mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
b1c93576cd
commit
167c9a29ec
@ -52,25 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010402 (no subject)",
|
||||
"refsource" : "VULN-DEV",
|
||||
"url" : "http://archives.neohapsis.com/archives/vuln-dev/2001-q2/0020.html"
|
||||
},
|
||||
{
|
||||
"name" : "20010420 Novell BorderManager 3.5 VPN Denial of Service",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=98779821207867&w=2"
|
||||
},
|
||||
{
|
||||
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2959062.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2959062.htm"
|
||||
},
|
||||
{
|
||||
"name" : "20010429 Proof of concept DoS against novell border manager enterprise",
|
||||
"name": "20010420 Novell BorderManager 3.5 VPN Denial of Service",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=98865027328391&w=2"
|
||||
"url": "http://marc.info/?l=bugtraq&m=98779821207867&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20010501 Re: Proof of concept DoS against novell border manager enterprise edition 3.5",
|
||||
@ -82,6 +72,16 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/2623"
|
||||
},
|
||||
{
|
||||
"name": "20010402 (no subject)",
|
||||
"refsource": "VULN-DEV",
|
||||
"url": "http://archives.neohapsis.com/archives/vuln-dev/2001-q2/0020.html"
|
||||
},
|
||||
{
|
||||
"name": "20010429 Proof of concept DoS against novell border manager enterprise",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=98865027328391&w=2"
|
||||
},
|
||||
{
|
||||
"name": "bordermanager-vpn-syn-dos(6429)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010430 some ftpd implementations mishandle CWD ~{",
|
||||
"refsource" : "VULN-DEV",
|
||||
"url" : "http://www.securityfocus.com/archive/82/180823"
|
||||
"name": "SuSE-SA:2001:043",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2001_043_wuftpd_txt.html"
|
||||
},
|
||||
{
|
||||
"name": "20011128 CORE-20011001: Wu-FTP glob heap corruption vulnerability",
|
||||
@ -68,59 +68,59 @@
|
||||
"url": "http://www.cert.org/advisories/CA-2001-33.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#886083",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/886083"
|
||||
},
|
||||
{
|
||||
"name" : "CSSA-2001-041.0",
|
||||
"refsource" : "CALDERA",
|
||||
"url" : "http://www.caldera.com/support/security/advisories/CSSA-2001-041.0.txt"
|
||||
},
|
||||
{
|
||||
"name" : "CLA-2001:442",
|
||||
"refsource" : "CONECTIVA",
|
||||
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000442"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-087",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2001/dsa-087"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX0107-162",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0107-162"
|
||||
},
|
||||
{
|
||||
"name" : "IMNX-2001-70-036-01",
|
||||
"refsource" : "IMMUNIX",
|
||||
"url" : "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-036-01"
|
||||
"name": "wuftp-glob-heap-corruption(7611)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7611"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2001:090",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-090.php3"
|
||||
},
|
||||
{
|
||||
"name": "CLA-2001:442",
|
||||
"refsource": "CONECTIVA",
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000442"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX0107-162",
|
||||
"refsource": "HP",
|
||||
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0107-162"
|
||||
},
|
||||
{
|
||||
"name": "20010430 some ftpd implementations mishandle CWD ~{",
|
||||
"refsource": "VULN-DEV",
|
||||
"url": "http://www.securityfocus.com/archive/82/180823"
|
||||
},
|
||||
{
|
||||
"name": "CSSA-2001-041.0",
|
||||
"refsource": "CALDERA",
|
||||
"url": "http://www.caldera.com/support/security/advisories/CSSA-2001-041.0.txt"
|
||||
},
|
||||
{
|
||||
"name": "DSA-087",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2001/dsa-087"
|
||||
},
|
||||
{
|
||||
"name": "IMNX-2001-70-036-01",
|
||||
"refsource": "IMMUNIX",
|
||||
"url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-036-01"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2001:157",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2001-157.html"
|
||||
},
|
||||
{
|
||||
"name" : "SuSE-SA:2001:043",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2001_043_wuftpd_txt.html"
|
||||
"name": "VU#886083",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/886083"
|
||||
},
|
||||
{
|
||||
"name": "3581",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/3581"
|
||||
},
|
||||
{
|
||||
"name" : "wuftp-glob-heap-corruption(7611)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7611"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,8 +53,8 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010621 SECURITY.NNOV: KAV (AVP) for sendmail format string vulnerability ",
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20010621 SECURITY.NNOV: KAV (AVP) for sendmail format string vulnerability",
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0274.html"
|
||||
}
|
||||
]
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "6795",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/6795"
|
||||
},
|
||||
{
|
||||
"name": "20011120 IIS logging issue",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "iis-fake-log-entry(7613)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7613"
|
||||
},
|
||||
{
|
||||
"name" : "6795",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/6795"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "RHSA-2001:144",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2001-144.html"
|
||||
},
|
||||
{
|
||||
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2001:144",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2001-144.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "APPLE-SA-2008-05-28",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html"
|
||||
"name": "29481",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29481"
|
||||
},
|
||||
{
|
||||
"name": "TA08-150A",
|
||||
@ -63,19 +63,14 @@
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html"
|
||||
},
|
||||
{
|
||||
"name" : "29412",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29412"
|
||||
"name": "30430",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30430"
|
||||
},
|
||||
{
|
||||
"name" : "29481",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29481"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-1697",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/1697"
|
||||
"name": "APPLE-SA-2008-05-28",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "1020137",
|
||||
@ -83,14 +78,19 @@
|
||||
"url": "http://securitytracker.com/id?1020137"
|
||||
},
|
||||
{
|
||||
"name" : "30430",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30430"
|
||||
"name": "ADV-2008-1697",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1697"
|
||||
},
|
||||
{
|
||||
"name": "macosx-coretypes-weak-security(42711)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42711"
|
||||
},
|
||||
{
|
||||
"name": "29412",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29412"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5143"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-0597",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/0597"
|
||||
},
|
||||
{
|
||||
"name": "29005",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29005"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0597",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0597"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080325 aeries browser interface(ABI) 3.8.3.14 Remote SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/490033/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "28436",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28436"
|
||||
},
|
||||
{
|
||||
"name": "abi-loginproc-login-xss(41430)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41430"
|
||||
},
|
||||
{
|
||||
"name": "29533",
|
||||
"refsource": "SECUNIA",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://securityreason.com/securityalert/3787"
|
||||
},
|
||||
{
|
||||
"name" : "abi-loginproc-login-xss(41430)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41430"
|
||||
"name": "20080325 aeries browser interface(ABI) 3.8.3.14 Remote SQL Injection",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/490033/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,24 @@
|
||||
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4153"
|
||||
},
|
||||
{
|
||||
"name" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154"
|
||||
"name": "oval:org.mitre.oval:def:5321",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5321"
|
||||
},
|
||||
{
|
||||
"name": "28467",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28467"
|
||||
},
|
||||
{
|
||||
"name": "1019606",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1019606"
|
||||
},
|
||||
{
|
||||
"name": "IZ06663",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ06663"
|
||||
},
|
||||
{
|
||||
"name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155",
|
||||
@ -78,29 +93,14 @@
|
||||
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ06505"
|
||||
},
|
||||
{
|
||||
"name" : "IZ06663",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www.ibm.com/support/docview.wss?uid=isg1IZ06663"
|
||||
},
|
||||
{
|
||||
"name" : "28467",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/28467"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:5321",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5321"
|
||||
"name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0865",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0865"
|
||||
},
|
||||
{
|
||||
"name" : "1019606",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1019606"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2008-1951",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=447705",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=447705"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2008:0497",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://rhn.redhat.com/errata/RHSA-2008-0497.html"
|
||||
},
|
||||
{
|
||||
"name" : "29913",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/29913"
|
||||
"name": "30803",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30803"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:9635",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9635"
|
||||
},
|
||||
{
|
||||
"name": "redhat-sblim-privilege-escalation(43315)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43315"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2008:0497",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://rhn.redhat.com/errata/RHSA-2008-0497.html"
|
||||
},
|
||||
{
|
||||
"name": "1020354",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020354"
|
||||
},
|
||||
{
|
||||
"name" : "30803",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30803"
|
||||
"name": "29913",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29913"
|
||||
},
|
||||
{
|
||||
"name" : "redhat-sblim-privilege-escalation(43315)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43315"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=447705",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447705"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081124 Amaya (URL Bar) Remote Stack Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/498578/100/0/threaded"
|
||||
"name": "http://www.bmgsec.com.au/advisory/40/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.bmgsec.com.au/advisory/40/"
|
||||
},
|
||||
{
|
||||
"name": "20081124 Amaya (id) Remote Stack Overflow Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/498583/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.bmgsec.com.au/advisory/40/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.bmgsec.com.au/advisory/40/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.bmgsec.com.au/advisory/41/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.bmgsec.com.au/advisory/41/"
|
||||
},
|
||||
{
|
||||
"name": "32442",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32442"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-3255",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/3255"
|
||||
"name": "4657",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4657"
|
||||
},
|
||||
{
|
||||
"name": "50282",
|
||||
@ -92,15 +82,25 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/50283"
|
||||
},
|
||||
{
|
||||
"name": "20081124 Amaya (URL Bar) Remote Stack Overflow Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/498578/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "32848",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32848"
|
||||
},
|
||||
{
|
||||
"name" : "4657",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4657"
|
||||
"name": "ADV-2008-3255",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3255"
|
||||
},
|
||||
{
|
||||
"name": "http://www.bmgsec.com.au/advisory/41/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.bmgsec.com.au/advisory/41/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html"
|
||||
"name": "1021246",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021246"
|
||||
},
|
||||
{
|
||||
"name": "http://seer.entsupport.symantec.com/docs/314528.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://seer.entsupport.symantec.com/docs/314528.htm"
|
||||
},
|
||||
{
|
||||
"name" : "32346",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/32346"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-3209",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3209"
|
||||
},
|
||||
{
|
||||
"name" : "1021246",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1021246"
|
||||
},
|
||||
{
|
||||
"name": "32810",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32810"
|
||||
},
|
||||
{
|
||||
"name": "http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html"
|
||||
},
|
||||
{
|
||||
"name": "backupexec-dataprotocol-bo(46731)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46731"
|
||||
},
|
||||
{
|
||||
"name": "32346",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32346"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7121"
|
||||
},
|
||||
{
|
||||
"name" : "32300",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/32300"
|
||||
},
|
||||
{
|
||||
"name": "4717",
|
||||
"refsource": "SREASON",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "slimcms-edit-sql-injection(46633)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46633"
|
||||
},
|
||||
{
|
||||
"name": "32300",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32300"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,25 +53,40 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20081028 Quassel IRC: connection hijacking",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/497882/30/0/threaded"
|
||||
"name": "32470",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32470"
|
||||
},
|
||||
{
|
||||
"name": "20081028 Re: Quassel IRC: connection hijacking",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/497884"
|
||||
},
|
||||
{
|
||||
"name" : "http://wouter.coekaerts.be/site/security/quassel-ctcp",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://wouter.coekaerts.be/site/security/quassel-ctcp"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506550",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506550"
|
||||
},
|
||||
{
|
||||
"name": "quasselirc-ctcp-command-execution(46195)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46195"
|
||||
},
|
||||
{
|
||||
"name": "20081028 Quassel IRC: connection hijacking",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/497882/30/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-3164",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3164"
|
||||
},
|
||||
{
|
||||
"name": "http://wouter.coekaerts.be/site/security/quassel-ctcp",
|
||||
"refsource": "MISC",
|
||||
"url": "http://wouter.coekaerts.be/site/security/quassel-ctcp"
|
||||
},
|
||||
{
|
||||
"name": "http://quassel-irc.org/node/89",
|
||||
"refsource": "CONFIRM",
|
||||
@ -82,30 +97,15 @@
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00354.html"
|
||||
},
|
||||
{
|
||||
"name" : "31973",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31973"
|
||||
},
|
||||
{
|
||||
"name" : "32470",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32470"
|
||||
},
|
||||
{
|
||||
"name": "32692",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32692"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-3164",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/3164"
|
||||
},
|
||||
{
|
||||
"name" : "quasselirc-ctcp-command-execution(46195)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46195"
|
||||
"name": "31973",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31973"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-2188",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "48123",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/48123"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110606 CVE Request -- LuaExpat -- Prone to XML \"billion laughs attack\"",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/06/06/4"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=711027",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711027"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110606 Re: CVE Request -- LuaExpat -- Prone to XML \"billion laughs attack\"",
|
||||
"refsource": "MLIST",
|
||||
@ -68,24 +78,14 @@
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629225"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=711027",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=711027"
|
||||
},
|
||||
{
|
||||
"name" : "48123",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/48123"
|
||||
"name": "luaexpat-xml-dos(67862)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67862"
|
||||
},
|
||||
{
|
||||
"name": "44866",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/44866"
|
||||
},
|
||||
{
|
||||
"name" : "luaexpat-xml-dos(67862)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67862"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2011-2302",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
|
||||
},
|
||||
{
|
||||
"name": "50221",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/50221"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
|
||||
},
|
||||
{
|
||||
"name": "46504",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security_alert@emc.com",
|
||||
"ID": "CVE-2011-2735",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,19 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20110818 ESA-2011-025: Multiple buffer overflow vulnerabilities in EMC AutoStart",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/519371/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "49238",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/49238"
|
||||
},
|
||||
{
|
||||
"name" : "1025958",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1025958"
|
||||
"name": "8352",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/8352"
|
||||
},
|
||||
{
|
||||
"name": "45703",
|
||||
@ -73,14 +63,24 @@
|
||||
"url": "http://secunia.com/advisories/45703"
|
||||
},
|
||||
{
|
||||
"name" : "8352",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/8352"
|
||||
"name": "1025958",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1025958"
|
||||
},
|
||||
{
|
||||
"name": "49238",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/49238"
|
||||
},
|
||||
{
|
||||
"name": "autostart-multiple-bo(69296)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69296"
|
||||
},
|
||||
{
|
||||
"name": "20110818 ESA-2011-025: Multiple buffer overflow vulnerabilities in EMC AutoStart",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/519371/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20110713 CVE Request: hplip/foomatic-filters",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/07/13/3"
|
||||
"name": "MDVSA-2011:125",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:125"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110718 Re: CVE Request: hplip/foomatic-filters",
|
||||
@ -63,14 +63,9 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/07/18/3"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110728 Re: CVE Request: hplip/foomatic-filters",
|
||||
"name": "[oss-security] 20110713 CVE Request: hplip/foomatic-filters",
|
||||
"refsource": "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/07/28/1"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=698451",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=698451"
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/07/13/3"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=721001",
|
||||
@ -78,30 +73,20 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=721001"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201203-07",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201203-07.xml"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2011:125",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:125"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2011:1110",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1110.html"
|
||||
"name": "[oss-security] 20110728 Re: CVE Request: hplip/foomatic-filters",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/07/28/1"
|
||||
},
|
||||
{
|
||||
"name": "USN-1194-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1194-1"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2011:1110",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-1110.html"
|
||||
},
|
||||
{
|
||||
"name": "45477",
|
||||
"refsource": "SECUNIA",
|
||||
@ -111,6 +96,21 @@
|
||||
"name": "foomatic-foomatic-code-execution(68994)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68994"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.novell.com/show_bug.cgi?id=698451",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.novell.com/show_bug.cgi?id=698451"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201203-07",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201203-07.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2013-0150",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-0331",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=914879",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914879"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0638",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0638.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130220 Re: Jenkins CVE request for Jenkins Security Advisory 2013-02-16",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/02/21/7"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=914879",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=914879"
|
||||
"name": "57994",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/57994"
|
||||
},
|
||||
{
|
||||
"name": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb",
|
||||
@ -71,16 +81,6 @@
|
||||
"name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0638",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0638.html"
|
||||
},
|
||||
{
|
||||
"name" : "57994",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/57994"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2013-0841",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update_22.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update_22.html"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=169770",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "oval:org.mitre.oval:def:16000",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16000"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update_22.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update_22.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@ubuntu.com",
|
||||
"ID": "CVE-2013-1064",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-1104",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20130123 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc"
|
||||
"name": "89533",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/89533"
|
||||
},
|
||||
{
|
||||
"name": "51965",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51965"
|
||||
},
|
||||
{
|
||||
"name": "57524",
|
||||
@ -63,20 +68,15 @@
|
||||
"url": "http://www.securityfocus.com/bid/57524"
|
||||
},
|
||||
{
|
||||
"name" : "89533",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/89533"
|
||||
"name": "20130123 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc"
|
||||
},
|
||||
{
|
||||
"name": "1028027",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1028027"
|
||||
},
|
||||
{
|
||||
"name" : "51965",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51965"
|
||||
},
|
||||
{
|
||||
"name": "cisco-wlc-profiling-code-exec(81489)",
|
||||
"refsource": "XF",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-1541",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-3289",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-3827",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
|
||||
"name": "63052",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/63052"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0029",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/526012"
|
||||
},
|
||||
{
|
||||
"name" : "63052",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/63052"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
|
||||
},
|
||||
{
|
||||
"name": "1029190",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-4221",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,15 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html"
|
||||
"name": "RHSA-2013:1862",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1862.html"
|
||||
},
|
||||
{
|
||||
"name": "http://restlet.org/learn/2.1/changes",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://restlet.org/learn/2.1/changes"
|
||||
},
|
||||
{
|
||||
"name": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=995275",
|
||||
"refsource": "CONFIRM",
|
||||
@ -76,11 +81,6 @@
|
||||
"name": "RHSA-2013:1410",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1410.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1862",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1862.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-4389",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,25 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2887",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2887"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2888",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2014/dsa-2888"
|
||||
"name": "openSUSE-SU-2014:0009",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:1928",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
|
||||
"name": "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1931",
|
||||
@ -78,9 +73,14 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2014:0009",
|
||||
"name": "openSUSE-SU-2013:1928",
|
||||
"refsource": "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2888",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2014/dsa-2888"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-4504",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20131103 Re: CVE request for Drupal contributed modules",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2013/q4/210"
|
||||
"name": "https://drupal.org/node/2123287",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://drupal.org/node/2123287"
|
||||
},
|
||||
{
|
||||
"name": "https://drupal.org/node/2124289",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "https://drupal.org/node/2124289"
|
||||
},
|
||||
{
|
||||
"name" : "https://drupal.org/node/2123287",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://drupal.org/node/2123287"
|
||||
"name": "[oss-security] 20131103 Re: CVE request for Drupal contributed modules",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2013/q4/210"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,60 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673"
|
||||
},
|
||||
{
|
||||
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.wireshark.org/security/wnpa-sec-2013-51.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.wireshark.org/security/wnpa-sec-2013-51.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2734",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2013/dsa-2734"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201308-05",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2014:0341",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0341.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:1295",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html"
|
||||
"name": "54371",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/54371"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1300",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:17412",
|
||||
"refsource": "OVAL",
|
||||
@ -118,9 +78,39 @@
|
||||
"url": "http://secunia.com/advisories/54178"
|
||||
},
|
||||
{
|
||||
"name" : "54371",
|
||||
"name": "RHSA-2014:0341",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html"
|
||||
},
|
||||
{
|
||||
"name": "54425",
|
||||
"refsource": "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/54371"
|
||||
"url": "http://secunia.com/advisories/54425"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2734",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2013/dsa-2734"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.wireshark.org/security/wnpa-sec-2013-51.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.wireshark.org/security/wnpa-sec-2013-51.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201308-05",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1295",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "54296",
|
||||
@ -128,9 +118,19 @@
|
||||
"url": "http://secunia.com/advisories/54296"
|
||||
},
|
||||
{
|
||||
"name" : "54425",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/54425"
|
||||
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742"
|
||||
},
|
||||
{
|
||||
"name": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673"
|
||||
},
|
||||
{
|
||||
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"DATE_PUBLIC": "2018-01-02T00:00:00",
|
||||
"ID": "CVE-2017-13197",
|
||||
"STATE": "PUBLIC"
|
||||
@ -76,15 +76,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2018-01-01"
|
||||
},
|
||||
{
|
||||
"name" : "102414",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/102414"
|
||||
},
|
||||
{
|
||||
"name": "1040106",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040106"
|
||||
},
|
||||
{
|
||||
"name": "102414",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102414"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"DATE_PUBLIC": "2018-04-02T00:00:00",
|
||||
"ID": "CVE-2017-13276",
|
||||
"STATE": "PUBLIC"
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"DATE_PUBLIC": "2018-04-02T00:00:00",
|
||||
"ID": "CVE-2017-13301",
|
||||
"STATE": "PUBLIC"
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-16465",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://zerodayinitiative.com/advisories/ZDI-17-856",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://zerodayinitiative.com/advisories/ZDI-17-856"
|
||||
},
|
||||
{
|
||||
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
|
||||
},
|
||||
{
|
||||
"name": "https://zerodayinitiative.com/advisories/ZDI-17-856",
|
||||
"refsource": "MISC",
|
||||
"url": "https://zerodayinitiative.com/advisories/ZDI-17-856"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22384"
|
||||
},
|
||||
{
|
||||
"name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201811-17",
|
||||
"refsource": "GENTOO",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "101941",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101941"
|
||||
},
|
||||
{
|
||||
"name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://downloads.asterisk.org/pub/security/AST-2017-014.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://downloads.asterisk.org/pub/security/AST-2017-014.html"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.asterisk.org/jira/browse/ASTERISK-27480",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-27480"
|
||||
},
|
||||
{
|
||||
"name": "1040056",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040056"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201811-11",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201811-11"
|
||||
},
|
||||
{
|
||||
"name" : "1040056",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040056"
|
||||
"name": "http://downloads.asterisk.org/pub/security/AST-2017-014.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://downloads.asterisk.org/pub/security/AST-2017-014.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5ec6ae161d72f01411169a938fa5f8baea16e8f",
|
||||
"name": "https://github.com/torvalds/linux/commit/a5ec6ae161d72f01411169a938fa5f8baea16e8f",
|
||||
"refsource": "MISC",
|
||||
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5ec6ae161d72f01411169a938fa5f8baea16e8f"
|
||||
"url": "https://github.com/torvalds/linux/commit/a5ec6ae161d72f01411169a938fa5f8baea16e8f"
|
||||
},
|
||||
{
|
||||
"name": "http://www.openwall.com/lists/oss-security/2017/12/21/2",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/12/21/2"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/torvalds/linux/commit/a5ec6ae161d72f01411169a938fa5f8baea16e8f",
|
||||
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5ec6ae161d72f01411169a938fa5f8baea16e8f",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://github.com/torvalds/linux/commit/a5ec6ae161d72f01411169a938fa5f8baea16e8f"
|
||||
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5ec6ae161d72f01411169a938fa5f8baea16e8f"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4232",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4644",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4800",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/"
|
||||
},
|
||||
{
|
||||
"name": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51142",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51142"
|
||||
},
|
||||
{
|
||||
"name": "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,25 +55,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1041183",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041183"
|
||||
},
|
||||
{
|
||||
"name": "https://fortiguard.com/advisory/FG-IR-18-014",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://fortiguard.com/advisory/FG-IR-18-014"
|
||||
},
|
||||
{
|
||||
"name" : "104537",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/104537"
|
||||
},
|
||||
{
|
||||
"name": "1041182",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041182"
|
||||
},
|
||||
{
|
||||
"name" : "1041183",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041183"
|
||||
"name": "104537",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104537"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md"
|
||||
},
|
||||
{
|
||||
"name": "https://wpvulndb.com/vulnerabilities/9010",
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpvulndb.com/vulnerabilities/9010"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user