name": "DSA-2888",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2888"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4504", "ID": "CVE-2013-4504",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20131103 Re: CVE request for Drupal contributed modules", "name": "https://drupal.org/node/2123287",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://seclists.org/oss-sec/2013/q4/210" "url": "https://drupal.org/node/2123287"
}, },
{ {
"name": "https://drupal.org/node/2124289", "name": "https://drupal.org/node/2124289",
@ -63,9 +63,9 @@
"url": "https://drupal.org/node/2124289" "url": "https://drupal.org/node/2124289"
}, },
{ {
"name" : "https://drupal.org/node/2123287", "name": "[oss-security] 20131103 Re: CVE request for Drupal contributed modules",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://drupal.org/node/2123287" "url": "http://seclists.org/oss-sec/2013/q4/210"
} }
] ]
} }

View File

@ -53,60 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673", "name": "54371",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673" "url": "http://secunia.com/advisories/54371"
},
{
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673",
"refsource" : "CONFIRM",
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673"
},
{
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html"
},
{
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742"
},
{
"name" : "https://www.wireshark.org/security/wnpa-sec-2013-51.html",
"refsource" : "CONFIRM",
"url" : "https://www.wireshark.org/security/wnpa-sec-2013-51.html"
},
{
"name" : "DSA-2734",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2734"
},
{
"name" : "GLSA-201308-05",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
},
{
"name" : "RHSA-2014:0341",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0341.html"
},
{
"name" : "openSUSE-SU-2013:1295",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html"
}, },
{ {
"name": "openSUSE-SU-2013:1300", "name": "openSUSE-SU-2013:1300",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html"
}, },
{
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673"
},
{ {
"name": "oval:org.mitre.oval:def:17412", "name": "oval:org.mitre.oval:def:17412",
"refsource": "OVAL", "refsource": "OVAL",
@ -118,9 +78,39 @@
"url": "http://secunia.com/advisories/54178" "url": "http://secunia.com/advisories/54178"
}, },
{ {
"name" : "54371", "name": "RHSA-2014:0341",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html"
},
{
"name": "54425",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/54371" "url": "http://secunia.com/advisories/54425"
},
{
"name": "DSA-2734",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2734"
},
{
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html"
},
{
"name": "https://www.wireshark.org/security/wnpa-sec-2013-51.html",
"refsource": "CONFIRM",
"url": "https://www.wireshark.org/security/wnpa-sec-2013-51.html"
},
{
"name": "GLSA-201308-05",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
},
{
"name": "openSUSE-SU-2013:1295",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html"
}, },
{ {
"name": "54296", "name": "54296",
@ -128,9 +118,19 @@
"url": "http://secunia.com/advisories/54296" "url": "http://secunia.com/advisories/54296"
}, },
{ {
"name" : "54425", "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/54425" "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742"
},
{
"name": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673"
},
{
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-01-02T00:00:00", "DATE_PUBLIC": "2018-01-02T00:00:00",
"ID": "CVE-2017-13197", "ID": "CVE-2017-13197",
"STATE": "PUBLIC" "STATE": "PUBLIC"
@ -76,15 +76,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2018-01-01" "url": "https://source.android.com/security/bulletin/2018-01-01"
}, },
{
"name" : "102414",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102414"
},
{ {
"name": "1040106", "name": "1040106",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040106" "url": "http://www.securitytracker.com/id/1040106"
},
{
"name": "102414",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102414"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-04-02T00:00:00", "DATE_PUBLIC": "2018-04-02T00:00:00",
"ID": "CVE-2017-13276", "ID": "CVE-2017-13276",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-04-02T00:00:00", "DATE_PUBLIC": "2018-04-02T00:00:00",
"ID": "CVE-2017-13301", "ID": "CVE-2017-13301",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16465", "ID": "CVE-2017-16465",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://zerodayinitiative.com/advisories/ZDI-17-856",
"refsource" : "MISC",
"url" : "https://zerodayinitiative.com/advisories/ZDI-17-856"
},
{ {
"name": "https://www.foxitsoftware.com/support/security-bulletins.php", "name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php" "url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://zerodayinitiative.com/advisories/ZDI-17-856",
"refsource": "MISC",
"url": "https://zerodayinitiative.com/advisories/ZDI-17-856"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22384" "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22384"
}, },
{
"name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4",
"refsource" : "CONFIRM",
"url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4"
},
{ {
"name": "GLSA-201811-17", "name": "GLSA-201811-17",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -71,6 +66,11 @@
"name": "101941", "name": "101941",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/101941" "url": "http://www.securityfocus.com/bid/101941"
},
{
"name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4",
"refsource": "CONFIRM",
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://downloads.asterisk.org/pub/security/AST-2017-014.html",
"refsource" : "CONFIRM",
"url" : "http://downloads.asterisk.org/pub/security/AST-2017-014.html"
},
{ {
"name": "https://issues.asterisk.org/jira/browse/ASTERISK-27480", "name": "https://issues.asterisk.org/jira/browse/ASTERISK-27480",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-27480" "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27480"
}, },
{
"name": "1040056",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040056"
},
{ {
"name": "GLSA-201811-11", "name": "GLSA-201811-11",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-11" "url": "https://security.gentoo.org/glsa/201811-11"
}, },
{ {
"name" : "1040056", "name": "http://downloads.asterisk.org/pub/security/AST-2017-014.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1040056" "url": "http://downloads.asterisk.org/pub/security/AST-2017-014.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5ec6ae161d72f01411169a938fa5f8baea16e8f", "name": "https://github.com/torvalds/linux/commit/a5ec6ae161d72f01411169a938fa5f8baea16e8f",
"refsource": "MISC", "refsource": "MISC",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5ec6ae161d72f01411169a938fa5f8baea16e8f" "url": "https://github.com/torvalds/linux/commit/a5ec6ae161d72f01411169a938fa5f8baea16e8f"
}, },
{ {
"name": "http://www.openwall.com/lists/oss-security/2017/12/21/2", "name": "http://www.openwall.com/lists/oss-security/2017/12/21/2",
@ -63,9 +63,9 @@
"url": "http://www.openwall.com/lists/oss-security/2017/12/21/2" "url": "http://www.openwall.com/lists/oss-security/2017/12/21/2"
}, },
{ {
"name" : "https://github.com/torvalds/linux/commit/a5ec6ae161d72f01411169a938fa5f8baea16e8f", "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5ec6ae161d72f01411169a938fa5f8baea16e8f",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://github.com/torvalds/linux/commit/a5ec6ae161d72f01411169a938fa5f8baea16e8f" "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5ec6ae161d72f01411169a938fa5f8baea16e8f"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4232", "ID": "CVE-2017-4232",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4644", "ID": "CVE-2017-4644",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4800", "ID": "CVE-2017-4800",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/",
"refsource" : "CONFIRM",
"url" : "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/"
},
{ {
"name": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51142", "name": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51142",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51142" "url": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51142"
},
{
"name": "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/",
"refsource": "CONFIRM",
"url": "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/"
} }
] ]
} }

View File

@ -55,25 +55,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1041183",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041183"
},
{ {
"name": "https://fortiguard.com/advisory/FG-IR-18-014", "name": "https://fortiguard.com/advisory/FG-IR-18-014",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://fortiguard.com/advisory/FG-IR-18-014" "url": "https://fortiguard.com/advisory/FG-IR-18-014"
}, },
{
"name" : "104537",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104537"
},
{ {
"name": "1041182", "name": "1041182",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041182" "url": "http://www.securitytracker.com/id/1041182"
}, },
{ {
"name" : "1041183", "name": "104537",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id/1041183" "url": "http://www.securityfocus.com/bid/104537"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md",
"refsource" : "MISC",
"url" : "https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md"
},
{ {
"name": "https://wpvulndb.com/vulnerabilities/9010", "name": "https://wpvulndb.com/vulnerabilities/9010",
"refsource": "MISC", "refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/9010" "url": "https://wpvulndb.com/vulnerabilities/9010"
},
{
"name": "https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md",
"refsource": "MISC",
"url": "https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md"
} }
] ]
} }