"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 06:55:29 +00:00
parent 2912cd17bd
commit 17c2a5c751
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
53 changed files with 3688 additions and 3688 deletions

View File

@ -53,40 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20010330 Incorrect MIME Header Can Cause IE to Execute E-mail Attachment", "name": "CA-2001-06",
"refsource" : "BUGTRAQ", "refsource": "CERT",
"url" : "http://marc.info/?l=bugtraq&m=98596775905044&w=2" "url": "http://www.cert.org/advisories/CA-2001-06.html"
}, },
{ {
"name": "MS01-020", "name": "MS01-020",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-020" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-020"
}, },
{
"name" : "CA-2001-06",
"refsource" : "CERT",
"url" : "http://www.cert.org/advisories/CA-2001-06.html"
},
{
"name" : "L-066",
"refsource" : "CIAC",
"url" : "http://www.ciac.org/ciac/bulletins/l-066.shtml"
},
{ {
"name": "2524", "name": "2524",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/2524" "url": "http://www.securityfocus.com/bid/2524"
}, },
{
"name" : "7806",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/7806"
},
{
"name" : "oval:org.mitre.oval:def:141",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A141"
},
{ {
"name": "1001197", "name": "1001197",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -96,6 +76,26 @@
"name": "ie-mime-execute-code(6306)", "name": "ie-mime-execute-code(6306)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6306" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6306"
},
{
"name": "L-066",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/l-066.shtml"
},
{
"name": "oval:org.mitre.oval:def:141",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A141"
},
{
"name": "20010330 Incorrect MIME Header Can Cause IE to Execute E-mail Attachment",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=98596775905044&w=2"
},
{
"name": "7806",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/7806"
} }
] ]
} }

View File

@ -53,8 +53,8 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20010503 Cisco Catalyst 2900XL crashes with empty UDP packet when SNMP is disabled. ",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"name": "20010503 Cisco Catalyst 2900XL crashes with empty UDP packet when SNMP is disabled.",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-05/0040.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2001-05/0040.html"
}, },
{ {

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "3275",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/3275"
},
{ {
"name": "20011127 UNICOS LOCAL HOLE ALL VERSIONS", "name": "20011127 UNICOS LOCAL HOLE ALL VERSIONS",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=100695627423924&w=2" "url": "http://marc.info/?l=bugtraq&m=100695627423924&w=2"
}, },
{
"name" : "20020101-01-I",
"refsource" : "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20020101-01-I"
},
{ {
"name": "3590", "name": "3590",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/3590" "url": "http://www.securityfocus.com/bid/3590"
}, },
{
"name" : "3275",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/3275"
},
{ {
"name": "unicos-nqsd-format-string(7618)", "name": "unicos-nqsd-format-string(7618)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7618" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7618"
},
{
"name": "20020101-01-I",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20020101-01-I"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "VU#276944", "name": "3038",
"refsource" : "CERT-VN", "refsource": "BID",
"url" : "http://www.kb.cert.org/vuls/id/276944" "url": "http://www.securityfocus.com/bid/3038"
}, },
{ {
"name": "CA-2001-18", "name": "CA-2001-18",
@ -67,11 +67,6 @@
"refsource": "SGI", "refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20011102-01-I" "url": "ftp://patches.sgi.com/support/free/security/advisories/20011102-01-I"
}, },
{
"name" : "http://www.kb.cert.org/vuls/id/JPLA-4WESMM",
"refsource" : "MISC",
"url" : "http://www.kb.cert.org/vuls/id/JPLA-4WESMM"
},
{ {
"name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/ldapv3/", "name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/ldapv3/",
"refsource": "MISC", "refsource": "MISC",
@ -83,9 +78,14 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6893" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6893"
}, },
{ {
"name" : "3038", "name": "VU#276944",
"refsource" : "BID", "refsource": "CERT-VN",
"url" : "http://www.securityfocus.com/bid/3038" "url": "http://www.kb.cert.org/vuls/id/276944"
},
{
"name": "http://www.kb.cert.org/vuls/id/JPLA-4WESMM",
"refsource": "MISC",
"url": "http://www.kb.cert.org/vuls/id/JPLA-4WESMM"
} }
] ]
} }

View File

@ -53,34 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060515 Newsportal: code injection vulnerability", "name": "trnewsportal-poll-file-include(26439)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-05/0308.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26439"
},
{
"name" : "20060517 Newsportal <= 0.36 Remote File Inclusion Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2006-05/0325.html"
},
{
"name" : "1789",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1789"
},
{
"name" : "http://florian-amrhein.de/newsportal/forum/article?id=1&group=amrhein.newsportal",
"refsource" : "CONFIRM",
"url" : "http://florian-amrhein.de/newsportal/forum/article?id=1&group=amrhein.newsportal"
},
{
"name" : "18000",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18000"
},
{
"name" : "ADV-2006-1838",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1838"
}, },
{ {
"name": "25531", "name": "25531",
@ -88,24 +63,19 @@
"url": "http://www.osvdb.org/25531" "url": "http://www.osvdb.org/25531"
}, },
{ {
"name" : "25577", "name": "18000",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://www.osvdb.org/25577" "url": "http://www.securityfocus.com/bid/18000"
}, },
{ {
"name" : "20119", "name": "20060515 Newsportal: code injection vulnerability",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/20119" "url": "http://archives.neohapsis.com/archives/bugtraq/2006-05/0308.html"
}, },
{ {
"name" : "20128", "name": "http://florian-amrhein.de/newsportal/forum/article?id=1&group=amrhein.newsportal",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/20128" "url": "http://florian-amrhein.de/newsportal/forum/article?id=1&group=amrhein.newsportal"
},
{
"name" : "947",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/947"
}, },
{ {
"name": "newsportal-poll-code-execution(26471)", "name": "newsportal-poll-code-execution(26471)",
@ -113,9 +83,39 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26471" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26471"
}, },
{ {
"name" : "trnewsportal-poll-file-include(26439)", "name": "947",
"refsource" : "XF", "refsource": "SREASON",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26439" "url": "http://securityreason.com/securityalert/947"
},
{
"name": "1789",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1789"
},
{
"name": "25577",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25577"
},
{
"name": "20128",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20128"
},
{
"name": "ADV-2006-1838",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1838"
},
{
"name": "20119",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20119"
},
{
"name": "20060517 Newsportal <= 0.36 Remote File Inclusion Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-05/0325.html"
} }
] ]
} }

View File

@ -53,64 +53,64 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20060528 Advisory: phpBB 2.x (Activity MOD Plus) File InclusionVulnerability.", "name": "http://www.nukedx.com/?viewdoc=38",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://www.securityfocus.com/archive/1/435286/100/0/threaded" "url": "http://www.nukedx.com/?viewdoc=38"
}, },
{ {
"name": "20060529 RE: Advisory: Blend Portal <= 1.2.0 for phpBB 2.x(blend_data/blend_common.php) File Inclusion Vulnerability", "name": "20060529 RE: Advisory: Blend Portal <= 1.2.0 for phpBB 2.x(blend_data/blend_common.php) File Inclusion Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435298/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/435298/100/0/threaded"
}, },
{
"name" : "20060528 Advisory: phpBB 2.x (Activity MOD Plus) File Inclusion Vulnerability.",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0709.html"
},
{
"name" : "http://www.nukedx.com/?getxpl=38",
"refsource" : "MISC",
"url" : "http://www.nukedx.com/?getxpl=38"
},
{
"name" : "http://www.nukedx.com/?viewdoc=38",
"refsource" : "MISC",
"url" : "http://www.nukedx.com/?viewdoc=38"
},
{ {
"name": "http://phpbb-tweaks.com/topics.html-p-17623#17623", "name": "http://phpbb-tweaks.com/topics.html-p-17623#17623",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://phpbb-tweaks.com/topics.html-p-17623#17623" "url": "http://phpbb-tweaks.com/topics.html-p-17623#17623"
}, },
{
"name" : "18155",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18155"
},
{
"name" : "ADV-2006-2045",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2045"
},
{
"name" : "25821",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/25821"
},
{
"name" : "20354",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20354"
},
{ {
"name": "1001", "name": "1001",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1001" "url": "http://securityreason.com/securityalert/1001"
}, },
{
"name": "20060528 Advisory: phpBB 2.x (Activity MOD Plus) File Inclusion Vulnerability.",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0709.html"
},
{
"name": "18155",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18155"
},
{
"name": "25821",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/25821"
},
{ {
"name": "activitymodplus-multiple-file-include(26857)", "name": "activitymodplus-multiple-file-include(26857)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26857" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26857"
},
{
"name": "20060528 Advisory: phpBB 2.x (Activity MOD Plus) File InclusionVulnerability.",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435286/100/0/threaded"
},
{
"name": "ADV-2006-2045",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2045"
},
{
"name": "20354",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20354"
},
{
"name": "http://www.nukedx.com/?getxpl=38",
"refsource": "MISC",
"url": "http://www.nukedx.com/?getxpl=38"
} }
] ]
} }

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1", "name": "ADV-2008-3088",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1" "url": "http://www.vupen.com/english/advisories/2008/3088"
},
{
"name" : "243806",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1"
},
{
"name" : "32213",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32213"
}, },
{ {
"name": "oval:org.mitre.oval:def:5668", "name": "oval:org.mitre.oval:def:5668",
@ -73,14 +63,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5668" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5668"
}, },
{ {
"name" : "ADV-2008-3088", "name": "sun-solaris-dhcp-code-execution(46480)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2008/3088" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46480"
}, },
{ {
"name" : "1021157", "name": "243806",
"refsource" : "SECTRACK", "refsource": "SUNALERT",
"url" : "http://securitytracker.com/id?1021157" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1"
}, },
{ {
"name": "32668", "name": "32668",
@ -88,9 +78,19 @@
"url": "http://secunia.com/advisories/32668" "url": "http://secunia.com/advisories/32668"
}, },
{ {
"name" : "sun-solaris-dhcp-code-execution(46480)", "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46480" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1"
},
{
"name": "1021157",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021157"
},
{
"name": "32213",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32213"
} }
] ]
} }

View File

@ -52,120 +52,120 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "32998",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32998"
},
{ {
"name": "20081209 rPSA-2008-0332-1 kernel", "name": "20081209 rPSA-2008-0332-1 kernel",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499044/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/499044/100/0/threaded"
}, },
{
"name" : "http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc5",
"refsource" : "CONFIRM",
"url" : "http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc5"
},
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332"
},
{
"name" : "https://issues.rpath.com/browse/RPL-2915",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-2915"
},
{
"name" : "DSA-1681",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1681"
},
{
"name" : "FEDORA-2008-11618",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01358.html"
},
{ {
"name": "RHSA-2009:0225", "name": "RHSA-2009:0225",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0225.html" "url": "http://www.redhat.com/support/errata/RHSA-2009-0225.html"
}, },
{
"name" : "RHSA-2009:0053",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0053.html"
},
{
"name" : "SUSE-SA:2009:004",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html"
},
{
"name" : "SUSE-SA:2009:008",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00010.html"
},
{
"name" : "USN-715-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-715-1"
},
{
"name" : "USN-714-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/714-1/"
},
{
"name" : "33503",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33503"
},
{ {
"name": "oval:org.mitre.oval:def:10584", "name": "oval:org.mitre.oval:def:10584",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10584" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10584"
}, },
{
"name" : "33623",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33623"
},
{
"name" : "32998",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32998"
},
{
"name" : "33641",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33641"
},
{
"name" : "33704",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33704"
},
{
"name" : "33756",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33756"
},
{ {
"name": "33706", "name": "33706",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33706" "url": "http://secunia.com/advisories/33706"
}, },
{ {
"name" : "33854", "name": "https://issues.rpath.com/browse/RPL-2915",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2915"
},
{
"name": "http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc5",
"refsource": "CONFIRM",
"url": "http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.28-rc5"
},
{
"name": "33641",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/33854" "url": "http://secunia.com/advisories/33641"
},
{
"name": "RHSA-2009:0053",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0053.html"
},
{
"name": "33503",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33503"
},
{
"name": "33756",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33756"
},
{
"name": "FEDORA-2008-11618",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01358.html"
}, },
{ {
"name": "33348", "name": "33348",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33348" "url": "http://secunia.com/advisories/33348"
}, },
{
"name": "33623",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33623"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332"
},
{ {
"name": "33083", "name": "33083",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33083" "url": "http://secunia.com/advisories/33083"
},
{
"name": "USN-714-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/714-1/"
},
{
"name": "USN-715-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-715-1"
},
{
"name": "33854",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33854"
},
{
"name": "33704",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33704"
},
{
"name": "DSA-1681",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1681"
},
{
"name": "SUSE-SA:2009:008",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00010.html"
},
{
"name": "SUSE-SA:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "7365", "name": "4730",
"refsource" : "EXPLOIT-DB", "refsource": "SREASON",
"url" : "https://www.exploit-db.com/exploits/7365" "url": "http://securityreason.com/securityalert/4730"
}, },
{ {
"name": "33038", "name": "33038",
@ -63,9 +63,9 @@
"url": "http://secunia.com/advisories/33038" "url": "http://secunia.com/advisories/33038"
}, },
{ {
"name" : "4730", "name": "7365",
"refsource" : "SREASON", "refsource": "EXPLOIT-DB",
"url" : "http://securityreason.com/securityalert/4730" "url": "https://www.exploit-db.com/exploits/7365"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2185", "ID": "CVE-2011-2185",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20110603 CVE Request -- fabric -- Use of insecure temporary file by uploading templates and projects to remote hosts",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/03/5"
},
{ {
"name": "[oss-security] 20110606 Re: CVE Request -- fabric -- Use of insecure temporary file by uploading templates and projects to remote hosts", "name": "[oss-security] 20110606 Re: CVE Request -- fabric -- Use of insecure temporary file by uploading templates and projects to remote hosts",
"refsource": "MLIST", "refsource": "MLIST",
@ -68,9 +63,14 @@
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629003" "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629003"
}, },
{ {
"name" : "http://code.fabfile.org/projects/fabric/files/Fabric-1.1.0.tar.gz", "name": "FEDORA-2011-8964",
"refsource" : "CONFIRM", "refsource": "FEDORA",
"url" : "http://code.fabfile.org/projects/fabric/files/Fabric-1.1.0.tar.gz" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062534.html"
},
{
"name": "[oss-security] 20110603 CVE Request -- fabric -- Use of insecure temporary file by uploading templates and projects to remote hosts",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/03/5"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=710462", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=710462",
@ -78,9 +78,9 @@
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=710462" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=710462"
}, },
{ {
"name" : "FEDORA-2011-8964", "name": "http://code.fabfile.org/projects/fabric/files/Fabric-1.1.0.tar.gz",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062534.html" "url": "http://code.fabfile.org/projects/fabric/files/Fabric-1.1.0.tar.gz"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.opera.com/docs/changelogs/mac/1150/", "name": "http://www.opera.com/docs/changelogs/windows/1150/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/mac/1150/" "url": "http://www.opera.com/docs/changelogs/windows/1150/"
}, },
{ {
"name": "http://www.opera.com/docs/changelogs/unix/1150/", "name": "http://www.opera.com/docs/changelogs/unix/1150/",
@ -63,9 +63,9 @@
"url": "http://www.opera.com/docs/changelogs/unix/1150/" "url": "http://www.opera.com/docs/changelogs/unix/1150/"
}, },
{ {
"name" : "http://www.opera.com/docs/changelogs/windows/1150/", "name": "http://www.opera.com/docs/changelogs/mac/1150/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.opera.com/docs/changelogs/windows/1150/" "url": "http://www.opera.com/docs/changelogs/mac/1150/"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://support.novell.com/security/cve/CVE-2011-2650.html", "name": "49236",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://support.novell.com/security/cve/CVE-2011-2650.html" "url": "http://www.securityfocus.com/bid/49236"
},
{
"name": "kiwi-rpm-info-xss(69285)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69285"
}, },
{ {
"name": "https://bugzilla.novell.com/show_bug.cgi?id=701816", "name": "https://bugzilla.novell.com/show_bug.cgi?id=701816",
@ -68,14 +73,9 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00013.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00013.html"
}, },
{ {
"name" : "49236", "name": "http://support.novell.com/security/cve/CVE-2011-2650.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/49236" "url": "http://support.novell.com/security/cve/CVE-2011-2650.html"
},
{
"name" : "kiwi-rpm-info-xss(69285)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69285"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2728", "ID": "CVE-2011-2728",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77",
"refsource" : "MISC",
"url" : "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77"
},
{ {
"name": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod", "name": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod" "url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
}, },
{
"name": "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77",
"refsource": "MISC",
"url": "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77"
},
{ {
"name": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1", "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1" "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1"
}, },
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=742987",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=742987"
},
{ {
"name": "FEDORA-2011-15484", "name": "FEDORA-2011-15484",
"refsource": "FEDORA", "refsource": "FEDORA",
@ -86,6 +81,11 @@
"name": "46172", "name": "46172",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46172" "url": "http://secunia.com/advisories/46172"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=742987",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742987"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2729", "ID": "CVE-2011-2729",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,25 +53,60 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20110812 [SECURITY] CVE-2011-2729: Commons Daemon fails to drop capabilities (Apache Tomcat)", "name": "tomcat-jsvc-info-disclosure(69161)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/519263/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69161"
}, },
{ {
"name" : "[commons-dev] 20110812 [AANNOUNCE] Apache Commons Daemon 1.0.7 released", "name": "openSUSE-SU-2011:1062",
"refsource" : "MLIST", "refsource": "SUSE",
"url" : "http://mail-archives.apache.org/mod_mbox/commons-dev/201108.mbox/%3C4E451B2B.9090108@apache.org%3E" "url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00024.html"
}, },
{ {
"name" : "[tomcat-announce] 20110812 [SECURITY] CVE-2011-2729: Commons Daemon fails to drop capabilities (Apache Tomcat)", "name": "http://svn.apache.org/viewvc?view=revision&revision=1153824",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://mail-archives.apache.org/mod_mbox/tomcat-announce/201108.mbox/%3C4E45221D.1020306@apache.org%3E" "url": "http://svn.apache.org/viewvc?view=revision&revision=1153824"
},
{
"name": "HPSBUX02860",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
},
{
"name": "1025925",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025925"
}, },
{ {
"name": "http://people.apache.org/~markt/patches/2011-08-12-cve2011-2729-tc5.patch", "name": "http://people.apache.org/~markt/patches/2011-08-12-cve2011-2729-tc5.patch",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://people.apache.org/~markt/patches/2011-08-12-cve2011-2729-tc5.patch" "url": "http://people.apache.org/~markt/patches/2011-08-12-cve2011-2729-tc5.patch"
}, },
{
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name": "HPSBOV02762",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=730400",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=730400"
},
{
"name": "RHSA-2011:1291",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1291.html"
},
{
"name": "SSRT100627",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=132215163318824&w=2"
},
{ {
"name": "http://svn.apache.org/viewvc?view=revision&revision=1152701", "name": "http://svn.apache.org/viewvc?view=revision&revision=1152701",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -83,14 +118,9 @@
"url": "http://svn.apache.org/viewvc?view=revision&revision=1153379" "url": "http://svn.apache.org/viewvc?view=revision&revision=1153379"
}, },
{ {
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1153824", "name": "20110812 [SECURITY] CVE-2011-2729: Commons Daemon fails to drop capabilities (Apache Tomcat)",
"refsource" : "CONFIRM", "refsource": "BUGTRAQ",
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1153824" "url": "http://www.securityfocus.com/archive/1/519263/100/0/threaded"
},
{
"name" : "http://tomcat.apache.org/security-5.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-5.html"
}, },
{ {
"name": "http://tomcat.apache.org/security-6.html", "name": "http://tomcat.apache.org/security-6.html",
@ -98,89 +128,34 @@
"url": "http://tomcat.apache.org/security-6.html" "url": "http://tomcat.apache.org/security-6.html"
}, },
{ {
"name" : "http://tomcat.apache.org/security-7.html", "name": "57126",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://tomcat.apache.org/security-7.html" "url": "http://secunia.com/advisories/57126"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=730400", "name": "[commons-dev] 20110812 [AANNOUNCE] Apache Commons Daemon 1.0.7 released",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=730400" "url": "http://mail-archives.apache.org/mod_mbox/commons-dev/201108.mbox/%3C4E451B2B.9090108@apache.org%3E"
}, },
{ {
"name": "https://issues.apache.org/jira/browse/DAEMON-214", "name": "https://issues.apache.org/jira/browse/DAEMON-214",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/DAEMON-214" "url": "https://issues.apache.org/jira/browse/DAEMON-214"
}, },
{
"name" : "HPSBUX02725",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=132215163318824&w=2"
},
{
"name" : "SSRT100627",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=132215163318824&w=2"
},
{
"name" : "HPSBUX02860",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
},
{
"name" : "SSRT101146",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
},
{
"name" : "HPSBST02955",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
},
{
"name" : "HPSBOV02762",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name" : "SSRT100825",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
},
{
"name" : "RHSA-2011:1291",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1291.html"
},
{
"name" : "RHSA-2011:1292",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1292.html"
},
{
"name" : "openSUSE-SU-2011:1062",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00024.html"
},
{ {
"name": "49143", "name": "49143",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/49143" "url": "http://www.securityfocus.com/bid/49143"
}, },
{
"name" : "oval:org.mitre.oval:def:14743",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14743"
},
{ {
"name": "oval:org.mitre.oval:def:19450", "name": "oval:org.mitre.oval:def:19450",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19450" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19450"
}, },
{ {
"name" : "1025925", "name": "SSRT100825",
"refsource" : "SECTRACK", "refsource": "HP",
"url" : "http://securitytracker.com/id?1025925" "url": "http://marc.info/?l=bugtraq&m=133469267822771&w=2"
}, },
{ {
"name": "46030", "name": "46030",
@ -188,14 +163,39 @@
"url": "http://secunia.com/advisories/46030" "url": "http://secunia.com/advisories/46030"
}, },
{ {
"name" : "57126", "name": "http://tomcat.apache.org/security-5.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/57126" "url": "http://tomcat.apache.org/security-5.html"
}, },
{ {
"name" : "tomcat-jsvc-info-disclosure(69161)", "name": "HPSBUX02725",
"refsource" : "XF", "refsource": "HP",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69161" "url": "http://marc.info/?l=bugtraq&m=132215163318824&w=2"
},
{
"name": "RHSA-2011:1292",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1292.html"
},
{
"name": "SSRT101146",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=136485229118404&w=2"
},
{
"name": "[tomcat-announce] 20110812 [SECURITY] CVE-2011-2729: Commons Daemon fails to drop capabilities (Apache Tomcat)",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/201108.mbox/%3C4E45221D.1020306@apache.org%3E"
},
{
"name": "HPSBST02955",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
},
{
"name": "oval:org.mitre.oval:def:14743",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14743"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-3245", "ID": "CVE-2011-3245",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT4999",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4999"
},
{ {
"name": "APPLE-SA-2011-10-12-1", "name": "APPLE-SA-2011-10-12-1",
"refsource": "APPLE", "refsource": "APPLE",
@ -71,6 +66,11 @@
"name": "appleios-keyboard-info-disc(70555)", "name": "appleios-keyboard-info-disc(70555)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70555" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70555"
},
{
"name": "http://support.apple.com/kb/HT4999",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4999"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-3417", "ID": "CVE-2011-3417",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS11-100",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-100"
},
{ {
"name": "TA11-347A", "name": "TA11-347A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-347A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA11-347A.html"
}, },
{
"name": "MS11-100",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-100"
},
{ {
"name": "51203", "name": "51203",
"refsource": "BID", "refsource": "BID",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-3672", "ID": "CVE-2011-3672",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -62,15 +62,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README" "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
}, },
{
"name" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/opendocman-1.2.6-svn-2011-01-21",
"refsource" : "MISC",
"url" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/opendocman-1.2.6-svn-2011-01-21"
},
{ {
"name": "opendocman-userpermsclass-path-disclosure(70608)", "name": "opendocman-userpermsclass-path-disclosure(70608)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70608" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70608"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/opendocman-1.2.6-svn-2011-01-21",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/opendocman-1.2.6-svn-2011-01-21"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0217", "ID": "CVE-2013-0217",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20130205 Xen Security Advisory 39 (CVE-2013-0216,CVE-2013-0217) - Linux netback DoS via malicious guest ring.", "name": "MDVSA-2013:176",
"refsource" : "MLIST", "refsource": "MANDRIVA",
"url" : "http://www.openwall.com/lists/oss-security/2013/02/05/12" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=910883",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=910883"
}, },
{ {
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7d5145d8eb2b9791533ffe4dc003b129b9696c48", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7d5145d8eb2b9791533ffe4dc003b129b9696c48",
@ -67,20 +72,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.8" "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.8"
}, },
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=910883",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=910883"
},
{ {
"name": "https://github.com/torvalds/linux/commit/7d5145d8eb2b9791533ffe4dc003b129b9696c48", "name": "https://github.com/torvalds/linux/commit/7d5145d8eb2b9791533ffe4dc003b129b9696c48",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/7d5145d8eb2b9791533ffe4dc003b129b9696c48" "url": "https://github.com/torvalds/linux/commit/7d5145d8eb2b9791533ffe4dc003b129b9696c48"
}, },
{ {
"name" : "MDVSA-2013:176", "name": "[oss-security] 20130205 Xen Security Advisory 39 (CVE-2013-0216,CVE-2013-0217) - Linux netback DoS via malicious guest ring.",
"refsource" : "MANDRIVA", "refsource": "MLIST",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176" "url": "http://www.openwall.com/lists/oss-security/2013/02/05/12"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-0636", "ID": "CVE-2013-0636",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-1675", "ID": "CVE-2013-1675",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-47.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-47.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=866825",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=866825"
},
{ {
"name": "DSA-2699", "name": "DSA-2699",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -72,45 +62,15 @@
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:165" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:165"
}, },
{
"name" : "RHSA-2013:0820",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0820.html"
},
{
"name" : "RHSA-2013:0821",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0821.html"
},
{
"name" : "openSUSE-SU-2013:0831",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html"
},
{
"name" : "openSUSE-SU-2013:0834",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html"
},
{ {
"name": "openSUSE-SU-2013:0825", "name": "openSUSE-SU-2013:0825",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html"
}, },
{ {
"name" : "openSUSE-SU-2013:0929", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=866825",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=866825"
},
{
"name" : "openSUSE-SU-2013:0946",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html"
},
{
"name" : "USN-1822-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1822-1"
}, },
{ {
"name": "USN-1823-1", "name": "USN-1823-1",
@ -118,14 +78,54 @@
"url": "http://www.ubuntu.com/usn/USN-1823-1" "url": "http://www.ubuntu.com/usn/USN-1823-1"
}, },
{ {
"name" : "59858", "name": "RHSA-2013:0821",
"refsource" : "BID", "refsource": "REDHAT",
"url" : "http://www.securityfocus.com/bid/59858" "url": "http://rhn.redhat.com/errata/RHSA-2013-0821.html"
},
{
"name": "openSUSE-SU-2013:0929",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html"
},
{
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-47.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-47.html"
}, },
{ {
"name": "oval:org.mitre.oval:def:16976", "name": "oval:org.mitre.oval:def:16976",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16976" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16976"
},
{
"name": "openSUSE-SU-2013:0831",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html"
},
{
"name": "RHSA-2013:0820",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0820.html"
},
{
"name": "openSUSE-SU-2013:0834",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html"
},
{
"name": "openSUSE-SU-2013:0946",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html"
},
{
"name": "59858",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59858"
},
{
"name": "USN-1822-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1822-1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-1733", "ID": "CVE-2013-1733",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.bugzilla.org/security/4.0.10/",
"refsource" : "CONFIRM",
"url" : "http://www.bugzilla.org/security/4.0.10/"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=911593", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=911593",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=911593" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=911593"
},
{
"name": "http://www.bugzilla.org/security/4.0.10/",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/4.0.10/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1868", "ID": "CVE-2013-1868",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "59793",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59793"
},
{ {
"name": "[oss-security] 20130319 Re: CVE Request: VLC Buffer overflows", "name": "[oss-security] 20130319 Re: CVE Request: VLC Buffer overflows",
"refsource": "MLIST", "refsource": "MLIST",
@ -71,11 +76,6 @@
"name": "oval:org.mitre.oval:def:17226", "name": "oval:org.mitre.oval:def:17226",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17226" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17226"
},
{
"name" : "59793",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/59793"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4272", "ID": "CVE-2013-4272",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://drupal.org/node/2064785",
"refsource": "CONFIRM",
"url": "https://drupal.org/node/2064785"
},
{ {
"name": "[oss-security] 20130822 Re: CVE request for Drupal contributed modules", "name": "[oss-security] 20130822 Re: CVE request for Drupal contributed modules",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/08/22/2" "url": "http://www.openwall.com/lists/oss-security/2013/08/22/2"
}, },
{
"name": "https://drupal.org/node/2064783",
"refsource": "CONFIRM",
"url": "https://drupal.org/node/2064783"
},
{ {
"name": "https://drupal.org/node/2065057", "name": "https://drupal.org/node/2065057",
"refsource": "MISC", "refsource": "MISC",
@ -66,16 +76,6 @@
"name": "https://drupal.org/node/2064781", "name": "https://drupal.org/node/2064781",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://drupal.org/node/2064781" "url": "https://drupal.org/node/2064781"
},
{
"name" : "https://drupal.org/node/2064783",
"refsource" : "CONFIRM",
"url" : "https://drupal.org/node/2064783"
},
{
"name" : "https://drupal.org/node/2064785",
"refsource" : "CONFIRM",
"url" : "https://drupal.org/node/2064785"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@symantec.com",
"ID": "CVE-2013-4674", "ID": "CVE-2013-4674",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "61290",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61290"
},
{
"name": "symantec-encryption-cve20134674-xss(85902)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85902"
},
{ {
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20130722_00", "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20130722_00",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20130722_00" "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20130722_00"
}, },
{ {
"name" : "61290", "name": "54214",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/61290" "url": "http://secunia.com/advisories/54214"
}, },
{ {
"name": "95581", "name": "95581",
@ -71,16 +81,6 @@
"name": "1028820", "name": "1028820",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1028820" "url": "http://www.securitytracker.com/id/1028820"
},
{
"name" : "54214",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54214"
},
{
"name" : "symantec-encryption-cve20134674-xss(85902)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/85902"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-5227", "ID": "CVE-2013-5227",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://support.apple.com/kb/HT6162", "name": "APPLE-SA-2013-12-16-1",
"refsource" : "CONFIRM", "refsource": "APPLE",
"url" : "http://support.apple.com/kb/HT6162" "url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0087.html"
},
{
"name": "64355",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64355"
}, },
{ {
"name": "http://support.apple.com/kb/HT6441", "name": "http://support.apple.com/kb/HT6441",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6441" "url": "http://support.apple.com/kb/HT6441"
}, },
{
"name" : "APPLE-SA-2013-12-16-1",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-12/0087.html"
},
{
"name" : "APPLE-SA-2013-12-16-2",
"refsource" : "APPLE",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-12/0086.html"
},
{ {
"name": "APPLE-SA-2014-09-17-1", "name": "APPLE-SA-2014-09-17-1",
"refsource": "APPLE", "refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html"
}, },
{ {
"name" : "64355", "name": "http://support.apple.com/kb/HT6162",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/64355" "url": "http://support.apple.com/kb/HT6162"
},
{
"name": "APPLE-SA-2013-12-16-2",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0086.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-5334", "ID": "CVE-2013-5334",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-5425", "ID": "CVE-2013-5425",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21652405",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21652405"
},
{ {
"name": "PM93828", "name": "PM93828",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
@ -66,6 +61,11 @@
"name": "was-ve-cve20135425-xss(87487)", "name": "was-ve-cve20135425-xss(87487)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87487" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87487"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21652405",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21652405"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1038242",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038242"
},
{ {
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0207", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0207",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "97463", "name": "97463",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/97463" "url": "http://www.securityfocus.com/bid/97463"
},
{
"name" : "1038242",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038242"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.436081", "DATE_ASSIGNED": "2017-08-22T17:29:33.436081",
"ID": "CVE-2017-1000207", "ID": "CVE-2017-1000207",
"REQUESTER": "mmo@semmle.com", "REQUESTER": "mmo@semmle.com",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Swagger Parser", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "Swagger Parser <= 1.0.30 and Swagger codegen <= 2.2.2" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Remote code execution" "value": "n/a"
} }
] ]
} }

View File

@ -54,9 +54,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us", "name": "1039152",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us" "url": "http://www.securitytracker.com/id/1039152"
}, },
{ {
"name": "100367", "name": "100367",
@ -64,9 +64,9 @@
"url": "http://www.securityfocus.com/bid/100367" "url": "http://www.securityfocus.com/bid/100367"
}, },
{ {
"name" : "1039152", "name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1039152" "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16499", "ID": "CVE-2017-16499",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4002", "ID": "CVE-2017-4002",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4636", "ID": "CVE-2017-4636",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4693", "ID": "CVE-2017-4693",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4819", "ID": "CVE-2017-4819",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -64,26 +64,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1433005",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1433005"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2018-06/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2018-06/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2018-07/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2018-07/"
},
{ {
"name": "DSA-4139", "name": "DSA-4139",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -95,9 +75,9 @@
"url": "https://security.gentoo.org/glsa/201810-01" "url": "https://security.gentoo.org/glsa/201810-01"
}, },
{ {
"name" : "RHSA-2018:0526", "name": "103388",
"refsource" : "REDHAT", "refsource": "BID",
"url" : "https://access.redhat.com/errata/RHSA-2018:0526" "url": "http://www.securityfocus.com/bid/103388"
}, },
{ {
"name": "RHSA-2018:0527", "name": "RHSA-2018:0527",
@ -105,19 +85,39 @@
"url": "https://access.redhat.com/errata/RHSA-2018:0527" "url": "https://access.redhat.com/errata/RHSA-2018:0527"
}, },
{ {
"name" : "USN-3596-1", "name": "[debian-lts-announce] 20180315 [SECURITY] [DLA 1308-1] firefox-esr security update",
"refsource" : "UBUNTU", "refsource": "MLIST",
"url" : "https://usn.ubuntu.com/3596-1/" "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html"
}, },
{ {
"name" : "103388", "name": "https://www.mozilla.org/security/advisories/mfsa2018-07/",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/103388" "url": "https://www.mozilla.org/security/advisories/mfsa2018-07/"
},
{
"name": "RHSA-2018:0526",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0526"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1433005",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1433005"
}, },
{ {
"name": "1040514", "name": "1040514",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040514" "url": "http://www.securitytracker.com/id/1040514"
},
{
"name": "USN-3596-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3596-1/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2018-06/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2018-06/"
} }
] ]
} }

View File

@ -95,15 +95,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://jira.atlassian.com/browse/BSERV-10684" "url": "https://jira.atlassian.com/browse/BSERV-10684"
}, },
{
"name" : "https://confluence.atlassian.com/x/3WNsO",
"refsource" : "CONFIRM",
"url" : "https://confluence.atlassian.com/x/3WNsO"
},
{ {
"name": "103488", "name": "103488",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/103488" "url": "http://www.securityfocus.com/bid/103488"
},
{
"name": "https://confluence.atlassian.com/x/3WNsO",
"refsource": "CONFIRM",
"url": "https://confluence.atlassian.com/x/3WNsO"
} }
] ]
} }