"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:29:41 +00:00
parent 0c74917bc3
commit 1c928c7afa
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
62 changed files with 3925 additions and 3928 deletions

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20001219 def-2000-04: Bea WebLogic Server dotdot-overflow",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-12/0331.html"
},
{
"name": "2138",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "weblogic-dot-bo(5782)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5782"
},
{
"name": "20001219 def-2000-04: Bea WebLogic Server dotdot-overflow",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0331.html"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "RHSA-2001:024",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2001-024.html"
},
{
"name": "20010228 Joe's Own Editor File Handling Error",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0490.html"
},
{
"name" : "MDKSA-2001:026",
"refsource" : "MANDRAKE",
"url" : "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-026.php3"
},
{
"name": "DSA-041",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2001/dsa-041"
},
{
"name" : "RHSA-2001:024",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2001-024.html"
"name": "MDKSA-2001:026",
"refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-026.php3"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20010429 SAP R/3 Web Application Server Demo for Linux: root exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/180498"
},
{
"name" : "ftp://ftp.sap.com/pub/linuxlab/saptools/README.saposcol",
"refsource" : "CONFIRM",
"url" : "ftp://ftp.sap.com/pub/linuxlab/saptools/README.saposcol"
},
{
"name": "2662",
"refsource": "BID",
@ -71,6 +61,16 @@
"name": "linux-sap-execute-code(6487)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6487"
},
{
"name": "20010429 SAP R/3 Web Application Server Demo for Linux: root exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/180498"
},
{
"name": "ftp://ftp.sap.com/pub/linuxlab/saptools/README.saposcol",
"refsource": "CONFIRM",
"url": "ftp://ftp.sap.com/pub/linuxlab/saptools/README.saposcol"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "NetBSD-SA2001-014",
"refsource" : "NETBSD",
"url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-014.txt.asc"
},
{
"name": "bsd-dump-tty-privileges(7037)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7037"
},
{
"name": "NetBSD-SA2001-014",
"refsource": "NETBSD",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-014.txt.asc"
}
]
}

View File

@ -52,26 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "3020",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3020"
},
{
"name": "20010711 McAfee ASaP Virusscan - myCIO HTTP Server Directory Traversal Vulnerabilty",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/196272"
},
{
"name" : "20010716 McAfee ASaP Virusscan - MyCIO HTTP Server Directory Traversal Vul nerability",
"refsource" : "NTBUGTRAQ",
"url" : "http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0107&L=ntbugtraq&F=P&S=&P=1558"
},
{
"name": "VU#190267",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/190267"
},
{
"name" : "3020",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/3020"
},
{
"name": "mcafee-mycio-directory-traversal(6834)",
"refsource": "XF",
@ -81,6 +76,11 @@
"name": "584",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/584"
},
{
"name": "20010716 McAfee ASaP Virusscan - MyCIO HTTP Server Directory Traversal Vul nerability",
"refsource": "NTBUGTRAQ",
"url": "http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0107&L=ntbugtraq&F=P&S=&P=1558"
}
]
}

View File

@ -57,25 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/431655/100/0/threaded"
},
{
"name" : "http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1",
"refsource" : "MISC",
"url" : "http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1"
},
{
"name" : "17641",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17641"
},
{
"name": "ADV-2006-1457",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1457"
},
{
"name" : "24805",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/24805"
"name": "asterisk-mail-disclose-information(25993)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25993"
},
{
"name": "19744",
@ -83,9 +73,19 @@
"url": "http://secunia.com/advisories/19744"
},
{
"name" : "asterisk-mail-disclose-information(25993)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25993"
"name": "24805",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24805"
},
{
"name": "17641",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17641"
},
{
"name": "http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1",
"refsource": "MISC",
"url": "http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2006.1"
}
]
}

View File

@ -52,15 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "26068",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26068"
},
{
"name": "prenewsmanager-multiple-xss(26692)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26692"
},
{
"name": "20060524 Pre News Manager v1.0",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/435020/100/0/threaded"
},
{
"name" : "18333",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18333"
"name": "996",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/996"
},
{
"name": "ADV-2006-1990",
@ -68,30 +78,20 @@
"url": "http://www.vupen.com/english/advisories/2006/1990"
},
{
"name" : "26066",
"name": "26070",
"refsource": "OSVDB",
"url" : "http://www.osvdb.org/26066"
"url": "http://www.osvdb.org/26070"
},
{
"name" : "26067",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26067"
},
{
"name" : "26068",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26068"
"name": "20284",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20284"
},
{
"name": "26069",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26069"
},
{
"name" : "26070",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/26070"
},
{
"name": "26071",
"refsource": "OSVDB",
@ -103,19 +103,19 @@
"url": "http://www.osvdb.org/26072"
},
{
"name" : "20284",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20284"
"name": "18333",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18333"
},
{
"name" : "996",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/996"
"name": "26066",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26066"
},
{
"name" : "prenewsmanager-multiple-xss(26692)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26692"
"name": "26067",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/26067"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name" : "1818",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/1818"
},
{
"name" : "31691",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/31691"
},
{
"name": "31692",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/31692"
},
{
"name" : "31693",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/31693"
},
{
"name": "phpcommunitycalendar-multiple-sql-injection(26648)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26648"
},
{
"name": "31691",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/31691"
},
{
"name": "phpcommunitycalendar-week-month-event-xss(26647)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26647"
},
{
"name": "31693",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/31693"
},
{
"name": "1818",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1818"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "ADV-2006-2193",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2193"
},
{
"name": "ibwdguestbook-index-sql-injection(26996)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26996"
},
{
"name": "20509",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20509"
},
{
"name": "http://downloads.securityfocus.com/vulnerabilities/exploits/iBWD_poc.txt",
"refsource": "MISC",
@ -61,21 +76,6 @@
"name": "18256",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/18256"
},
{
"name" : "ADV-2006-2193",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2193"
},
{
"name" : "20509",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20509"
},
{
"name" : "ibwdguestbook-index-sql-injection(26996)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26996"
}
]
}

View File

@ -52,100 +52,100 @@
},
"references": {
"reference_data": [
{
"name" : "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt",
"refsource" : "CONFIRM",
"url" : "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt"
},
{
"name" : "http://www.cups.org/str.php?L2974",
"refsource" : "CONFIRM",
"url" : "http://www.cups.org/str.php?L2974"
},
{
"name": "[oss-security] 20081201 (sort of urgent) CVE Request -- cups (repost)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/12/01/1"
},
{
"name" : "DSA-1677",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1677"
},
{
"name" : "GLSA-200812-11",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml"
},
{
"name" : "GLSA-200812-01",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml"
},
{
"name" : "MDVSA-2009:028",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028"
},
{
"name" : "MDVSA-2009:029",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:029"
},
{
"name" : "RHSA-2008:1028",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-1028.html"
},
{
"name" : "SUSE-SR:2009:002",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html"
},
{
"name" : "32518",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32518"
},
{
"name" : "oval:org.mitre.oval:def:10058",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058"
},
{
"name" : "1021298",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021298"
},
{
"name" : "33111",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33111"
},
{
"name" : "ADV-2008-3315",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3315"
},
{
"name": "33101",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33101"
},
{
"name" : "32962",
"name": "32518",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32518"
},
{
"name": "GLSA-200812-11",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml"
},
{
"name": "oval:org.mitre.oval:def:10058",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058"
},
{
"name": "33111",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/32962"
"url": "http://secunia.com/advisories/33111"
},
{
"name": "RHSA-2008:1028",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-1028.html"
},
{
"name": "http://www.cups.org/str.php?L2974",
"refsource": "CONFIRM",
"url": "http://www.cups.org/str.php?L2974"
},
{
"name": "GLSA-200812-01",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml"
},
{
"name": "MDVSA-2009:029",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:029"
},
{
"name": "SUSE-SR:2009:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html"
},
{
"name": "33568",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33568"
},
{
"name": "DSA-1677",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1677"
},
{
"name": "32962",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32962"
},
{
"name": "1021298",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021298"
},
{
"name": "ADV-2008-3315",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3315"
},
{
"name": "cups-cupsimagereadpng-overflow(46933)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46933"
},
{
"name": "MDVSA-2009:028",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028"
},
{
"name": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt",
"refsource": "CONFIRM",
"url": "http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20081208 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/498995/100/0/threaded"
},
{
"name" : "20081209 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass -Update-",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/499043/100/0/threaded"
"name": "multiple-antivirus-mzheader-code-execution(47435)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47435"
},
{
"name": "4723",
@ -68,9 +63,14 @@
"url": "http://securityreason.com/securityalert/4723"
},
{
"name" : "multiple-antivirus-mzheader-code-execution(47435)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47435"
"name": "20081209 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass -Update-",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499043/100/0/threaded"
},
{
"name": "20081208 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/498995/100/0/threaded"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "7407",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7407"
},
{
"name" : "32756",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32756"
},
{
"name" : "50655",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/50655"
},
{
"name": "33096",
"refsource": "SECUNIA",
@ -81,6 +66,21 @@
"name": "unwebmastermarketplace-member-sql-injection(47210)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47210"
},
{
"name": "7407",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7407"
},
{
"name": "50655",
"refsource": "OSVDB",
"url": "http://osvdb.org/50655"
},
{
"name": "32756",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32756"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "7323",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7323"
},
{
"name": "32589",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32589"
},
{
"name": "7323",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7323"
},
{
"name": "32923",
"refsource": "SECUNIA",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2139",
"STATE": "PUBLIC"
},
@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
},
{
"name" : "RHSA-2011:1144",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1144.html"
},
{
"name": "SUSE-SA:2011:033",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html"
},
{
"name" : "SUSE-SU-2011:0894",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html"
},
{
"name" : "openSUSE-SU-2011:0897",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html"
"name": "48308",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48308"
},
{
"name": "TA11-222A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html"
},
{
"name" : "oval:org.mitre.oval:def:14204",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14204"
},
{
"name": "oval:org.mitre.oval:def:16030",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16030"
},
{
"name" : "48308",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48308"
"name": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
},
{
"name": "SUSE-SU-2011:0894",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html"
},
{
"name": "RHSA-2011:1144",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1144.html"
},
{
"name": "oval:org.mitre.oval:def:14204",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14204"
},
{
"name": "openSUSE-SU-2011:0897",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.novell.com/support/viewContent.do?externalId=7006378",
"refsource" : "CONFIRM",
"url" : "http://www.novell.com/support/viewContent.do?externalId=7006378"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=582471",
"refsource": "CONFIRM",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=582471"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7006378",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/viewContent.do?externalId=7006378"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2011-2256",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-2277",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
},
{
"name": "TA11-201A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2509",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110628 CVE Request: Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/28/4"
},
{
"name" : "[oss-security] 20110629 Re: CVE Request: Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/29/12"
},
{
"name": "http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.3]_cross_site_scripting(XSS)",
"refsource": "MISC",
"url": "http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.3]_cross_site_scripting(XSS)"
},
{
"name": "[oss-security] 20110628 CVE Request: Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/28/4"
},
{
"name": "http://developer.joomla.org/security/news/352-20110604-xss-vulnerability.html",
"refsource": "CONFIRM",
"url": "http://developer.joomla.org/security/news/352-20110604-xss-vulnerability.html"
},
{
"name": "[oss-security] 20110629 Re: CVE Request: Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/29/12"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110908 CVE Request -- libfcgi-perl / perl-FCGI: Certain environment variables shared between first and subsequent HTTP requests",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/09/08/1"
},
{
"name": "[oss-security] 20110908 Re: CVE Request -- libfcgi-perl / perl-FCGI: Certain environment variables shared between first and subsequent HTTP requests",
"refsource": "MLIST",
@ -67,16 +62,41 @@
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607479"
},
{
"name": "[oss-security] 20110908 CVE Request -- libfcgi-perl / perl-FCGI: Certain environment variables shared between first and subsequent HTTP requests",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/09/08/1"
},
{
"name": "perlfast-cgi-security-bypass(69709)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69709"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=736604",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=736604"
},
{
"name": "openSUSE-SU-2012:0036",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/13155253"
},
{
"name": "https://rt.cpan.org/Public/Bug/Display.html?id=68380",
"refsource": "CONFIRM",
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=68380"
},
{
"name": "49549",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49549"
},
{
"name": "openSUSE-SU-2012:0004",
"refsource": "SUSE",
"url": "https://hermes.opensuse.org/messages/13154637"
},
{
"name": "DSA-2327",
"refsource": "DEBIAN",
@ -86,26 +106,6 @@
"name": "MDVSA-2012:001",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:001"
},
{
"name" : "openSUSE-SU-2012:0004",
"refsource" : "SUSE",
"url" : "https://hermes.opensuse.org/messages/13154637"
},
{
"name" : "openSUSE-SU-2012:0036",
"refsource" : "SUSE",
"url" : "https://hermes.opensuse.org/messages/13155253"
},
{
"name" : "49549",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/49549"
},
{
"name" : "perlfast-cgi-security-bypass(69709)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69709"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1025943",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025943"
},
{
"name": "http://zerodayinitiative.com/advisories/ZDI-11-265/",
"refsource": "MISC",
@ -67,11 +72,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49172"
},
{
"name" : "1025943",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1025943"
},
{
"name": "8388",
"refsource": "SREASON",

View File

@ -57,15 +57,15 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{
"name" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource" : "MISC",
"url" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/ExoPHPDesk_1.2.1",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/ExoPHPDesk_1.2.1"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{
"name" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource" : "MISC",
"url" : "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHPfileNavigator-2.3.3",
"refsource": "MISC",
@ -71,6 +61,16 @@
"name": "phpfilenavigator-logsinc-path-disclosure(70545)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70545"
},
{
"name": "[oss-security] 20110627 Re: CVE request: Joomla unspecified information disclosure vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/27/6"
},
{
"name": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README",
"refsource": "MISC",
"url": "http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2011-3828",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-3925",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://code.google.com/p/chromium/issues/detail?id=107182",
"refsource" : "CONFIRM",
"url" : "http://code.google.com/p/chromium/issues/detail?id=107182"
},
{
"name": "http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=107182",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=107182"
},
{
"name": "oval:org.mitre.oval:def:14538",
"refsource": "OVAL",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-0024",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:16126",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16126"
},
{
"name": "MS13-009",
"refsource": "MS",
@ -61,11 +66,6 @@
"name": "TA13-043B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
},
{
"name" : "oval:org.mitre.oval:def:16126",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16126"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0260",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130204 Re: CVE request for Drupal contributed modules",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/02/05/1"
},
{
"name": "http://drupal.org/node/1903324",
"refsource": "MISC",
"url": "http://drupal.org/node/1903324"
},
{
"name": "[oss-security] 20130204 Re: CVE request for Drupal contributed modules",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/05/1"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-0691",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1247",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1266",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016"
},
{
"name" : "TA13-043B",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
},
{
"name": "oval:org.mitre.oval:def:15999",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15999"
},
{
"name": "TA13-043B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1340",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MS13-053",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053"
"name": "oval:org.mitre.oval:def:17273",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17273"
},
{
"name": "TA13-190A",
@ -63,9 +63,9 @@
"url": "http://www.us-cert.gov/ncas/alerts/TA13-190A"
},
{
"name" : "oval:org.mitre.oval:def:17273",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17273"
"name": "MS13-053",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4370",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20131010 Xen Security Advisory 69 (CVE-2013-4370) - misplaced free in ocaml xc_vcpu_getaffinity stub",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/10/10/13"
},
{
"name": "http://seclists.org/oss-sec/2013/q4/att-61/xsa69.patch",
"refsource": "MISC",
@ -66,6 +61,11 @@
"name": "GLSA-201407-03",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
},
{
"name": "[oss-security] 20131010 Xen Security Advisory 69 (CVE-2013-4370) - misplaced free in ocaml xc_vcpu_getaffinity stub",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/10/10/13"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4451",
"STATE": "PUBLIC"
},
@ -57,6 +57,11 @@
"refsource": "MLIST",
"url": "https://www.openwall.com/lists/oss-security/2013/10/21/11"
},
{
"name": "63237",
"refsource": "BID",
"url": "https://www.securityfocus.com/bid/63237"
},
{
"name": "https://github.com/sitaramc/gitolite/commit/3dad4f8e3214d6ab5f71823019a624fa48b055a3",
"refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "https://groups.google.com/forum/#!topic/gitolite/Tu1sjaf7A4A/discussion",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!topic/gitolite/Tu1sjaf7A4A/discussion"
},
{
"name" : "63237",
"refsource" : "BID",
"url" : "https://www.securityfocus.com/bid/63237"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5805",
"STATE": "PUBLIC"
},
@ -52,36 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "HPSBUX02944",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name" : "SUSE-SU-2013:1666",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name" : "openSUSE-SU-2013:1663",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name" : "USN-2089-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name": "63112",
"refsource": "BID",
@ -91,6 +66,31 @@
"name": "oval:org.mitre.oval:def:18943",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18943"
},
{
"name": "USN-2089-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name": "HPSBUX02944",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name": "openSUSE-SU-2013:1663",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "SUSE-SU-2013:1666",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5850",
"STATE": "PUBLIC"
},
@ -53,29 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name" : "http://support.apple.com/kb/HT5982",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5982"
},
{
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name" : "APPLE-SA-2013-10-15-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
"name": "RHSA-2014:0414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name": "GLSA-201406-32",
@ -83,9 +63,9 @@
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "HPSBUX02944",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
"name": "RHSA-2013:1447",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
},
{
"name": "RHSA-2013:1440",
@ -93,54 +73,9 @@
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"name" : "RHSA-2013:1447",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
},
{
"name" : "RHSA-2013:1451",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"name" : "RHSA-2013:1505",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"name" : "RHSA-2013:1507",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"name" : "RHSA-2013:1508",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"name" : "RHSA-2013:1793",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name" : "RHSA-2014:0414",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "SUSE-SU-2013:1666",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name" : "SUSE-SU-2013:1677",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"name" : "openSUSE-SU-2013:1663",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
"name": "98535",
"refsource": "OSVDB",
"url": "http://osvdb.org/98535"
},
{
"name": "USN-2033-1",
@ -153,24 +88,89 @@
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name" : "63153",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/63153"
"name": "RHSA-2013:1508",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"name" : "98535",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/98535"
"name": "SUSE-SU-2013:1677",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"name": "HPSBUX02944",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name": "RHSA-2013:1505",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name": "oval:org.mitre.oval:def:19150",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19150"
},
{
"name": "63153",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63153"
},
{
"name": "openSUSE-SU-2013:1663",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "SUSE-SU-2013:1666",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name": "RHSA-2013:1793",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "APPLE-SA-2013-10-15-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"name": "RHSA-2013:1507",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"name": "http://support.apple.com/kb/HT5982",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5982"
},
{
"name": "56338",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56338"
},
{
"name": "RHSA-2013:1451",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0631",
"STATE": "PUBLIC"
},
@ -55,15 +55,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-05-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-05-01"
},
{
"name": "98216",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98216"
},
{
"name": "https://source.android.com/security/bulletin/2017-05-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-05-01"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-05-06T20:43:28.266410",
"ID": "CVE-2017-1000014",
"REQUESTER": "security@phpmyadmin.net",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "phpMyAdmin",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "All 4.6.x versions (prior to 4.6.6), 4.4.x versions (prior to 4.4.15.10), and 4.0.x versions (prior to 4.0.10.19) are affected."
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "phpMyAdmin"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Denial of Service"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-1000359",
"STATE": "PUBLIC"
},
@ -11,21 +11,18 @@
"product": {
"product_data": [
{
"product_name" : "OpenDaylight",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "<=3.3"
},
{
"version_value" : "<=4.0"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "OpenDaylight"
"vendor_name": "n/a"
}
]
}
@ -47,7 +44,7 @@
"description": [
{
"lang": "eng",
"value" : "unspecified"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-12-29",
"ID": "CVE-2017-1000426",
"REQUESTER": "olt@omniscale.de",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "MapProxy",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "1.10.3 and older"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "MapProxy"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-79"
"value": "n/a"
}
]
}

View File

@ -58,15 +58,15 @@
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00011.html"
},
{
"name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433",
"refsource" : "MISC",
"url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433"
},
{
"name": "DSA-4248",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4248"
},
{
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433",
"refsource": "MISC",
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-243-04",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-243-04"
},
{
"name": "100563",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100563"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-243-04",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-243-04"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-12826",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,16 +53,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/visionmedia/debug/issues/501",
"refsource" : "MISC",
"url" : "https://github.com/visionmedia/debug/issues/501"
},
{
"name": "https://github.com/visionmedia/debug/pull/504",
"refsource": "MISC",
"url": "https://github.com/visionmedia/debug/pull/504"
},
{
"name": "https://github.com/visionmedia/debug/issues/501",
"refsource": "MISC",
"url": "https://github.com/visionmedia/debug/issues/501"
},
{
"name": "https://nodesecurity.io/advisories/534",
"refsource": "MISC",

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16426",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4320",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4324",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4428",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4695",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "45668",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45668/"
},
{
"name": "http://www.binaryworld.it/guidepoc.asp",
"refsource": "MISC",
"url": "http://www.binaryworld.it/guidepoc.asp"
},
{
"name": "45668",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45668/"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.citrix.com/article/CTX239002",
"refsource" : "CONFIRM",
"url" : "https://support.citrix.com/article/CTX239002"
},
{
"name": "105725",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105725"
},
{
"name": "https://support.citrix.com/article/CTX239002",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX239002"
},
{
"name": "1042023",
"refsource": "SECTRACK",

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-21.html"
},
{
"name" : "104701",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104701"
},
{
"name": "1041250",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041250"
},
{
"name": "104701",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104701"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt",
"name": "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/",
"refsource": "MISC",
"url" : "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt"
"url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/"
},
{
"name": "https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39",
@ -63,9 +63,9 @@
"url": "https://github.com/LibRaw/LibRaw/commit/1d8d1b452e5dc74033ee9f846081a0efb616cc39"
},
{
"name" : "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/",
"name": "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt",
"refsource": "MISC",
"url" : "https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/"
"url": "https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt"
},
{
"name": "USN-3838-1",