"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:27:10 +00:00
parent 8c1f84f967
commit 23ad40d237
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 3966 additions and 3966 deletions

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://docs.info.apple.com/article.html?artnum=307562", "name": "macos-applicationfirewall-weak-security(41317)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://docs.info.apple.com/article.html?artnum=307562" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41317"
},
{
"name" : "APPLE-SA-2008-03-18",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name" : "TA08-079A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
}, },
{ {
"name": "28304", "name": "28304",
@ -73,29 +63,39 @@
"url": "http://www.securityfocus.com/bid/28304" "url": "http://www.securityfocus.com/bid/28304"
}, },
{ {
"name" : "28368", "name": "TA08-079A",
"refsource" : "BID", "refsource": "CERT",
"url" : "http://www.securityfocus.com/bid/28368" "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
}, },
{ {
"name": "ADV-2008-0924", "name": "ADV-2008-0924",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0924/references" "url": "http://www.vupen.com/english/advisories/2008/0924/references"
}, },
{
"name" : "1019658",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019658"
},
{ {
"name": "29420", "name": "29420",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29420" "url": "http://secunia.com/advisories/29420"
}, },
{ {
"name" : "macos-applicationfirewall-weak-security(41317)", "name": "APPLE-SA-2008-03-18",
"refsource" : "XF", "refsource": "APPLE",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41317" "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name": "1019658",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019658"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307562",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name": "28368",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28368"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2008-0068", "ID": "CVE-2008-0068",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,75 +52,75 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080414 Secunia Research: HP OpenView Network Node Manager OpenView5.exeDirectory Traversal",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/490834/100/0/threaded"
},
{
"name" : "20080411 Directory traversal and multiple Denials of Service in HP OpenView NNM 7.53",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/490771"
},
{
"name" : "http://aluigi.altervista.org/adv/closedviewx-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/closedviewx-adv.txt"
},
{
"name" : "http://secunia.com/secunia_research/2008-4/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2008-4/advisory/"
},
{
"name" : "HPSBMA02349",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=121553649611253&w=2"
},
{
"name" : "SSRT080043",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=121553649611253&w=2"
},
{
"name" : "28745",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28745"
},
{
"name" : "ADV-2008-1214",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1214/references"
},
{
"name" : "44359",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/44359"
},
{
"name" : "1019838",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019838"
},
{ {
"name": "1019839", "name": "1019839",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019839" "url": "http://www.securitytracker.com/id?1019839"
}, },
{
"name": "hpopenview-openview5-directory-traversal(41790)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41790"
},
{ {
"name": "29796", "name": "29796",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29796" "url": "http://secunia.com/advisories/29796"
}, },
{
"name": "20080414 Secunia Research: HP OpenView Network Node Manager OpenView5.exeDirectory Traversal",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/490834/100/0/threaded"
},
{
"name": "http://secunia.com/secunia_research/2008-4/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2008-4/advisory/"
},
{ {
"name": "3814", "name": "3814",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3814" "url": "http://securityreason.com/securityalert/3814"
}, },
{ {
"name" : "hpopenview-openview5-directory-traversal(41790)", "name": "28745",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41790" "url": "http://www.securityfocus.com/bid/28745"
},
{
"name": "SSRT080043",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=121553649611253&w=2"
},
{
"name": "44359",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/44359"
},
{
"name": "20080411 Directory traversal and multiple Denials of Service in HP OpenView NNM 7.53",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/490771"
},
{
"name": "ADV-2008-1214",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1214/references"
},
{
"name": "1019838",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019838"
},
{
"name": "HPSBMA02349",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=121553649611253&w=2"
},
{
"name": "http://aluigi.altervista.org/adv/closedviewx-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/closedviewx-adv.txt"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://bugs.php.net/bug.php?id=41655", "name": "ADV-2008-0059",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://bugs.php.net/bug.php?id=41655" "url": "http://www.vupen.com/english/advisories/2008/0059"
},
{
"name" : "http://www.php.net/ChangeLog-4.php",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-4.php"
}, },
{ {
"name": "http://www.php.net/releases/4_4_8.php", "name": "http://www.php.net/releases/4_4_8.php",
@ -72,20 +67,25 @@
"refsource": "SLACKWARE", "refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136" "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136"
}, },
{
"name" : "28318",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28318"
},
{ {
"name": "28936", "name": "28936",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28936" "url": "http://secunia.com/advisories/28936"
}, },
{ {
"name" : "ADV-2008-0059", "name": "http://bugs.php.net/bug.php?id=41655",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2008/0059" "url": "http://bugs.php.net/bug.php?id=41655"
},
{
"name": "http://www.php.net/ChangeLog-4.php",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-4.php"
},
{
"name": "28318",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28318"
}, },
{ {
"name": "php-glob-openbasedir-security-bypass(39401)", "name": "php-glob-openbasedir-security-bypass(39401)",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2008-0177", "ID": "CVE-2008-0177",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "5191", "name": "28816",
"refsource" : "EXPLOIT-DB", "refsource": "SECUNIA",
"url" : "https://www.exploit-db.com/exploits/5191" "url": "http://secunia.com/advisories/28816"
},
{
"name": "ADV-2008-0688",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0688"
},
{
"name": "ADV-2008-0441",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0441"
}, },
{ {
"name": "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/ipcomp_input.c?f=u&only_with_tag=netbsd-3-1", "name": "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/ipcomp_input.c?f=u&only_with_tag=netbsd-3-1",
@ -63,19 +73,14 @@
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/ipcomp_input.c?f=u&only_with_tag=netbsd-3-1" "url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/ipcomp_input.c?f=u&only_with_tag=netbsd-3-1"
}, },
{ {
"name" : "http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37", "name": "27642",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37" "url": "http://www.securityfocus.com/bid/27642"
}, },
{ {
"name" : "APPLE-SA-2008-05-28", "name": "28788",
"refsource" : "APPLE", "refsource": "SECUNIA",
"url" : "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" "url": "http://secunia.com/advisories/28788"
},
{
"name" : "APPLE-SA-2008-07-11",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html"
}, },
{ {
"name": "FreeBSD-SA-08:04", "name": "FreeBSD-SA-08:04",
@ -88,69 +93,64 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html"
}, },
{ {
"name" : "VU#110947", "name": "29130",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/110947"
},
{
"name" : "27642",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27642"
},
{
"name" : "ADV-2008-0441",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0441"
},
{
"name" : "ADV-2008-0688",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0688"
},
{
"name" : "ADV-2008-1697",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1697"
},
{
"name" : "ADV-2008-2094",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2094/references"
},
{
"name" : "1019314",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019314"
},
{
"name" : "28788",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/28788" "url": "http://secunia.com/advisories/29130"
},
{
"name" : "28816",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28816"
}, },
{ {
"name": "28979", "name": "28979",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28979" "url": "http://secunia.com/advisories/28979"
}, },
{
"name" : "29130",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29130"
},
{ {
"name": "30430", "name": "30430",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30430" "url": "http://secunia.com/advisories/30430"
}, },
{
"name": "APPLE-SA-2008-05-28",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html"
},
{
"name": "http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37",
"refsource": "CONFIRM",
"url": "http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37"
},
{
"name": "APPLE-SA-2008-07-11",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html"
},
{
"name": "ADV-2008-2094",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2094/references"
},
{
"name": "ADV-2008-1697",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1697"
},
{
"name": "1019314",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019314"
},
{
"name": "VU#110947",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/110947"
},
{ {
"name": "31074", "name": "31074",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31074" "url": "http://secunia.com/advisories/31074"
},
{
"name": "5191",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5191"
} }
] ]
} }

View File

@ -52,61 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://hg.moinmo.in/moin/1.5/rev/4ede07e792dd",
"refsource" : "CONFIRM",
"url" : "http://hg.moinmo.in/moin/1.5/rev/4ede07e792dd"
},
{
"name" : "http://hg.moinmo.in/moin/1.5/rev/d0152eeb4499",
"refsource" : "CONFIRM",
"url" : "http://hg.moinmo.in/moin/1.5/rev/d0152eeb4499"
},
{
"name" : "http://moinmo.in/SecurityFixes",
"refsource" : "CONFIRM",
"url" : "http://moinmo.in/SecurityFixes"
},
{
"name" : "DSA-1514",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1514"
},
{
"name" : "FEDORA-2008-3301",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00510.html"
},
{
"name" : "FEDORA-2008-3328",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00538.html"
},
{
"name" : "GLSA-200803-27",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml"
},
{
"name" : "USN-716-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/716-1/"
},
{
"name" : "28173",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28173"
},
{
"name" : "29262",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29262"
},
{
"name" : "29444",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29444"
},
{ {
"name": "30031", "name": "30031",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -117,10 +62,65 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33755" "url": "http://secunia.com/advisories/33755"
}, },
{
"name": "GLSA-200803-27",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml"
},
{
"name": "29262",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29262"
},
{
"name": "http://moinmo.in/SecurityFixes",
"refsource": "CONFIRM",
"url": "http://moinmo.in/SecurityFixes"
},
{
"name": "FEDORA-2008-3328",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00538.html"
},
{
"name": "FEDORA-2008-3301",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00510.html"
},
{
"name": "29444",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29444"
},
{
"name": "http://hg.moinmo.in/moin/1.5/rev/d0152eeb4499",
"refsource": "CONFIRM",
"url": "http://hg.moinmo.in/moin/1.5/rev/d0152eeb4499"
},
{
"name": "USN-716-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/716-1/"
},
{ {
"name": "moinmoin-multiple-actions-xss(41037)", "name": "moinmoin-multiple-actions-xss(41037)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41037" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41037"
},
{
"name": "28173",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28173"
},
{
"name": "DSA-1514",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1514"
},
{
"name": "http://hg.moinmo.in/moin/1.5/rev/4ede07e792dd",
"refsource": "CONFIRM",
"url": "http://hg.moinmo.in/moin/1.5/rev/4ede07e792dd"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling", "name": "28308",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/489817/100/0/threaded" "url": "http://www.securityfocus.com/bid/28308"
},
{
"name": "3763",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3763"
}, },
{ {
"name": "http://labs.musecurity.com/advisories/MU-200803-01.txt", "name": "http://labs.musecurity.com/advisories/MU-200803-01.txt",
@ -63,34 +68,9 @@
"url": "http://labs.musecurity.com/advisories/MU-200803-01.txt" "url": "http://labs.musecurity.com/advisories/MU-200803-01.txt"
}, },
{ {
"name" : "http://downloads.digium.com/pub/security/AST-2008-002.html", "name": "asterisk-rtp-codecpayload-bo(41305)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://downloads.digium.com/pub/security/AST-2008-002.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305"
},
{
"name" : "http://www.asterisk.org/node/48466",
"refsource" : "CONFIRM",
"url" : "http://www.asterisk.org/node/48466"
},
{
"name" : "FEDORA-2008-2554",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
},
{
"name" : "FEDORA-2008-2620",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
},
{
"name" : "28308",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28308"
},
{
"name" : "ADV-2008-0928",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0928"
}, },
{ {
"name": "1019628", "name": "1019628",
@ -103,24 +83,44 @@
"url": "http://secunia.com/advisories/29426" "url": "http://secunia.com/advisories/29426"
}, },
{ {
"name" : "29470", "name": "http://www.asterisk.org/node/48466",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/29470" "url": "http://www.asterisk.org/node/48466"
}, },
{ {
"name" : "3763", "name": "FEDORA-2008-2554",
"refsource" : "SREASON", "refsource": "FEDORA",
"url" : "http://securityreason.com/securityalert/3763" "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
}, },
{ {
"name" : "asterisk-rtp-codecpayload-bo(41305)", "name": "20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305" "url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded"
},
{
"name": "ADV-2008-0928",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0928"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2008-002.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2008-002.html"
},
{
"name": "FEDORA-2008-2620",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
}, },
{ {
"name": "asterisk-rtppayload-bo(41302)", "name": "asterisk-rtppayload-bo(41302)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302"
},
{
"name": "29470",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29470"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "3754",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3754"
},
{ {
"name": "20080313 PR08-02: Plone CMS Security Research - the Art of Plowning", "name": "20080313 PR08-02: Plone CMS Security Research - the Art of Plowning",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/489544/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/489544/100/0/threaded"
}, },
{
"name" : "http://www.procheckup.com/Hacking_Plone_CMS.pdf",
"refsource" : "MISC",
"url" : "http://www.procheckup.com/Hacking_Plone_CMS.pdf"
},
{ {
"name": "http://plone.org/about/security/overview/security-overview-of-plone/", "name": "http://plone.org/about/security/overview/security-overview-of-plone/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://plone.org/about/security/overview/security-overview-of-plone/" "url": "http://plone.org/about/security/overview/security-overview-of-plone/"
}, },
{ {
"name" : "3754", "name": "http://www.procheckup.com/Hacking_Plone_CMS.pdf",
"refsource" : "SREASON", "refsource": "MISC",
"url" : "http://securityreason.com/securityalert/3754" "url": "http://www.procheckup.com/Hacking_Plone_CMS.pdf"
}, },
{ {
"name": "plone-accookie-mitm(41425)", "name": "plone-accookie-mitm(41425)",

View File

@ -52,26 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "6332",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6332"
},
{ {
"name": "30944", "name": "30944",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/30944" "url": "http://www.securityfocus.com/bid/30944"
}, },
{ {
"name" : "31661", "name": "6332",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/31661" "url": "https://www.exploit-db.com/exploits/6332"
}, },
{ {
"name": "4251", "name": "4251",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4251" "url": "http://securityreason.com/securityalert/4251"
}, },
{
"name": "31661",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31661"
},
{ {
"name": "brim-index-sql-injection(44789)", "name": "brim-index-sql-injection(44789)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "6233",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6233"
},
{
"name" : "30658",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30658"
},
{ {
"name": "4351", "name": "4351",
"refsource": "SREASON", "refsource": "SREASON",
@ -71,6 +61,16 @@
"name": "bblog-builtinhelp-sql-injection(44406)", "name": "bblog-builtinhelp-sql-injection(44406)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44406" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44406"
},
{
"name": "30658",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30658"
},
{
"name": "6233",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6233"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://drupal.org/node/321758",
"refsource" : "CONFIRM",
"url" : "http://drupal.org/node/321758"
},
{ {
"name": "32285", "name": "32285",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -66,6 +61,11 @@
"name": "shindigintegrator-unspecified-xss(45925)", "name": "shindigintegrator-unspecified-xss(45925)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45925" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45925"
},
{
"name": "http://drupal.org/node/321758",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/321758"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080204 [DSECRG-08-008] Textpattern 4.0.5 Multiple Security Vulnerabilities", "name": "28793",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/487483/100/200/threaded" "url": "http://secunia.com/advisories/28793"
}, },
{ {
"name": "27606", "name": "27606",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/27606" "url": "http://www.securityfocus.com/bid/27606"
}, },
{ {
"name" : "28793", "name": "20080204 [DSECRG-08-008] Textpattern 4.0.5 Multiple Security Vulnerabilities",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/28793" "url": "http://www.securityfocus.com/archive/1/487483/100/200/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2173", "ID": "CVE-2013-2173",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,31 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20130613 Re: WordPress 3.5.1, Denial of Service",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-06/0052.html"
},
{
"name" : "[oss-security] 20130612 Re: CVE request: WordPress 3.5.1 denial of service vulnerability",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2013/06/12/2"
},
{
"name" : "https://github.com/wpscanteam/wpscan/issues/219",
"refsource" : "MISC",
"url" : "https://github.com/wpscanteam/wpscan/issues/219"
},
{ {
"name": "https://vndh.net/note:wordpress-351-denial-service", "name": "https://vndh.net/note:wordpress-351-denial-service",
"refsource": "MISC", "refsource": "MISC",
"url": "https://vndh.net/note:wordpress-351-denial-service" "url": "https://vndh.net/note:wordpress-351-denial-service"
}, },
{
"name" : "http://codex.wordpress.org/Version_3.5.2",
"refsource" : "CONFIRM",
"url" : "http://codex.wordpress.org/Version_3.5.2"
},
{ {
"name": "http://wordpress.org/news/2013/06/wordpress-3-5-2/", "name": "http://wordpress.org/news/2013/06/wordpress-3-5-2/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -86,6 +66,26 @@
"name": "DSA-2718", "name": "DSA-2718",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2718" "url": "http://www.debian.org/security/2013/dsa-2718"
},
{
"name": "[oss-security] 20130612 Re: CVE request: WordPress 3.5.1 denial of service vulnerability",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2013/06/12/2"
},
{
"name": "20130613 Re: WordPress 3.5.1, Denial of Service",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-06/0052.html"
},
{
"name": "http://codex.wordpress.org/Version_3.5.2",
"refsource": "CONFIRM",
"url": "http://codex.wordpress.org/Version_3.5.2"
},
{
"name": "https://github.com/wpscanteam/wpscan/issues/219",
"refsource": "MISC",
"url": "https://github.com/wpscanteam/wpscan/issues/219"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-3049", "ID": "CVE-2013-3049",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21651085",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21651085"
},
{
"name" : "IV37599",
"refsource" : "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV37599"
},
{ {
"name": "55068", "name": "55068",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -71,6 +61,16 @@
"name": "maximo-cve20133049-sec-bypass(84847)", "name": "maximo-cve20133049-sec-bypass(84847)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84847" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84847"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21651085",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21651085"
},
{
"name": "IV37599",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV37599"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-3999", "ID": "CVE-2013-3999",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-4046", "ID": "CVE-2013-4046",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ibm-spss-cve20134046-info-disc(86439)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86439"
},
{ {
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21660191", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21660191",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "PM95817", "name": "PM95817",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM95817" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM95817"
},
{
"name" : "ibm-spss-cve20134046-info-disc(86439)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/86439"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4163", "ID": "CVE-2013-4163",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,55 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "USN-1943-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1943-1"
},
{ {
"name": "[oss-security] 20130723 Re: CVE request: Linux kernel: panic while appending data to a corked IPv6 socket in ip6_append_data_mtu", "name": "[oss-security] 20130723 Re: CVE request: Linux kernel: panic while appending data to a corked IPv6 socket in ip6_append_data_mtu",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/07/23/10" "url": "http://www.openwall.com/lists/oss-security/2013/07/23/10"
}, },
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=987633",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=987633"
},
{
"name" : "https://github.com/torvalds/linux/commit/75a493e60ac4bbe2e977e7129d6d8cbb0dd236be",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/75a493e60ac4bbe2e977e7129d6d8cbb0dd236be"
},
{ {
"name": "SUSE-SU-2013:1473", "name": "SUSE-SU-2013:1473",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html"
}, },
{
"name" : "SUSE-SU-2013:1474",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html"
},
{ {
"name": "USN-1938-1", "name": "USN-1938-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1938-1" "url": "http://www.ubuntu.com/usn/USN-1938-1"
}, },
{ {
"name" : "USN-1941-1", "name": "61412",
"refsource" : "UBUNTU", "refsource": "BID",
"url" : "http://www.ubuntu.com/usn/USN-1941-1" "url": "http://www.securityfocus.com/bid/61412"
},
{
"name" : "USN-1942-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1942-1"
},
{
"name" : "USN-1943-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1943-1"
}, },
{ {
"name": "USN-1944-1", "name": "USN-1944-1",
@ -113,24 +88,49 @@
"url": "http://www.ubuntu.com/usn/USN-1945-1" "url": "http://www.ubuntu.com/usn/USN-1945-1"
}, },
{ {
"name" : "USN-1946-1", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/USN-1946-1" "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be"
},
{
"name": "SUSE-SU-2013:1474",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=987633",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=987633"
}, },
{ {
"name": "USN-1947-1", "name": "USN-1947-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1947-1" "url": "http://www.ubuntu.com/usn/USN-1947-1"
}, },
{
"name" : "61412",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/61412"
},
{ {
"name": "54148", "name": "54148",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54148" "url": "http://secunia.com/advisories/54148"
},
{
"name": "USN-1941-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1941-1"
},
{
"name": "USN-1942-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1942-1"
},
{
"name": "https://github.com/torvalds/linux/commit/75a493e60ac4bbe2e977e7129d6d8cbb0dd236be",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/75a493e60ac4bbe2e977e7129d6d8cbb0dd236be"
},
{
"name": "USN-1946-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1946-1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4558", "ID": "CVE-2013-4558",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1033431",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033431"
},
{ {
"name": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt", "name": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt" "url": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1033431", "name": "100363",
"refsource" : "CONFIRM", "refsource": "OSVDB",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1033431" "url": "http://osvdb.org/100363"
}, },
{ {
"name": "openSUSE-SU-2013:1836", "name": "openSUSE-SU-2013:1836",
@ -71,11 +76,6 @@
"name": "openSUSE-SU-2013:1860", "name": "openSUSE-SU-2013:1860",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html"
},
{
"name" : "100363",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/100363"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2013-6178", "ID": "CVE-2013-6178",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20131203 McAfee Email Gateway multiple vulns",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2013/Dec/18"
},
{ {
"name": "http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html" "url": "http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html"
}, },
{
"name": "100581",
"refsource": "OSVDB",
"url": "http://osvdb.org/100581"
},
{ {
"name": "64150", "name": "64150",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/64150" "url": "http://www.securityfocus.com/bid/64150"
}, },
{ {
"name" : "100581", "name": "20131203 McAfee Email Gateway multiple vulns",
"refsource" : "OSVDB", "refsource": "FULLDISC",
"url" : "http://osvdb.org/100581" "url": "http://seclists.org/fulldisclosure/2013/Dec/18"
}, },
{ {
"name": "mcafee-gateway-cve20137103-command-exec(90162)", "name": "mcafee-gateway-cve20137103-command-exec(90162)",

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/fatfreecrm/fat_free_crm/commit/a7fedbb36388bad0c0f32b2346481e0ea126dea6",
"refsource": "CONFIRM",
"url": "https://github.com/fatfreecrm/fat_free_crm/commit/a7fedbb36388bad0c0f32b2346481e0ea126dea6"
},
{ {
"name": "20131224 Happy Holidays / Xmas Advisory", "name": "20131224 Happy Holidays / Xmas Advisory",
"refsource": "FULLDISC", "refsource": "FULLDISC",
@ -67,11 +72,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.phenoelit.org/stuff/ffcrm.txt" "url": "http://www.phenoelit.org/stuff/ffcrm.txt"
}, },
{
"name" : "https://github.com/fatfreecrm/fat_free_crm/commit/a7fedbb36388bad0c0f32b2346481e0ea126dea6",
"refsource" : "CONFIRM",
"url" : "https://github.com/fatfreecrm/fat_free_crm/commit/a7fedbb36388bad0c0f32b2346481e0ea126dea6"
},
{ {
"name": "https://github.com/fatfreecrm/fat_free_crm/issues/300", "name": "https://github.com/fatfreecrm/fat_free_crm/issues/300",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{ {
"name": "https://security.netapp.com/advisory/ntap-20171019-0002/", "name": "https://security.netapp.com/advisory/ntap-20171019-0002/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -68,9 +63,19 @@
"url": "https://access.redhat.com/errata/RHSA-2017:3265" "url": "https://access.redhat.com/errata/RHSA-2017:3265"
}, },
{ {
"name" : "RHSA-2017:3442", "name": "RHSA-2018:0574",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:3442" "url": "https://access.redhat.com/errata/RHSA-2018:0574"
},
{
"name": "1039597",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039597"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
}, },
{ {
"name": "RHSA-2018:0279", "name": "RHSA-2018:0279",
@ -78,19 +83,14 @@
"url": "https://access.redhat.com/errata/RHSA-2018:0279" "url": "https://access.redhat.com/errata/RHSA-2018:0279"
}, },
{ {
"name" : "RHSA-2018:0574", "name": "RHSA-2017:3442",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0574" "url": "https://access.redhat.com/errata/RHSA-2017:3442"
}, },
{ {
"name": "101397", "name": "101397",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/101397" "url": "http://www.securityfocus.com/bid/101397"
},
{
"name" : "1039597",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039597"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{ {
"name": "101320", "name": "101320",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/101320" "url": "http://www.securityfocus.com/bid/101320"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-cma",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-cma"
},
{ {
"name": "101158", "name": "101158",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/101158" "url": "http://www.securityfocus.com/bid/101158"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-cma",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-cma"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.tcpdump.org/tcpdump-changes.txt", "name": "GLSA-201709-23",
"refsource" : "CONFIRM", "refsource": "GENTOO",
"url" : "http://www.tcpdump.org/tcpdump-changes.txt" "url": "https://security.gentoo.org/glsa/201709-23"
},
{
"name" : "https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38",
"refsource" : "CONFIRM",
"url" : "https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38"
}, },
{ {
"name": "https://support.apple.com/HT208221", "name": "https://support.apple.com/HT208221",
@ -73,19 +68,24 @@
"url": "http://www.debian.org/security/2017/dsa-3971" "url": "http://www.debian.org/security/2017/dsa-3971"
}, },
{ {
"name" : "GLSA-201709-23", "name": "https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201709-23" "url": "https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38"
},
{
"name" : "RHEA-2018:0705",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHEA-2018:0705"
}, },
{ {
"name": "1039307", "name": "1039307",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039307" "url": "http://www.securitytracker.com/id/1039307"
},
{
"name": "http://www.tcpdump.org/tcpdump-changes.txt",
"refsource": "CONFIRM",
"url": "http://www.tcpdump.org/tcpdump-changes.txt"
},
{
"name": "RHEA-2018:0705",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHEA-2018:0705"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-01-02T00:00:00", "DATE_PUBLIC": "2018-01-02T00:00:00",
"ID": "CVE-2017-13193", "ID": "CVE-2017-13193",
"STATE": "PUBLIC" "STATE": "PUBLIC"
@ -79,15 +79,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2018-01-01" "url": "https://source.android.com/security/bulletin/2018-01-01"
}, },
{
"name" : "102414",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102414"
},
{ {
"name": "1040106", "name": "1040106",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040106" "url": "http://www.securitytracker.com/id/1040106"
},
{
"name": "102414",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102414"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-01-02T00:00:00", "DATE_PUBLIC": "2018-01-02T00:00:00",
"ID": "CVE-2017-13226", "ID": "CVE-2017-13226",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html",
"refsource": "MISC",
"url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html"
},
{ {
"name": "https://bugs.debian.org/883528#35", "name": "https://bugs.debian.org/883528#35",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugs.debian.org/883528#35" "url": "https://bugs.debian.org/883528#35"
}, },
{
"name" : "https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e",
"refsource" : "MISC",
"url" : "https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e"
},
{
"name" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html",
"refsource" : "MISC",
"url" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html"
},
{ {
"name": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html", "name": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html",
"refsource": "MISC", "refsource": "MISC",
"url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html" "url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html"
}, },
{ {
"name" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html", "name": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html" "url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html"
},
{
"name" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html",
"refsource" : "MISC",
"url" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html"
},
{
"name" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html",
"refsource" : "MISC",
"url" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html"
}, },
{ {
"name": "102116", "name": "102116",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102116" "url": "http://www.securityfocus.com/bid/102116"
},
{
"name": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html",
"refsource": "MISC",
"url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html"
},
{
"name": "https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e",
"refsource": "MISC",
"url": "https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e"
},
{
"name": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html",
"refsource": "MISC",
"url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html"
} }
] ]
} }

View File

@ -85,6 +85,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "SUSE-SU-2017:2040",
"refsource": "SUSE",
"url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html"
},
{ {
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1045735", "name": "https://bugzilla.suse.com/show_bug.cgi?id=1045735",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -94,11 +99,6 @@
"name": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/", "name": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/" "url": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/"
},
{
"name" : "SUSE-SU-2017:2040",
"refsource" : "SUSE",
"url" : "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html"
} }
] ]
}, },

View File

@ -54,9 +54,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0846", "name": "1040380",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0846" "url": "http://www.securitytracker.com/id/1040380"
}, },
{ {
"name": "102931", "name": "102931",
@ -64,9 +64,9 @@
"url": "http://www.securityfocus.com/bid/102931" "url": "http://www.securityfocus.com/bid/102931"
}, },
{ {
"name" : "1040380", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0846",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1040380" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0846"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://github.com/Yoast/wordpress-seo/pull/11502/commits/3bfa70a143f5ea3ee1934f3a1703bb5caf139ffa", "name": "https://www.youtube.com/watch?v=nL141dcDGCY",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://github.com/Yoast/wordpress-seo/pull/11502/commits/3bfa70a143f5ea3ee1934f3a1703bb5caf139ffa" "url": "https://www.youtube.com/watch?v=nL141dcDGCY"
}, },
{ {
"name": "https://wordpress.org/plugins/wordpress-seo/#developers", "name": "https://wordpress.org/plugins/wordpress-seo/#developers",
@ -63,9 +63,9 @@
"url": "https://wordpress.org/plugins/wordpress-seo/#developers" "url": "https://wordpress.org/plugins/wordpress-seo/#developers"
}, },
{ {
"name" : "https://www.youtube.com/watch?v=nL141dcDGCY", "name": "https://github.com/Yoast/wordpress-seo/pull/11502/commits/3bfa70a143f5ea3ee1934f3a1703bb5caf139ffa",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://www.youtube.com/watch?v=nL141dcDGCY" "url": "https://github.com/Yoast/wordpress-seo/pull/11502/commits/3bfa70a143f5ea3ee1934f3a1703bb5caf139ffa"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-19737", "ID": "CVE-2018-19737",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-19744", "ID": "CVE-2018-19744",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,25 +53,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "103549",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103549"
},
{ {
"name": "44581", "name": "44581",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44581/" "url": "https://www.exploit-db.com/exploits/44581/"
}, },
{
"name" : "https://blog.xpnsec.com/total-meltdown-cve-2018-1038/",
"refsource" : "MISC",
"url" : "https://blog.xpnsec.com/total-meltdown-cve-2018-1038/"
},
{ {
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1038", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1038",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1038" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1038"
}, },
{ {
"name" : "103549", "name": "https://blog.xpnsec.com/total-meltdown-cve-2018-1038/",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/103549" "url": "https://blog.xpnsec.com/total-meltdown-cve-2018-1038/"
}, },
{ {
"name": "1040632", "name": "1040632",

View File

@ -77,6 +77,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "ibm-jazz-cve20181363-xss(137448)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/137448"
},
{ {
"name": "http://www.ibm.com/support/docview.wss?uid=swg22015712", "name": "http://www.ibm.com/support/docview.wss?uid=swg22015712",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -86,11 +91,6 @@
"name": "104014", "name": "104014",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/104014" "url": "http://www.securityfocus.com/bid/104014"
},
{
"name" : "ibm-jazz-cve20181363-xss(137448)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/137448"
} }
] ]
} }

View File

@ -89,15 +89,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10719659",
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10719659"
},
{ {
"name": "ibm-spectrum-cve20181702-xxe(146189)", "name": "ibm-spectrum-cve20181702-xxe(146189)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/146189" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/146189"
},
{
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10719659",
"refsource": "CONFIRM",
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10719659"
} }
] ]
} }