"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:29:41 +00:00
parent 0c74917bc3
commit 1c928c7afa
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
62 changed files with 3925 additions and 3928 deletions

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20001219 def-2000-04: Bea WebLogic Server dotdot-overflow",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-12/0331.html"
},
{ {
"name": "2138", "name": "2138",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "weblogic-dot-bo(5782)", "name": "weblogic-dot-bo(5782)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5782" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5782"
},
{
"name": "20001219 def-2000-04: Bea WebLogic Server dotdot-overflow",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0331.html"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "RHSA-2001:024",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2001-024.html"
},
{ {
"name": "20010228 Joe's Own Editor File Handling Error", "name": "20010228 Joe's Own Editor File Handling Error",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0490.html" "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0490.html"
}, },
{
"name" : "MDKSA-2001:026",
"refsource" : "MANDRAKE",
"url" : "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-026.php3"
},
{ {
"name": "DSA-041", "name": "DSA-041",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2001/dsa-041" "url": "http://www.debian.org/security/2001/dsa-041"
}, },
{ {
"name" : "RHSA-2001:024", "name": "MDKSA-2001:026",
"refsource" : "REDHAT", "refsource": "MANDRAKE",
"url" : "http://www.redhat.com/support/errata/RHSA-2001-024.html" "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-026.php3"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20010429 SAP R/3 Web Application Server Demo for Linux: root exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/180498"
},
{
"name" : "ftp://ftp.sap.com/pub/linuxlab/saptools/README.saposcol",
"refsource" : "CONFIRM",
"url" : "ftp://ftp.sap.com/pub/linuxlab/saptools/README.saposcol"
},
{ {
"name": "2662", "name": "2662",
"refsource": "BID", "refsource": "BID",
@ -71,6 +61,16 @@
"name": "linux-sap-execute-code(6487)", "name": "linux-sap-execute-code(6487)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6487" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6487"
},
{
"name": "20010429 SAP R/3 Web Application Server Demo for Linux: root exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/180498"
},
{
"name": "ftp://ftp.sap.com/pub/linuxlab/saptools/README.saposcol",
"refsource": "CONFIRM",
"url": "ftp://ftp.sap.com/pub/linuxlab/saptools/README.saposcol"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "NetBSD-SA2001-014",
"refsource" : "NETBSD",
"url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-014.txt.asc"
},
{ {
"name": "bsd-dump-tty-privileges(7037)", "name": "bsd-dump-tty-privileges(7037)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7037" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7037"
},
{
"name": "NetBSD-SA2001-014",
"refsource": "NETBSD",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-014.txt.asc"
} }
] ]
} }

View File

@ -52,26 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "3020",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3020"
},
{ {
"name": "20010711 McAfee ASaP Virusscan - myCIO HTTP Server Directory Traversal Vulnerabilty", "name": "20010711 McAfee ASaP Virusscan - myCIO HTTP Server Directory Traversal Vulnerabilty",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/196272" "url": "http://www.securityfocus.com/archive/1/196272"
}, },
{
"name" : "20010716 McAfee ASaP Virusscan - MyCIO HTTP Server Directory Traversal Vul nerability",
"refsource" : "NTBUGTRAQ",
"url" : "http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0107&L=ntbugtraq&F=P&S=&P=1558"
},
{ {
"name": "VU#190267", "name": "VU#190267",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/190267" "url": "http://www.kb.cert.org/vuls/id/190267"
}, },
{
"name" : "3020",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/3020"
},
{ {
"name": "mcafee-mycio-directory-traversal(6834)", "name": "mcafee-mycio-directory-traversal(6834)",
"refsource": "XF", "refsource": "XF",
@ -81,6 +76,11 @@
"name": "584", "name": "584",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/584" "url": "http://www.osvdb.org/584"
},
{
"name": "20010716 McAfee ASaP Virusscan - MyCIO HTTP Server Directory Traversal Vul nerability",
"refsource": "NTBUGTRAQ",
"url": "http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0107&L=ntbugtraq&F=P&S=&P=1558"
} }
] ]
} }

View File

@ -57,25 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/431655/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/431655/100/0/threaded"
}, },
{
"name" : "http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1",
"refsource" : "MISC",
"url" : "http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1"
},
{
"name" : "17641",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17641"
},
{ {
"name": "ADV-2006-1457", "name": "ADV-2006-1457",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1457" "url": "http://www.vupen.com/english/advisories/2006/1457"
}, },
{ {
"name" : "24805", "name": "asterisk-mail-disclose-information(25993)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://www.osvdb.org/24805" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25993"
}, },
{ {
"name": "19744", "name": "19744",
@ -83,9 +73,19 @@
"url": "http://secunia.com/advisories/19744" "url": "http://secunia.com/advisories/19744"
}, },
{ {
"name" : "asterisk-mail-disclose-information(25993)", "name": "24805",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25993" "url": "http://www.osvdb.org/24805"
},
{
"name": "17641",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17641"
},
{
"name": "http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1",
"refsource": "MISC",
"url": "http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1"
} }
] ]
} }

View File

@ -52,15 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "26068",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26068"
},
{
"name": "prenewsmanager-multiple-xss(26692)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26692"
},
{ {
"name": "20060524 Pre News Manager v1.0", "name": "20060524 Pre News Manager v1.0",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435020/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/435020/100/0/threaded"
}, },
{ {
"name" : "18333", "name": "996",
"refsource" : "BID", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/bid/18333" "url": "http://securityreason.com/securityalert/996"
}, },
{ {
"name": "ADV-2006-1990", "name": "ADV-2006-1990",
@ -68,30 +78,20 @@
"url": "http://www.vupen.com/english/advisories/2006/1990" "url": "http://www.vupen.com/english/advisories/2006/1990"
}, },
{ {
"name" : "26066", "name": "26070",
"refsource": "OSVDB", "refsource": "OSVDB",
"url" : "http://www.osvdb.org/26066" "url": "http://www.osvdb.org/26070"
}, },
{ {
"name" : "26067", "name": "20284",
"refsource" : "OSVDB", "refsource": "SECUNIA",
"url" : "http://www.osvdb.org/26067" "url": "http://secunia.com/advisories/20284"
},
{
"name" : "26068",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26068"
}, },
{ {
"name": "26069", "name": "26069",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/26069" "url": "http://www.osvdb.org/26069"
}, },
{
"name" : "26070",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26070"
},
{ {
"name": "26071", "name": "26071",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -103,19 +103,19 @@
"url": "http://www.osvdb.org/26072" "url": "http://www.osvdb.org/26072"
}, },
{ {
"name" : "20284", "name": "18333",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/20284" "url": "http://www.securityfocus.com/bid/18333"
}, },
{ {
"name" : "996", "name": "26066",
"refsource" : "SREASON", "refsource": "OSVDB",
"url" : "http://securityreason.com/securityalert/996" "url": "http://www.osvdb.org/26066"
}, },
{ {
"name" : "prenewsmanager-multiple-xss(26692)", "name": "26067",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26692" "url": "http://www.osvdb.org/26067"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "1818",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1818"
},
{
"name" : "31691",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/31691"
},
{ {
"name": "31692", "name": "31692",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/31692" "url": "http://www.osvdb.org/31692"
}, },
{
"name" : "31693",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/31693"
},
{ {
"name": "phpcommunitycalendar-multiple-sql-injection(26648)", "name": "phpcommunitycalendar-multiple-sql-injection(26648)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26648" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26648"
}, },
{
"name": "31691",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/31691"
},
{ {
"name": "phpcommunitycalendar-week-month-event-xss(26647)", "name": "phpcommunitycalendar-week-month-event-xss(26647)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26647" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26647"
},
{
"name": "31693",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/31693"
},
{
"name": "1818",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1818"
} }
] ]
} }

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ADV-2006-2193",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2193"
},
{
"name": "ibwdguestbook-index-sql-injection(26996)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26996"
},
{
"name": "20509",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20509"
},
{ {
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/iBWD_poc.txt", "name": "http://downloads.securityfocus.com/vulnerabilities/exploits/iBWD_poc.txt",
"refsource": "MISC", "refsource": "MISC",
@ -61,21 +76,6 @@
"name": "18256", "name": "18256",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/18256" "url": "http://www.securityfocus.com/bid/18256"
},
{
"name" : "ADV-2006-2193",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2193"
},
{
"name" : "20509",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20509"
},
{
"name" : "ibwdguestbook-index-sql-injection(26996)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26996"
} }
] ]
} }

View File

@ -52,100 +52,100 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt",
"refsource" : "CONFIRM",
"url" : "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt"
},
{
"name" : "http://www.cups.org/str.php?L2974",
"refsource" : "CONFIRM",
"url" : "http://www.cups.org/str.php?L2974"
},
{ {
"name": "[oss-security] 20081201 (sort of urgent) CVE Request -- cups (repost)", "name": "[oss-security] 20081201 (sort of urgent) CVE Request -- cups (repost)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/12/01/1" "url": "http://www.openwall.com/lists/oss-security/2008/12/01/1"
}, },
{
"name" : "DSA-1677",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1677"
},
{
"name" : "GLSA-200812-11",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml"
},
{
"name" : "GLSA-200812-01",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml"
},
{
"name" : "MDVSA-2009:028",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028"
},
{
"name" : "MDVSA-2009:029",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:029"
},
{
"name" : "RHSA-2008:1028",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-1028.html"
},
{
"name" : "SUSE-SR:2009:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html"
},
{
"name" : "32518",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32518"
},
{
"name" : "oval:org.mitre.oval:def:10058",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058"
},
{
"name" : "1021298",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021298"
},
{
"name" : "33111",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33111"
},
{
"name" : "ADV-2008-3315",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3315"
},
{ {
"name": "33101", "name": "33101",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33101" "url": "http://secunia.com/advisories/33101"
}, },
{ {
"name" : "32962", "name": "32518",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32518"
},
{
"name": "GLSA-200812-11",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml"
},
{
"name": "oval:org.mitre.oval:def:10058",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058"
},
{
"name": "33111",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/32962" "url": "http://secunia.com/advisories/33111"
},
{
"name": "RHSA-2008:1028",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-1028.html"
},
{
"name": "http://www.cups.org/str.php?L2974",
"refsource": "CONFIRM",
"url": "http://www.cups.org/str.php?L2974"
},
{
"name": "GLSA-200812-01",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml"
},
{
"name": "MDVSA-2009:029",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:029"
},
{
"name": "SUSE-SR:2009:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html"
}, },
{ {
"name": "33568", "name": "33568",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33568" "url": "http://secunia.com/advisories/33568"
}, },
{
"name": "DSA-1677",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1677"
},
{
"name": "32962",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32962"
},
{
"name": "1021298",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021298"
},
{
"name": "ADV-2008-3315",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3315"
},
{ {
"name": "cups-cupsimagereadpng-overflow(46933)", "name": "cups-cupsimagereadpng-overflow(46933)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46933" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46933"
},
{
"name": "MDVSA-2009:028",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028"
},
{
"name": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt",
"refsource": "CONFIRM",
"url": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20081208 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass", "name": "multiple-antivirus-mzheader-code-execution(47435)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/498995/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47435"
},
{
"name" : "20081209 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass -Update-",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/499043/100/0/threaded"
}, },
{ {
"name": "4723", "name": "4723",
@ -68,9 +63,14 @@
"url": "http://securityreason.com/securityalert/4723" "url": "http://securityreason.com/securityalert/4723"
}, },
{ {
"name" : "multiple-antivirus-mzheader-code-execution(47435)", "name": "20081209 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass -Update-",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47435" "url": "http://www.securityfocus.com/archive/1/499043/100/0/threaded"
},
{
"name": "20081208 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/498995/100/0/threaded"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "7407",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7407"
},
{
"name" : "32756",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32756"
},
{
"name" : "50655",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/50655"
},
{ {
"name": "33096", "name": "33096",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -81,6 +66,21 @@
"name": "unwebmastermarketplace-member-sql-injection(47210)", "name": "unwebmastermarketplace-member-sql-injection(47210)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47210" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47210"
},
{
"name": "7407",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7407"
},
{
"name": "50655",
"refsource": "OSVDB",
"url": "http://osvdb.org/50655"
},
{
"name": "32756",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32756"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "7323",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7323"
},
{ {
"name": "32589", "name": "32589",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32589" "url": "http://www.securityfocus.com/bid/32589"
}, },
{
"name": "7323",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7323"
},
{ {
"name": "32923", "name": "32923",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2139", "ID": "CVE-2011-2139",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
},
{
"name" : "RHSA-2011:1144",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1144.html"
},
{ {
"name": "SUSE-SA:2011:033", "name": "SUSE-SA:2011:033",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html"
}, },
{ {
"name" : "SUSE-SU-2011:0894", "name": "48308",
"refsource" : "SUSE", "refsource": "SECUNIA",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html" "url": "http://secunia.com/advisories/48308"
},
{
"name" : "openSUSE-SU-2011:0897",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html"
}, },
{ {
"name": "TA11-222A", "name": "TA11-222A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html"
}, },
{
"name" : "oval:org.mitre.oval:def:14204",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14204"
},
{ {
"name": "oval:org.mitre.oval:def:16030", "name": "oval:org.mitre.oval:def:16030",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16030" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16030"
}, },
{ {
"name" : "48308", "name": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/48308" "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
},
{
"name": "SUSE-SU-2011:0894",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html"
},
{
"name": "RHSA-2011:1144",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1144.html"
},
{
"name": "oval:org.mitre.oval:def:14204",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14204"
},
{
"name": "openSUSE-SU-2011:0897",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.novell.com/support/viewContent.do?externalId=7006378",
"refsource" : "CONFIRM",
"url" : "http://www.novell.com/support/viewContent.do?externalId=7006378"
},
{ {
"name": "https://bugzilla.novell.com/show_bug.cgi?id=582471", "name": "https://bugzilla.novell.com/show_bug.cgi?id=582471",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=582471" "url": "https://bugzilla.novell.com/show_bug.cgi?id=582471"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7006378",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/viewContent.do?externalId=7006378"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-2256", "ID": "CVE-2011-2256",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-2277", "ID": "CVE-2011-2277",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
},
{ {
"name": "TA11-201A", "name": "TA11-201A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2509", "ID": "CVE-2011-2509",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20110628 CVE Request: Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/28/4"
},
{
"name" : "[oss-security] 20110629 Re: CVE Request: Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/29/12"
},
{ {
"name": "http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.3]_cross_site_scripting(XSS)", "name": "http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.3]_cross_site_scripting(XSS)",
"refsource": "MISC", "refsource": "MISC",
"url": "http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.3]_cross_site_scripting(XSS)" "url": "http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.3]_cross_site_scripting(XSS)"
}, },
{
"name": "[oss-security] 20110628 CVE Request: Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/28/4"
},
{ {
"name": "http://developer.joomla.org/security/news/352-20110604-xss-vulnerability.html", "name": "http://developer.joomla.org/security/news/352-20110604-xss-vulnerability.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://developer.joomla.org/security/news/352-20110604-xss-vulnerability.html" "url": "http://developer.joomla.org/security/news/352-20110604-xss-vulnerability.html"
},
{
"name": "[oss-security] 20110629 Re: CVE Request: Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/29/12"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20110908 CVE Request -- libfcgi-perl / perl-FCGI: Certain environment variables shared between first and subsequent HTTP requests",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/09/08/1"
},
{ {
"name": "[oss-security] 20110908 Re: CVE Request -- libfcgi-perl / perl-FCGI: Certain environment variables shared between first and subsequent HTTP requests", "name": "[oss-security] 20110908 Re: CVE Request -- libfcgi-perl / perl-FCGI: Certain environment variables shared between first and subsequent HTTP requests",
"refsource": "MLIST", "refsource": "MLIST",
@ -67,16 +62,41 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607479" "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607479"
}, },
{
"name": "[oss-security] 20110908 CVE Request -- libfcgi-perl / perl-FCGI: Certain environment variables shared between first and subsequent HTTP requests",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/09/08/1"
},
{
"name": "perlfast-cgi-security-bypass(69709)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69709"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=736604", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=736604",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=736604" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=736604"
}, },
{
"name": "openSUSE-SU-2012:0036",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/13155253"
},
{ {
"name": "https://rt.cpan.org/Public/Bug/Display.html?id=68380", "name": "https://rt.cpan.org/Public/Bug/Display.html?id=68380",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=68380" "url": "https://rt.cpan.org/Public/Bug/Display.html?id=68380"
}, },
{
"name": "49549",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49549"
},
{
"name": "openSUSE-SU-2012:0004",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/13154637"
},
{ {
"name": "DSA-2327", "name": "DSA-2327",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -86,26 +106,6 @@
"name": "MDVSA-2012:001", "name": "MDVSA-2012:001",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:001" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:001"
},
{
"name" : "openSUSE-SU-2012:0004",
"refsource" : "SUSE",
"url" : "https://hermes.opensuse.org/messages/13154637"
},
{
"name" : "openSUSE-SU-2012:0036",
"refsource" : "SUSE",
"url" : "https://hermes.opensuse.org/messages/13155253"
},
{
"name" : "49549",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/49549"
},
{
"name" : "perlfast-cgi-security-bypass(69709)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69709"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1025943",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025943"
},
{ {
"name": "http://zerodayinitiative.com/advisories/ZDI-11-265/", "name": "http://zerodayinitiative.com/advisories/ZDI-11-265/",
"refsource": "MISC", "refsource": "MISC",
@ -67,11 +72,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/49172" "url": "http://www.securityfocus.com/bid/49172"
}, },
{
"name" : "1025943",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025943"
},
{ {
"name": "8388", "name": "8388",
"refsource": "SREASON", "refsource": "SREASON",

View File

@ -57,15 +57,15 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6" "url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
}, },
{
"name" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource" : "MISC",
"url" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
},
{ {
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/ExoPHPDesk_1.2.1", "name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/ExoPHPDesk_1.2.1",
"refsource": "MISC", "refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/ExoPHPDesk_1.2.1" "url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/ExoPHPDesk_1.2.1"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{
"name" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource" : "MISC",
"url" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
},
{ {
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHPfileNavigator-2.3.3", "name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHPfileNavigator-2.3.3",
"refsource": "MISC", "refsource": "MISC",
@ -71,6 +61,16 @@
"name": "phpfilenavigator-logsinc-path-disclosure(70545)", "name": "phpfilenavigator-logsinc-path-disclosure(70545)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70545" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70545"
},
{
"name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2011-3828", "ID": "CVE-2011-3828",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2011-3925", "ID": "CVE-2011-3925",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=107182",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=107182"
},
{ {
"name": "http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html", "name": "http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html" "url": "http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html"
}, },
{
"name": "http://code.google.com/p/chromium/issues/detail?id=107182",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=107182"
},
{ {
"name": "oval:org.mitre.oval:def:14538", "name": "oval:org.mitre.oval:def:14538",
"refsource": "OVAL", "refsource": "OVAL",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-0024", "ID": "CVE-2013-0024",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "oval:org.mitre.oval:def:16126",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16126"
},
{ {
"name": "MS13-009", "name": "MS13-009",
"refsource": "MS", "refsource": "MS",
@ -61,11 +66,6 @@
"name": "TA13-043B", "name": "TA13-043B",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html" "url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
},
{
"name" : "oval:org.mitre.oval:def:16126",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16126"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0260", "ID": "CVE-2013-0260",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20130204 Re: CVE request for Drupal contributed modules",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/02/05/1"
},
{ {
"name": "http://drupal.org/node/1903324", "name": "http://drupal.org/node/1903324",
"refsource": "MISC", "refsource": "MISC",
"url": "http://drupal.org/node/1903324" "url": "http://drupal.org/node/1903324"
},
{
"name": "[oss-security] 20130204 Re: CVE request for Drupal contributed modules",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/05/1"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-0691", "ID": "CVE-2013-0691",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1247", "ID": "CVE-2013-1247",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1266", "ID": "CVE-2013-1266",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016"
}, },
{
"name" : "TA13-043B",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
},
{ {
"name": "oval:org.mitre.oval:def:15999", "name": "oval:org.mitre.oval:def:15999",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15999" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15999"
},
{
"name": "TA13-043B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1340", "ID": "CVE-2013-1340",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS13-053", "name": "oval:org.mitre.oval:def:17273",
"refsource" : "MS", "refsource": "OVAL",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17273"
}, },
{ {
"name": "TA13-190A", "name": "TA13-190A",
@ -63,9 +63,9 @@
"url": "http://www.us-cert.gov/ncas/alerts/TA13-190A" "url": "http://www.us-cert.gov/ncas/alerts/TA13-190A"
}, },
{ {
"name" : "oval:org.mitre.oval:def:17273", "name": "MS13-053",
"refsource" : "OVAL", "refsource": "MS",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17273" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4370", "ID": "CVE-2013-4370",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20131010 Xen Security Advisory 69 (CVE-2013-4370) - misplaced free in ocaml xc_vcpu_getaffinity stub",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/10/10/13"
},
{ {
"name": "http://seclists.org/oss-sec/2013/q4/att-61/xsa69.patch", "name": "http://seclists.org/oss-sec/2013/q4/att-61/xsa69.patch",
"refsource": "MISC", "refsource": "MISC",
@ -66,6 +61,11 @@
"name": "GLSA-201407-03", "name": "GLSA-201407-03",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml" "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
},
{
"name": "[oss-security] 20131010 Xen Security Advisory 69 (CVE-2013-4370) - misplaced free in ocaml xc_vcpu_getaffinity stub",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/10/10/13"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4451", "ID": "CVE-2013-4451",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,6 +57,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://www.openwall.com/lists/oss-security/2013/10/21/11" "url": "https://www.openwall.com/lists/oss-security/2013/10/21/11"
}, },
{
"name": "63237",
"refsource": "BID",
"url": "https://www.securityfocus.com/bid/63237"
},
{ {
"name": "https://github.com/sitaramc/gitolite/commit/3dad4f8e3214d6ab5f71823019a624fa48b055a3", "name": "https://github.com/sitaramc/gitolite/commit/3dad4f8e3214d6ab5f71823019a624fa48b055a3",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "https://groups.google.com/forum/#!topic/gitolite/Tu1sjaf7A4A/discussion", "name": "https://groups.google.com/forum/#!topic/gitolite/Tu1sjaf7A4A/discussion",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!topic/gitolite/Tu1sjaf7A4A/discussion" "url": "https://groups.google.com/forum/#!topic/gitolite/Tu1sjaf7A4A/discussion"
},
{
"name" : "63237",
"refsource" : "BID",
"url" : "https://www.securityfocus.com/bid/63237"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5805", "ID": "CVE-2013-5805",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,36 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{ {
"name": "GLSA-201406-32", "name": "GLSA-201406-32",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
}, },
{
"name" : "HPSBUX02944",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name" : "SUSE-SU-2013:1666",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name" : "openSUSE-SU-2013:1663",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name" : "USN-2089-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2089-1"
},
{ {
"name": "63112", "name": "63112",
"refsource": "BID", "refsource": "BID",
@ -91,6 +66,31 @@
"name": "oval:org.mitre.oval:def:18943", "name": "oval:org.mitre.oval:def:18943",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18943" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18943"
},
{
"name": "USN-2089-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name": "HPSBUX02944",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name": "openSUSE-SU-2013:1663",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "SUSE-SU-2013:1666",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5850", "ID": "CVE-2013-5850",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html", "name": "RHSA-2014:0414",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" "url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "http://support.apple.com/kb/HT5982",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5982"
},
{
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name" : "APPLE-SA-2013-10-15-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
}, },
{ {
"name": "GLSA-201406-32", "name": "GLSA-201406-32",
@ -83,9 +63,9 @@
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
}, },
{ {
"name" : "HPSBUX02944", "name": "RHSA-2013:1447",
"refsource" : "HP", "refsource": "REDHAT",
"url" : "http://marc.info/?l=bugtraq&m=138674073720143&w=2" "url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
}, },
{ {
"name": "RHSA-2013:1440", "name": "RHSA-2013:1440",
@ -93,54 +73,9 @@
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
}, },
{ {
"name" : "RHSA-2013:1447", "name": "98535",
"refsource" : "REDHAT", "refsource": "OSVDB",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1447.html" "url": "http://osvdb.org/98535"
},
{
"name" : "RHSA-2013:1451",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"name" : "RHSA-2013:1505",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"name" : "RHSA-2013:1507",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"name" : "RHSA-2013:1508",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"name" : "RHSA-2013:1793",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name" : "RHSA-2014:0414",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "SUSE-SU-2013:1666",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name" : "SUSE-SU-2013:1677",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"name" : "openSUSE-SU-2013:1663",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
}, },
{ {
"name": "USN-2033-1", "name": "USN-2033-1",
@ -153,24 +88,89 @@
"url": "http://www.ubuntu.com/usn/USN-2089-1" "url": "http://www.ubuntu.com/usn/USN-2089-1"
}, },
{ {
"name" : "63153", "name": "RHSA-2013:1508",
"refsource" : "BID", "refsource": "REDHAT",
"url" : "http://www.securityfocus.com/bid/63153" "url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
}, },
{ {
"name" : "98535", "name": "SUSE-SU-2013:1677",
"refsource" : "OSVDB", "refsource": "SUSE",
"url" : "http://osvdb.org/98535" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"name": "HPSBUX02944",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name": "RHSA-2013:1505",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
}, },
{ {
"name": "oval:org.mitre.oval:def:19150", "name": "oval:org.mitre.oval:def:19150",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19150" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19150"
}, },
{
"name": "63153",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63153"
},
{
"name": "openSUSE-SU-2013:1663",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "SUSE-SU-2013:1666",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name": "RHSA-2013:1793",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "APPLE-SA-2013-10-15-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"name": "RHSA-2013:1507",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"name": "http://support.apple.com/kb/HT5982",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5982"
},
{ {
"name": "56338", "name": "56338",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56338" "url": "http://secunia.com/advisories/56338"
},
{
"name": "RHSA-2013:1451",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID": "CVE-2017-0631", "ID": "CVE-2017-0631",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -55,15 +55,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-05-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-05-01"
},
{ {
"name": "98216", "name": "98216",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/98216" "url": "http://www.securityfocus.com/bid/98216"
},
{
"name": "https://source.android.com/security/bulletin/2017-05-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-05-01"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-05-06T20:43:28.266410", "DATE_ASSIGNED": "2017-05-06T20:43:28.266410",
"ID": "CVE-2017-1000014", "ID": "CVE-2017-1000014",
"REQUESTER": "security@phpmyadmin.net", "REQUESTER": "security@phpmyadmin.net",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "phpMyAdmin", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "All 4.6.x versions (prior to 4.6.6), 4.4.x versions (prior to 4.4.15.10), and 4.0.x versions (prior to 4.0.10.19) are affected." "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "phpMyAdmin" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Denial of Service" "value": "n/a"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-1000359", "ID": "CVE-2017-1000359",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -11,21 +11,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "OpenDaylight", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "<=3.3" "version_value": "n/a"
},
{
"version_value" : "<=4.0"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "OpenDaylight" "vendor_name": "n/a"
} }
] ]
} }
@ -47,7 +44,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "unspecified" "value": "n/a"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-12-29", "DATE_ASSIGNED": "2017-12-29",
"ID": "CVE-2017-1000426", "ID": "CVE-2017-1000426",
"REQUESTER": "olt@omniscale.de", "REQUESTER": "olt@omniscale.de",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "MapProxy", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "1.10.3 and older" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "MapProxy" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-79" "value": "n/a"
} }
] ]
} }

View File

@ -58,15 +58,15 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00011.html" "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00011.html"
}, },
{
"name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433",
"refsource" : "MISC",
"url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433"
},
{ {
"name": "DSA-4248", "name": "DSA-4248",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4248" "url": "https://www.debian.org/security/2018/dsa-4248"
},
{
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433",
"refsource": "MISC",
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-243-04",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-243-04"
},
{ {
"name": "100563", "name": "100563",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/100563" "url": "http://www.securityfocus.com/bid/100563"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-243-04",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-243-04"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-12826", "ID": "CVE-2017-12826",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,16 +53,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/visionmedia/debug/issues/501",
"refsource" : "MISC",
"url" : "https://github.com/visionmedia/debug/issues/501"
},
{ {
"name": "https://github.com/visionmedia/debug/pull/504", "name": "https://github.com/visionmedia/debug/pull/504",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/visionmedia/debug/pull/504" "url": "https://github.com/visionmedia/debug/pull/504"
}, },
{
"name": "https://github.com/visionmedia/debug/issues/501",
"refsource": "MISC",
"url": "https://github.com/visionmedia/debug/issues/501"
},
{ {
"name": "https://nodesecurity.io/advisories/534", "name": "https://nodesecurity.io/advisories/534",
"refsource": "MISC", "refsource": "MISC",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16426", "ID": "CVE-2017-16426",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4320", "ID": "CVE-2017-4320",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4324", "ID": "CVE-2017-4324",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4428", "ID": "CVE-2017-4428",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4695", "ID": "CVE-2017-4695",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "45668",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45668/"
},
{ {
"name": "http://www.binaryworld.it/guidepoc.asp", "name": "http://www.binaryworld.it/guidepoc.asp",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.binaryworld.it/guidepoc.asp" "url": "http://www.binaryworld.it/guidepoc.asp"
},
{
"name": "45668",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45668/"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.citrix.com/article/CTX239002",
"refsource" : "CONFIRM",
"url" : "https://support.citrix.com/article/CTX239002"
},
{ {
"name": "105725", "name": "105725",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/105725" "url": "http://www.securityfocus.com/bid/105725"
}, },
{
"name": "https://support.citrix.com/article/CTX239002",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX239002"
},
{ {
"name": "1042023", "name": "1042023",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-21.html" "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-21.html"
}, },
{
"name" : "104701",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104701"
},
{ {
"name": "1041250", "name": "1041250",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041250" "url": "http://www.securitytracker.com/id/1041250"
},
{
"name": "104701",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104701"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt", "name": "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt" "url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/"
}, },
{ {
"name": "https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39", "name": "https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39",
@ -63,9 +63,9 @@
"url": "https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39" "url": "https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39"
}, },
{ {
"name" : "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/", "name": "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/" "url": "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt"
}, },
{ {
"name": "USN-3838-1", "name": "USN-3838-1",