"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:46:21 +00:00
parent b1c93576cd
commit 167c9a29ec
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 3766 additions and 3766 deletions

View File

@ -52,25 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20010402 (no subject)",
"refsource" : "VULN-DEV",
"url" : "http://archives.neohapsis.com/archives/vuln-dev/2001-q2/0020.html"
},
{
"name" : "20010420 Novell BorderManager 3.5 VPN Denial of Service",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=98779821207867&w=2"
},
{
"name": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2959062.htm",
"refsource": "CONFIRM",
"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2959062.htm"
},
{
"name" : "20010429 Proof of concept DoS against novell border manager enterprise",
"name": "20010420 Novell BorderManager 3.5 VPN Denial of Service",
"refsource": "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=98865027328391&w=2"
"url": "http://marc.info/?l=bugtraq&m=98779821207867&w=2"
},
{
"name": "20010501 Re: Proof of concept DoS against novell border manager enterprise edition 3.5",
@ -82,6 +72,16 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2623"
},
{
"name": "20010402 (no subject)",
"refsource": "VULN-DEV",
"url": "http://archives.neohapsis.com/archives/vuln-dev/2001-q2/0020.html"
},
{
"name": "20010429 Proof of concept DoS against novell border manager enterprise",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=98865027328391&w=2"
},
{
"name": "bordermanager-vpn-syn-dos(6429)",
"refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20010430 some ftpd implementations mishandle CWD ~{",
"refsource" : "VULN-DEV",
"url" : "http://www.securityfocus.com/archive/82/180823"
"name": "SuSE-SA:2001:043",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2001_043_wuftpd_txt.html"
},
{
"name": "20011128 CORE-20011001: Wu-FTP glob heap corruption vulnerability",
@ -68,59 +68,59 @@
"url": "http://www.cert.org/advisories/CA-2001-33.html"
},
{
"name" : "VU#886083",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/886083"
},
{
"name" : "CSSA-2001-041.0",
"refsource" : "CALDERA",
"url" : "http://www.caldera.com/support/security/advisories/CSSA-2001-041.0.txt"
},
{
"name" : "CLA-2001:442",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000442"
},
{
"name" : "DSA-087",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2001/dsa-087"
},
{
"name" : "HPSBUX0107-162",
"refsource" : "HP",
"url" : "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0107-162"
},
{
"name" : "IMNX-2001-70-036-01",
"refsource" : "IMMUNIX",
"url" : "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-036-01"
"name": "wuftp-glob-heap-corruption(7611)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7611"
},
{
"name": "MDKSA-2001:090",
"refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-090.php3"
},
{
"name": "CLA-2001:442",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000442"
},
{
"name": "HPSBUX0107-162",
"refsource": "HP",
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0107-162"
},
{
"name": "20010430 some ftpd implementations mishandle CWD ~{",
"refsource": "VULN-DEV",
"url": "http://www.securityfocus.com/archive/82/180823"
},
{
"name": "CSSA-2001-041.0",
"refsource": "CALDERA",
"url": "http://www.caldera.com/support/security/advisories/CSSA-2001-041.0.txt"
},
{
"name": "DSA-087",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2001/dsa-087"
},
{
"name": "IMNX-2001-70-036-01",
"refsource": "IMMUNIX",
"url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-036-01"
},
{
"name": "RHSA-2001:157",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2001-157.html"
},
{
"name" : "SuSE-SA:2001:043",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2001_043_wuftpd_txt.html"
"name": "VU#886083",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/886083"
},
{
"name": "3581",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3581"
},
{
"name" : "wuftp-glob-heap-corruption(7611)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7611"
}
]
}

View File

@ -53,8 +53,8 @@
"references": {
"reference_data": [
{
"name" : "20010621 SECURITY.NNOV: KAV (AVP) for sendmail format string vulnerability ",
"refsource": "BUGTRAQ",
"name": "20010621 SECURITY.NNOV: KAV (AVP) for sendmail format string vulnerability",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0274.html"
}
]

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "6795",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6795"
},
{
"name": "20011120 IIS logging issue",
"refsource": "BUGTRAQ",
@ -66,11 +71,6 @@
"name": "iis-fake-log-entry(7613)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7613"
},
{
"name" : "6795",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/6795"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "RHSA-2001:144",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2001-144.html"
},
{
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325",
"refsource": "CONFIRM",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325"
},
{
"name": "RHSA-2001:144",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2001-144.html"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "APPLE-SA-2008-05-28",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html"
"name": "29481",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29481"
},
{
"name": "TA08-150A",
@ -63,19 +63,14 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html"
},
{
"name" : "29412",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29412"
"name": "30430",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30430"
},
{
"name" : "29481",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29481"
},
{
"name" : "ADV-2008-1697",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1697"
"name": "APPLE-SA-2008-05-28",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html"
},
{
"name": "1020137",
@ -83,14 +78,19 @@
"url": "http://securitytracker.com/id?1020137"
},
{
"name" : "30430",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30430"
"name": "ADV-2008-1697",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1697"
},
{
"name": "macosx-coretypes-weak-security(42711)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42711"
},
{
"name": "29412",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29412"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5143"
},
{
"name" : "ADV-2008-0597",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0597"
},
{
"name": "29005",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29005"
},
{
"name": "ADV-2008-0597",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0597"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20080325 aeries browser interface(ABI) 3.8.3.14 Remote SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/490033/100/0/threaded"
},
{
"name": "28436",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28436"
},
{
"name": "abi-loginproc-login-xss(41430)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41430"
},
{
"name": "29533",
"refsource": "SECUNIA",
@ -73,9 +73,9 @@
"url": "http://securityreason.com/securityalert/3787"
},
{
"name" : "abi-loginproc-login-xss(41430)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41430"
"name": "20080325 aeries browser interface(ABI) 3.8.3.14 Remote SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/490033/100/0/threaded"
}
]
}

View File

@ -58,9 +58,24 @@
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4153"
},
{
"name" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154",
"refsource" : "CONFIRM",
"url" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154"
"name": "oval:org.mitre.oval:def:5321",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5321"
},
{
"name": "28467",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28467"
},
{
"name": "1019606",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019606"
},
{
"name": "IZ06663",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ06663"
},
{
"name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155",
@ -78,29 +93,14 @@
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ06505"
},
{
"name" : "IZ06663",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=isg1IZ06663"
},
{
"name" : "28467",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28467"
},
{
"name" : "oval:org.mitre.oval:def:5321",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5321"
"name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154",
"refsource": "CONFIRM",
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154"
},
{
"name": "ADV-2008-0865",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0865"
},
{
"name" : "1019606",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019606"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-1951",
"STATE": "PUBLIC"
},
@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=447705",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=447705"
},
{
"name" : "RHSA-2008:0497",
"refsource" : "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2008-0497.html"
},
{
"name" : "29913",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29913"
"name": "30803",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30803"
},
{
"name": "oval:org.mitre.oval:def:9635",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9635"
},
{
"name": "redhat-sblim-privilege-escalation(43315)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43315"
},
{
"name": "RHSA-2008:0497",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2008-0497.html"
},
{
"name": "1020354",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020354"
},
{
"name" : "30803",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30803"
"name": "29913",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29913"
},
{
"name" : "redhat-sblim-privilege-escalation(43315)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43315"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=447705",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=447705"
}
]
}

View File

@ -53,34 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20081124 Amaya (URL Bar) Remote Stack Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/498578/100/0/threaded"
"name": "http://www.bmgsec.com.au/advisory/40/",
"refsource": "MISC",
"url": "http://www.bmgsec.com.au/advisory/40/"
},
{
"name": "20081124 Amaya (id) Remote Stack Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/498583/100/0/threaded"
},
{
"name" : "http://www.bmgsec.com.au/advisory/40/",
"refsource" : "MISC",
"url" : "http://www.bmgsec.com.au/advisory/40/"
},
{
"name" : "http://www.bmgsec.com.au/advisory/41/",
"refsource" : "MISC",
"url" : "http://www.bmgsec.com.au/advisory/41/"
},
{
"name": "32442",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32442"
},
{
"name" : "ADV-2008-3255",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3255"
"name": "4657",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4657"
},
{
"name": "50282",
@ -92,15 +82,25 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/50283"
},
{
"name": "20081124 Amaya (URL Bar) Remote Stack Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/498578/100/0/threaded"
},
{
"name": "32848",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32848"
},
{
"name" : "4657",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4657"
"name": "ADV-2008-3255",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3255"
},
{
"name": "http://www.bmgsec.com.au/advisory/41/",
"refsource": "MISC",
"url": "http://www.bmgsec.com.au/advisory/41/"
}
]
}

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html",
"refsource" : "CONFIRM",
"url" : "http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html"
"name": "1021246",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021246"
},
{
"name": "http://seer.entsupport.symantec.com/docs/314528.htm",
"refsource": "CONFIRM",
"url": "http://seer.entsupport.symantec.com/docs/314528.htm"
},
{
"name" : "32346",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32346"
},
{
"name": "ADV-2008-3209",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3209"
},
{
"name" : "1021246",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021246"
},
{
"name": "32810",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32810"
},
{
"name": "http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html",
"refsource": "CONFIRM",
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.11.19.html"
},
{
"name": "backupexec-dataprotocol-bo(46731)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46731"
},
{
"name": "32346",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32346"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7121"
},
{
"name" : "32300",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32300"
},
{
"name": "4717",
"refsource": "SREASON",
@ -71,6 +66,11 @@
"name": "slimcms-edit-sql-injection(46633)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46633"
},
{
"name": "32300",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32300"
}
]
}

View File

@ -53,25 +53,40 @@
"references": {
"reference_data": [
{
"name" : "20081028 Quassel IRC: connection hijacking",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/497882/30/0/threaded"
"name": "32470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32470"
},
{
"name": "20081028 Re: Quassel IRC: connection hijacking",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497884"
},
{
"name" : "http://wouter.coekaerts.be/site/security/quassel-ctcp",
"refsource" : "MISC",
"url" : "http://wouter.coekaerts.be/site/security/quassel-ctcp"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506550",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506550"
},
{
"name": "quasselirc-ctcp-command-execution(46195)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46195"
},
{
"name": "20081028 Quassel IRC: connection hijacking",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497882/30/0/threaded"
},
{
"name": "ADV-2008-3164",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3164"
},
{
"name": "http://wouter.coekaerts.be/site/security/quassel-ctcp",
"refsource": "MISC",
"url": "http://wouter.coekaerts.be/site/security/quassel-ctcp"
},
{
"name": "http://quassel-irc.org/node/89",
"refsource": "CONFIRM",
@ -82,30 +97,15 @@
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00354.html"
},
{
"name" : "31973",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31973"
},
{
"name" : "32470",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32470"
},
{
"name": "32692",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32692"
},
{
"name" : "ADV-2008-3164",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3164"
},
{
"name" : "quasselirc-ctcp-command-execution(46195)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46195"
"name": "31973",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31973"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2188",
"STATE": "PUBLIC"
},
@ -52,11 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "48123",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48123"
},
{
"name": "[oss-security] 20110606 CVE Request -- LuaExpat -- Prone to XML \"billion laughs attack\"",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/06/4"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=711027",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=711027"
},
{
"name": "[oss-security] 20110606 Re: CVE Request -- LuaExpat -- Prone to XML \"billion laughs attack\"",
"refsource": "MLIST",
@ -68,24 +78,14 @@
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629225"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=711027",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=711027"
},
{
"name" : "48123",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/48123"
"name": "luaexpat-xml-dos(67862)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67862"
},
{
"name": "44866",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44866"
},
{
"name" : "luaexpat-xml-dos(67862)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67862"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-2302",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
},
{
"name": "50221",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50221"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html"
},
{
"name": "46504",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2011-2735",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20110818 ESA-2011-025: Multiple buffer overflow vulnerabilities in EMC AutoStart",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/519371/100/0/threaded"
},
{
"name" : "49238",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/49238"
},
{
"name" : "1025958",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1025958"
"name": "8352",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8352"
},
{
"name": "45703",
@ -73,14 +63,24 @@
"url": "http://secunia.com/advisories/45703"
},
{
"name" : "8352",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/8352"
"name": "1025958",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025958"
},
{
"name": "49238",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49238"
},
{
"name": "autostart-multiple-bo(69296)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69296"
},
{
"name": "20110818 ESA-2011-025: Multiple buffer overflow vulnerabilities in EMC AutoStart",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/519371/100/0/threaded"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110713 CVE Request: hplip/foomatic-filters",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/07/13/3"
"name": "MDVSA-2011:125",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:125"
},
{
"name": "[oss-security] 20110718 Re: CVE Request: hplip/foomatic-filters",
@ -63,14 +63,9 @@
"url": "http://www.openwall.com/lists/oss-security/2011/07/18/3"
},
{
"name" : "[oss-security] 20110728 Re: CVE Request: hplip/foomatic-filters",
"name": "[oss-security] 20110713 CVE Request: hplip/foomatic-filters",
"refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/07/28/1"
},
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=698451",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=698451"
"url": "http://www.openwall.com/lists/oss-security/2011/07/13/3"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=721001",
@ -78,30 +73,20 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=721001"
},
{
"name" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
"refsource" : "CONFIRM",
"url" : "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
},
{
"name" : "GLSA-201203-07",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201203-07.xml"
},
{
"name" : "MDVSA-2011:125",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:125"
},
{
"name" : "RHSA-2011:1110",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1110.html"
"name": "[oss-security] 20110728 Re: CVE Request: hplip/foomatic-filters",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/28/1"
},
{
"name": "USN-1194-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1194-1"
},
{
"name": "RHSA-2011:1110",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1110.html"
},
{
"name": "45477",
"refsource": "SECUNIA",
@ -111,6 +96,21 @@
"name": "foomatic-foomatic-code-execution(68994)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68994"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=698451",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=698451"
},
{
"name": "GLSA-201203-07",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201203-07.xml"
},
{
"name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
"refsource": "CONFIRM",
"url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-0150",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0331",
"STATE": "PUBLIC"
},
@ -52,15 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=914879",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914879"
},
{
"name": "RHSA-2013:0638",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0638.html"
},
{
"name": "[oss-security] 20130220 Re: Jenkins CVE request for Jenkins Security Advisory 2013-02-16",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/21/7"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=914879",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=914879"
"name": "57994",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57994"
},
{
"name": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb",
@ -71,16 +81,6 @@
"name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16",
"refsource": "CONFIRM",
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16"
},
{
"name" : "RHSA-2013:0638",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0638.html"
},
{
"name" : "57994",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/57994"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2013-0841",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update_22.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update_22.html"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=169770",
"refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "oval:org.mitre.oval:def:16000",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16000"
},
{
"name": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update_22.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update_22.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2013-1064",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1104",
"STATE": "PUBLIC"
},
@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "20130123 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc"
"name": "89533",
"refsource": "OSVDB",
"url": "http://osvdb.org/89533"
},
{
"name": "51965",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51965"
},
{
"name": "57524",
@ -63,20 +68,15 @@
"url": "http://www.securityfocus.com/bid/57524"
},
{
"name" : "89533",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/89533"
"name": "20130123 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc"
},
{
"name": "1028027",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1028027"
},
{
"name" : "51965",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51965"
},
{
"name": "cisco-wlc-profiling-code-exec(81489)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-1541",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-3289",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-3827",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
"name": "63052",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63052"
},
{
"name": "RHSA-2014:0029",
@ -68,9 +68,9 @@
"url": "http://www.kb.cert.org/vuls/id/526012"
},
{
"name" : "63052",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/63052"
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "1029190",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4221",
"STATE": "PUBLIC"
},
@ -53,15 +53,20 @@
"references": {
"reference_data": [
{
"name" : "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html",
"refsource" : "MISC",
"url" : "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html"
"name": "RHSA-2013:1862",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1862.html"
},
{
"name": "http://restlet.org/learn/2.1/changes",
"refsource": "CONFIRM",
"url": "http://restlet.org/learn/2.1/changes"
},
{
"name": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html",
"refsource": "MISC",
"url": "http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=995275",
"refsource": "CONFIRM",
@ -76,11 +81,6 @@
"name": "RHSA-2013:1410",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1410.html"
},
{
"name" : "RHSA-2013:1862",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1862.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4389",
"STATE": "PUBLIC"
},
@ -52,25 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"refsource" : "MLIST",
"url" : "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"name": "DSA-2887",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"name" : "DSA-2888",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2888"
"name": "openSUSE-SU-2014:0009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"name" : "openSUSE-SU-2013:1928",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
"name": "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"refsource": "MLIST",
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"name": "openSUSE-SU-2013:1931",
@ -78,9 +73,14 @@
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"name" : "openSUSE-SU-2014:0009",
"name": "openSUSE-SU-2013:1928",
"refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"name": "DSA-2888",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2888"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4504",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20131103 Re: CVE request for Drupal contributed modules",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2013/q4/210"
"name": "https://drupal.org/node/2123287",
"refsource": "CONFIRM",
"url": "https://drupal.org/node/2123287"
},
{
"name": "https://drupal.org/node/2124289",
@ -63,9 +63,9 @@
"url": "https://drupal.org/node/2124289"
},
{
"name" : "https://drupal.org/node/2123287",
"refsource" : "CONFIRM",
"url" : "https://drupal.org/node/2123287"
"name": "[oss-security] 20131103 Re: CVE request for Drupal contributed modules",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q4/210"
}
]
}

View File

@ -53,60 +53,20 @@
"references": {
"reference_data": [
{
"name" : "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673",
"refsource" : "CONFIRM",
"url" : "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673"
},
{
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673",
"refsource" : "CONFIRM",
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673"
},
{
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html"
},
{
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742"
},
{
"name" : "https://www.wireshark.org/security/wnpa-sec-2013-51.html",
"refsource" : "CONFIRM",
"url" : "https://www.wireshark.org/security/wnpa-sec-2013-51.html"
},
{
"name" : "DSA-2734",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2734"
},
{
"name" : "GLSA-201308-05",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
},
{
"name" : "RHSA-2014:0341",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0341.html"
},
{
"name" : "openSUSE-SU-2013:1295",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html"
"name": "54371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54371"
},
{
"name": "openSUSE-SU-2013:1300",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html"
},
{
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49673"
},
{
"name": "oval:org.mitre.oval:def:17412",
"refsource": "OVAL",
@ -118,9 +78,39 @@
"url": "http://secunia.com/advisories/54178"
},
{
"name" : "54371",
"name": "RHSA-2014:0341",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html"
},
{
"name": "54425",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/54371"
"url": "http://secunia.com/advisories/54425"
},
{
"name": "DSA-2734",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2734"
},
{
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html"
},
{
"name": "https://www.wireshark.org/security/wnpa-sec-2013-51.html",
"refsource": "CONFIRM",
"url": "https://www.wireshark.org/security/wnpa-sec-2013-51.html"
},
{
"name": "GLSA-201308-05",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
},
{
"name": "openSUSE-SU-2013:1295",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html"
},
{
"name": "54296",
@ -128,9 +118,19 @@
"url": "http://secunia.com/advisories/54296"
},
{
"name" : "54425",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54425"
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742"
},
{
"name": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673&r2=49672&pathrev=49673"
},
{
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-01-02T00:00:00",
"ID": "CVE-2017-13197",
"STATE": "PUBLIC"
@ -76,15 +76,15 @@
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2018-01-01"
},
{
"name" : "102414",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102414"
},
{
"name": "1040106",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040106"
},
{
"name": "102414",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102414"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-04-02T00:00:00",
"ID": "CVE-2017-13276",
"STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-04-02T00:00:00",
"ID": "CVE-2017-13301",
"STATE": "PUBLIC"

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16465",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://zerodayinitiative.com/advisories/ZDI-17-856",
"refsource" : "MISC",
"url" : "https://zerodayinitiative.com/advisories/ZDI-17-856"
},
{
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://zerodayinitiative.com/advisories/ZDI-17-856",
"refsource": "MISC",
"url": "https://zerodayinitiative.com/advisories/ZDI-17-856"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "CONFIRM",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22384"
},
{
"name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4",
"refsource" : "CONFIRM",
"url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4"
},
{
"name": "GLSA-201811-17",
"refsource": "GENTOO",
@ -71,6 +66,11 @@
"name": "101941",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101941"
},
{
"name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4",
"refsource": "CONFIRM",
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://downloads.asterisk.org/pub/security/AST-2017-014.html",
"refsource" : "CONFIRM",
"url" : "http://downloads.asterisk.org/pub/security/AST-2017-014.html"
},
{
"name": "https://issues.asterisk.org/jira/browse/ASTERISK-27480",
"refsource": "CONFIRM",
"url": "https://issues.asterisk.org/jira/browse/ASTERISK-27480"
},
{
"name": "1040056",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040056"
},
{
"name": "GLSA-201811-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-11"
},
{
"name" : "1040056",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040056"
"name": "http://downloads.asterisk.org/pub/security/AST-2017-014.html",
"refsource": "CONFIRM",
"url": "http://downloads.asterisk.org/pub/security/AST-2017-014.html"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5ec6ae161d72f01411169a938fa5f8baea16e8f",
"name": "https://github.com/torvalds/linux/commit/a5ec6ae161d72f01411169a938fa5f8baea16e8f",
"refsource": "MISC",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5ec6ae161d72f01411169a938fa5f8baea16e8f"
"url": "https://github.com/torvalds/linux/commit/a5ec6ae161d72f01411169a938fa5f8baea16e8f"
},
{
"name": "http://www.openwall.com/lists/oss-security/2017/12/21/2",
@ -63,9 +63,9 @@
"url": "http://www.openwall.com/lists/oss-security/2017/12/21/2"
},
{
"name" : "https://github.com/torvalds/linux/commit/a5ec6ae161d72f01411169a938fa5f8baea16e8f",
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5ec6ae161d72f01411169a938fa5f8baea16e8f",
"refsource": "MISC",
"url" : "https://github.com/torvalds/linux/commit/a5ec6ae161d72f01411169a938fa5f8baea16e8f"
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5ec6ae161d72f01411169a938fa5f8baea16e8f"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4232",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4644",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4800",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/",
"refsource" : "CONFIRM",
"url" : "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/"
},
{
"name": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51142",
"refsource": "CONFIRM",
"url": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51142"
},
{
"name": "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/",
"refsource": "CONFIRM",
"url": "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/"
}
]
}

View File

@ -55,25 +55,25 @@
},
"references": {
"reference_data": [
{
"name": "1041183",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041183"
},
{
"name": "https://fortiguard.com/advisory/FG-IR-18-014",
"refsource": "CONFIRM",
"url": "https://fortiguard.com/advisory/FG-IR-18-014"
},
{
"name" : "104537",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104537"
},
{
"name": "1041182",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041182"
},
{
"name" : "1041183",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1041183"
"name": "104537",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104537"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md",
"refsource" : "MISC",
"url" : "https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md"
},
{
"name": "https://wpvulndb.com/vulnerabilities/9010",
"refsource": "MISC",
"url": "https://wpvulndb.com/vulnerabilities/9010"
},
{
"name": "https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md",
"refsource": "MISC",
"url": "https://github.com/d4wner/Vulnerabilities-Report/blob/master/responsive-coming-soon-page.md"
}
]
}