mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
8c1f84f967
commit
23ad40d237
@ -53,19 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://docs.info.apple.com/article.html?artnum=307562",
|
"name": "macos-applicationfirewall-weak-security(41317)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://docs.info.apple.com/article.html?artnum=307562"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41317"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2008-03-18",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "TA08-079A",
|
|
||||||
"refsource" : "CERT",
|
|
||||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "28304",
|
"name": "28304",
|
||||||
@ -73,29 +63,39 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/28304"
|
"url": "http://www.securityfocus.com/bid/28304"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "28368",
|
"name": "TA08-079A",
|
||||||
"refsource" : "BID",
|
"refsource": "CERT",
|
||||||
"url" : "http://www.securityfocus.com/bid/28368"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ADV-2008-0924",
|
"name": "ADV-2008-0924",
|
||||||
"refsource": "VUPEN",
|
"refsource": "VUPEN",
|
||||||
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
|
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "1019658",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1019658"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "29420",
|
"name": "29420",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/29420"
|
"url": "http://secunia.com/advisories/29420"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "macos-applicationfirewall-weak-security(41317)",
|
"name": "APPLE-SA-2008-03-18",
|
||||||
"refsource" : "XF",
|
"refsource": "APPLE",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41317"
|
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1019658",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1019658"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://docs.info.apple.com/article.html?artnum=307562",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://docs.info.apple.com/article.html?artnum=307562"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "28368",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/28368"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||||
"ID": "CVE-2008-0068",
|
"ID": "CVE-2008-0068",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,75 +52,75 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20080414 Secunia Research: HP OpenView Network Node Manager OpenView5.exeDirectory Traversal",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/490834/100/0/threaded"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "20080411 Directory traversal and multiple Denials of Service in HP OpenView NNM 7.53",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://www.securityfocus.com/archive/1/490771"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://aluigi.altervista.org/adv/closedviewx-adv.txt",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://aluigi.altervista.org/adv/closedviewx-adv.txt"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://secunia.com/secunia_research/2008-4/advisory/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://secunia.com/secunia_research/2008-4/advisory/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "HPSBMA02349",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=121553649611253&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SSRT080043",
|
|
||||||
"refsource" : "HP",
|
|
||||||
"url" : "http://marc.info/?l=bugtraq&m=121553649611253&w=2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "28745",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/28745"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-1214",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/1214/references"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "44359",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://www.osvdb.org/44359"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1019838",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id?1019838"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1019839",
|
"name": "1019839",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id?1019839"
|
"url": "http://www.securitytracker.com/id?1019839"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "hpopenview-openview5-directory-traversal(41790)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41790"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "29796",
|
"name": "29796",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/29796"
|
"url": "http://secunia.com/advisories/29796"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "20080414 Secunia Research: HP OpenView Network Node Manager OpenView5.exeDirectory Traversal",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/490834/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://secunia.com/secunia_research/2008-4/advisory/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://secunia.com/secunia_research/2008-4/advisory/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "3814",
|
"name": "3814",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/3814"
|
"url": "http://securityreason.com/securityalert/3814"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "hpopenview-openview5-directory-traversal(41790)",
|
"name": "28745",
|
||||||
"refsource" : "XF",
|
"refsource": "BID",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41790"
|
"url": "http://www.securityfocus.com/bid/28745"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SSRT080043",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=121553649611253&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "44359",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://www.osvdb.org/44359"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20080411 Directory traversal and multiple Denials of Service in HP OpenView NNM 7.53",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://www.securityfocus.com/archive/1/490771"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-1214",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/1214/references"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1019838",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id?1019838"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "HPSBMA02349",
|
||||||
|
"refsource": "HP",
|
||||||
|
"url": "http://marc.info/?l=bugtraq&m=121553649611253&w=2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://aluigi.altervista.org/adv/closedviewx-adv.txt",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "http://aluigi.altervista.org/adv/closedviewx-adv.txt"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://bugs.php.net/bug.php?id=41655",
|
"name": "ADV-2008-0059",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "VUPEN",
|
||||||
"url" : "http://bugs.php.net/bug.php?id=41655"
|
"url": "http://www.vupen.com/english/advisories/2008/0059"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.php.net/ChangeLog-4.php",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.php.net/ChangeLog-4.php"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.php.net/releases/4_4_8.php",
|
"name": "http://www.php.net/releases/4_4_8.php",
|
||||||
@ -72,20 +67,25 @@
|
|||||||
"refsource": "SLACKWARE",
|
"refsource": "SLACKWARE",
|
||||||
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136"
|
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "28318",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/28318"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "28936",
|
"name": "28936",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/28936"
|
"url": "http://secunia.com/advisories/28936"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "ADV-2008-0059",
|
"name": "http://bugs.php.net/bug.php?id=41655",
|
||||||
"refsource" : "VUPEN",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/0059"
|
"url": "http://bugs.php.net/bug.php?id=41655"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.php.net/ChangeLog-4.php",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.php.net/ChangeLog-4.php"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "28318",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/28318"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "php-glob-openbasedir-security-bypass(39401)",
|
"name": "php-glob-openbasedir-security-bypass(39401)",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "cert@cert.org",
|
||||||
"ID": "CVE-2008-0177",
|
"ID": "CVE-2008-0177",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -53,9 +53,19 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "5191",
|
"name": "28816",
|
||||||
"refsource" : "EXPLOIT-DB",
|
"refsource": "SECUNIA",
|
||||||
"url" : "https://www.exploit-db.com/exploits/5191"
|
"url": "http://secunia.com/advisories/28816"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-0688",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/0688"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-0441",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/0441"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/ipcomp_input.c?f=u&only_with_tag=netbsd-3-1",
|
"name": "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/ipcomp_input.c?f=u&only_with_tag=netbsd-3-1",
|
||||||
@ -63,19 +73,14 @@
|
|||||||
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/ipcomp_input.c?f=u&only_with_tag=netbsd-3-1"
|
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/ipcomp_input.c?f=u&only_with_tag=netbsd-3-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37",
|
"name": "27642",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "BID",
|
||||||
"url" : "http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37"
|
"url": "http://www.securityfocus.com/bid/27642"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "APPLE-SA-2008-05-28",
|
"name": "28788",
|
||||||
"refsource" : "APPLE",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html"
|
"url": "http://secunia.com/advisories/28788"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "APPLE-SA-2008-07-11",
|
|
||||||
"refsource" : "APPLE",
|
|
||||||
"url" : "http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "FreeBSD-SA-08:04",
|
"name": "FreeBSD-SA-08:04",
|
||||||
@ -88,69 +93,64 @@
|
|||||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html"
|
"url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#110947",
|
"name": "29130",
|
||||||
"refsource" : "CERT-VN",
|
|
||||||
"url" : "http://www.kb.cert.org/vuls/id/110947"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "27642",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/27642"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-0441",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/0441"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-0688",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/0688"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-1697",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/1697"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-2094",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/2094/references"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1019314",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://securitytracker.com/id?1019314"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "28788",
|
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://secunia.com/advisories/28788"
|
"url": "http://secunia.com/advisories/29130"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "28816",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/28816"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "28979",
|
"name": "28979",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/28979"
|
"url": "http://secunia.com/advisories/28979"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "29130",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29130"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "30430",
|
"name": "30430",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/30430"
|
"url": "http://secunia.com/advisories/30430"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2008-05-28",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "APPLE-SA-2008-07-11",
|
||||||
|
"refsource": "APPLE",
|
||||||
|
"url": "http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-2094",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/2094/references"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-1697",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/1697"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1019314",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://securitytracker.com/id?1019314"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "VU#110947",
|
||||||
|
"refsource": "CERT-VN",
|
||||||
|
"url": "http://www.kb.cert.org/vuls/id/110947"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "31074",
|
"name": "31074",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/31074"
|
"url": "http://secunia.com/advisories/31074"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "5191",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/5191"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,61 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://hg.moinmo.in/moin/1.5/rev/4ede07e792dd",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://hg.moinmo.in/moin/1.5/rev/4ede07e792dd"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://hg.moinmo.in/moin/1.5/rev/d0152eeb4499",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://hg.moinmo.in/moin/1.5/rev/d0152eeb4499"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://moinmo.in/SecurityFixes",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://moinmo.in/SecurityFixes"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "DSA-1514",
|
|
||||||
"refsource" : "DEBIAN",
|
|
||||||
"url" : "http://www.debian.org/security/2008/dsa-1514"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2008-3301",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00510.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2008-3328",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00538.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "GLSA-200803-27",
|
|
||||||
"refsource" : "GENTOO",
|
|
||||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-716-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "https://usn.ubuntu.com/716-1/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "28173",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/28173"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29262",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29262"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "29444",
|
|
||||||
"refsource" : "SECUNIA",
|
|
||||||
"url" : "http://secunia.com/advisories/29444"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "30031",
|
"name": "30031",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -117,10 +62,65 @@
|
|||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/33755"
|
"url": "http://secunia.com/advisories/33755"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "GLSA-200803-27",
|
||||||
|
"refsource": "GENTOO",
|
||||||
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-27.xml"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29262",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29262"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://moinmo.in/SecurityFixes",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://moinmo.in/SecurityFixes"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2008-3328",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00538.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2008-3301",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00510.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29444",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29444"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://hg.moinmo.in/moin/1.5/rev/d0152eeb4499",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://hg.moinmo.in/moin/1.5/rev/d0152eeb4499"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-716-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "https://usn.ubuntu.com/716-1/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "moinmoin-multiple-actions-xss(41037)",
|
"name": "moinmoin-multiple-actions-xss(41037)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41037"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41037"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "28173",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/28173"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "DSA-1514",
|
||||||
|
"refsource": "DEBIAN",
|
||||||
|
"url": "http://www.debian.org/security/2008/dsa-1514"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://hg.moinmo.in/moin/1.5/rev/4ede07e792dd",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://hg.moinmo.in/moin/1.5/rev/4ede07e792dd"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,14 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling",
|
"name": "28308",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "BID",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/489817/100/0/threaded"
|
"url": "http://www.securityfocus.com/bid/28308"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "3763",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/3763"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "http://labs.musecurity.com/advisories/MU-200803-01.txt",
|
"name": "http://labs.musecurity.com/advisories/MU-200803-01.txt",
|
||||||
@ -63,34 +68,9 @@
|
|||||||
"url": "http://labs.musecurity.com/advisories/MU-200803-01.txt"
|
"url": "http://labs.musecurity.com/advisories/MU-200803-01.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "http://downloads.digium.com/pub/security/AST-2008-002.html",
|
"name": "asterisk-rtp-codecpayload-bo(41305)",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "XF",
|
||||||
"url" : "http://downloads.digium.com/pub/security/AST-2008-002.html"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "http://www.asterisk.org/node/48466",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.asterisk.org/node/48466"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2008-2554",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "FEDORA-2008-2620",
|
|
||||||
"refsource" : "FEDORA",
|
|
||||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "28308",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/28308"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ADV-2008-0928",
|
|
||||||
"refsource" : "VUPEN",
|
|
||||||
"url" : "http://www.vupen.com/english/advisories/2008/0928"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1019628",
|
"name": "1019628",
|
||||||
@ -103,24 +83,44 @@
|
|||||||
"url": "http://secunia.com/advisories/29426"
|
"url": "http://secunia.com/advisories/29426"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "29470",
|
"name": "http://www.asterisk.org/node/48466",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://secunia.com/advisories/29470"
|
"url": "http://www.asterisk.org/node/48466"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3763",
|
"name": "FEDORA-2008-2554",
|
||||||
"refsource" : "SREASON",
|
"refsource": "FEDORA",
|
||||||
"url" : "http://securityreason.com/securityalert/3763"
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00438.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "asterisk-rtp-codecpayload-bo(41305)",
|
"name": "20080318 AST-2008-002: Two buffer overflows in RTP Codec Payload Handling",
|
||||||
"refsource" : "XF",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41305"
|
"url": "http://www.securityfocus.com/archive/1/489817/100/0/threaded"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ADV-2008-0928",
|
||||||
|
"refsource": "VUPEN",
|
||||||
|
"url": "http://www.vupen.com/english/advisories/2008/0928"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://downloads.digium.com/pub/security/AST-2008-002.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://downloads.digium.com/pub/security/AST-2008-002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "FEDORA-2008-2620",
|
||||||
|
"refsource": "FEDORA",
|
||||||
|
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00514.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "asterisk-rtppayload-bo(41302)",
|
"name": "asterisk-rtppayload-bo(41302)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41302"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "29470",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/29470"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "3754",
|
||||||
|
"refsource": "SREASON",
|
||||||
|
"url": "http://securityreason.com/securityalert/3754"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20080313 PR08-02: Plone CMS Security Research - the Art of Plowning",
|
"name": "20080313 PR08-02: Plone CMS Security Research - the Art of Plowning",
|
||||||
"refsource": "BUGTRAQ",
|
"refsource": "BUGTRAQ",
|
||||||
"url": "http://www.securityfocus.com/archive/1/489544/100/0/threaded"
|
"url": "http://www.securityfocus.com/archive/1/489544/100/0/threaded"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://www.procheckup.com/Hacking_Plone_CMS.pdf",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "http://www.procheckup.com/Hacking_Plone_CMS.pdf"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://plone.org/about/security/overview/security-overview-of-plone/",
|
"name": "http://plone.org/about/security/overview/security-overview-of-plone/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://plone.org/about/security/overview/security-overview-of-plone/"
|
"url": "http://plone.org/about/security/overview/security-overview-of-plone/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "3754",
|
"name": "http://www.procheckup.com/Hacking_Plone_CMS.pdf",
|
||||||
"refsource" : "SREASON",
|
"refsource": "MISC",
|
||||||
"url" : "http://securityreason.com/securityalert/3754"
|
"url": "http://www.procheckup.com/Hacking_Plone_CMS.pdf"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "plone-accookie-mitm(41425)",
|
"name": "plone-accookie-mitm(41425)",
|
||||||
|
@ -52,26 +52,26 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "6332",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/6332"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "30944",
|
"name": "30944",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/30944"
|
"url": "http://www.securityfocus.com/bid/30944"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "31661",
|
"name": "6332",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url" : "http://secunia.com/advisories/31661"
|
"url": "https://www.exploit-db.com/exploits/6332"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "4251",
|
"name": "4251",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
"url": "http://securityreason.com/securityalert/4251"
|
"url": "http://securityreason.com/securityalert/4251"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "31661",
|
||||||
|
"refsource": "SECUNIA",
|
||||||
|
"url": "http://secunia.com/advisories/31661"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "brim-index-sql-injection(44789)",
|
"name": "brim-index-sql-injection(44789)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
|
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "6233",
|
|
||||||
"refsource" : "EXPLOIT-DB",
|
|
||||||
"url" : "https://www.exploit-db.com/exploits/6233"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "30658",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/30658"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "4351",
|
"name": "4351",
|
||||||
"refsource": "SREASON",
|
"refsource": "SREASON",
|
||||||
@ -71,6 +61,16 @@
|
|||||||
"name": "bblog-builtinhelp-sql-injection(44406)",
|
"name": "bblog-builtinhelp-sql-injection(44406)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44406"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44406"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "30658",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/30658"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "6233",
|
||||||
|
"refsource": "EXPLOIT-DB",
|
||||||
|
"url": "https://www.exploit-db.com/exploits/6233"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://drupal.org/node/321758",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://drupal.org/node/321758"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "32285",
|
"name": "32285",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -66,6 +61,11 @@
|
|||||||
"name": "shindigintegrator-unspecified-xss(45925)",
|
"name": "shindigintegrator-unspecified-xss(45925)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45925"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45925"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://drupal.org/node/321758",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://drupal.org/node/321758"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "20080204 [DSECRG-08-008] Textpattern 4.0.5 Multiple Security Vulnerabilities",
|
"name": "28793",
|
||||||
"refsource" : "BUGTRAQ",
|
"refsource": "SECUNIA",
|
||||||
"url" : "http://www.securityfocus.com/archive/1/487483/100/200/threaded"
|
"url": "http://secunia.com/advisories/28793"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "27606",
|
"name": "27606",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/27606"
|
"url": "http://www.securityfocus.com/bid/27606"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "28793",
|
"name": "20080204 [DSECRG-08-008] Textpattern 4.0.5 Multiple Security Vulnerabilities",
|
||||||
"refsource" : "SECUNIA",
|
"refsource": "BUGTRAQ",
|
||||||
"url" : "http://secunia.com/advisories/28793"
|
"url": "http://www.securityfocus.com/archive/1/487483/100/200/threaded"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-2173",
|
"ID": "CVE-2013-2173",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,31 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20130613 Re: WordPress 3.5.1, Denial of Service",
|
|
||||||
"refsource" : "BUGTRAQ",
|
|
||||||
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-06/0052.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "[oss-security] 20130612 Re: CVE request: WordPress 3.5.1 denial of service vulnerability",
|
|
||||||
"refsource" : "MLIST",
|
|
||||||
"url" : "http://openwall.com/lists/oss-security/2013/06/12/2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/wpscanteam/wpscan/issues/219",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/wpscanteam/wpscan/issues/219"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://vndh.net/note:wordpress-351-denial-service",
|
"name": "https://vndh.net/note:wordpress-351-denial-service",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://vndh.net/note:wordpress-351-denial-service"
|
"url": "https://vndh.net/note:wordpress-351-denial-service"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://codex.wordpress.org/Version_3.5.2",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://codex.wordpress.org/Version_3.5.2"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://wordpress.org/news/2013/06/wordpress-3-5-2/",
|
"name": "http://wordpress.org/news/2013/06/wordpress-3-5-2/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -86,6 +66,26 @@
|
|||||||
"name": "DSA-2718",
|
"name": "DSA-2718",
|
||||||
"refsource": "DEBIAN",
|
"refsource": "DEBIAN",
|
||||||
"url": "http://www.debian.org/security/2013/dsa-2718"
|
"url": "http://www.debian.org/security/2013/dsa-2718"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "[oss-security] 20130612 Re: CVE request: WordPress 3.5.1 denial of service vulnerability",
|
||||||
|
"refsource": "MLIST",
|
||||||
|
"url": "http://openwall.com/lists/oss-security/2013/06/12/2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "20130613 Re: WordPress 3.5.1, Denial of Service",
|
||||||
|
"refsource": "BUGTRAQ",
|
||||||
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-06/0052.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://codex.wordpress.org/Version_3.5.2",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://codex.wordpress.org/Version_3.5.2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/wpscanteam/wpscan/issues/219",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://github.com/wpscanteam/wpscan/issues/219"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-3049",
|
"ID": "CVE-2013-3049",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,16 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21651085",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21651085"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "IV37599",
|
|
||||||
"refsource" : "AIXAPAR",
|
|
||||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV37599"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "55068",
|
"name": "55068",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
@ -71,6 +61,16 @@
|
|||||||
"name": "maximo-cve20133049-sec-bypass(84847)",
|
"name": "maximo-cve20133049-sec-bypass(84847)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84847"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84847"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21651085",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21651085"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "IV37599",
|
||||||
|
"refsource": "AIXAPAR",
|
||||||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV37599"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-3999",
|
"ID": "CVE-2013-3999",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"ID": "CVE-2013-4046",
|
"ID": "CVE-2013-4046",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "ibm-spss-cve20134046-info-disc(86439)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86439"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21660191",
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21660191",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -61,11 +66,6 @@
|
|||||||
"name": "PM95817",
|
"name": "PM95817",
|
||||||
"refsource": "AIXAPAR",
|
"refsource": "AIXAPAR",
|
||||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM95817"
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM95817"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ibm-spss-cve20134046-info-disc(86439)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/86439"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-4163",
|
"ID": "CVE-2013-4163",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,55 +52,30 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "USN-1943-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-1943-1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "[oss-security] 20130723 Re: CVE request: Linux kernel: panic while appending data to a corked IPv6 socket in ip6_append_data_mtu",
|
"name": "[oss-security] 20130723 Re: CVE request: Linux kernel: panic while appending data to a corked IPv6 socket in ip6_append_data_mtu",
|
||||||
"refsource": "MLIST",
|
"refsource": "MLIST",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2013/07/23/10"
|
"url": "http://www.openwall.com/lists/oss-security/2013/07/23/10"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=987633",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=987633"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/torvalds/linux/commit/75a493e60ac4bbe2e977e7129d6d8cbb0dd236be",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/torvalds/linux/commit/75a493e60ac4bbe2e977e7129d6d8cbb0dd236be"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "SUSE-SU-2013:1473",
|
"name": "SUSE-SU-2013:1473",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2013:1474",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "USN-1938-1",
|
"name": "USN-1938-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1938-1"
|
"url": "http://www.ubuntu.com/usn/USN-1938-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-1941-1",
|
"name": "61412",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "BID",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1941-1"
|
"url": "http://www.securityfocus.com/bid/61412"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-1942-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1942-1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "USN-1943-1",
|
|
||||||
"refsource" : "UBUNTU",
|
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1943-1"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1944-1",
|
"name": "USN-1944-1",
|
||||||
@ -113,24 +88,49 @@
|
|||||||
"url": "http://www.ubuntu.com/usn/USN-1945-1"
|
"url": "http://www.ubuntu.com/usn/USN-1945-1"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "USN-1946-1",
|
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be",
|
||||||
"refsource" : "UBUNTU",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.ubuntu.com/usn/USN-1946-1"
|
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2013:1474",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=987633",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=987633"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "USN-1947-1",
|
"name": "USN-1947-1",
|
||||||
"refsource": "UBUNTU",
|
"refsource": "UBUNTU",
|
||||||
"url": "http://www.ubuntu.com/usn/USN-1947-1"
|
"url": "http://www.ubuntu.com/usn/USN-1947-1"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "61412",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/61412"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "54148",
|
"name": "54148",
|
||||||
"refsource": "SECUNIA",
|
"refsource": "SECUNIA",
|
||||||
"url": "http://secunia.com/advisories/54148"
|
"url": "http://secunia.com/advisories/54148"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-1941-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-1941-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-1942-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-1942-1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://github.com/torvalds/linux/commit/75a493e60ac4bbe2e977e7129d6d8cbb0dd236be",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/torvalds/linux/commit/75a493e60ac4bbe2e977e7129d6d8cbb0dd236be"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "USN-1946-1",
|
||||||
|
"refsource": "UBUNTU",
|
||||||
|
"url": "http://www.ubuntu.com/usn/USN-1946-1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
"ID": "CVE-2013-4558",
|
"ID": "CVE-2013-4558",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
@ -52,15 +52,20 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1033431",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033431"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt",
|
"name": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt"
|
"url": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1033431",
|
"name": "100363",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "OSVDB",
|
||||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1033431"
|
"url": "http://osvdb.org/100363"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "openSUSE-SU-2013:1836",
|
"name": "openSUSE-SU-2013:1836",
|
||||||
@ -71,11 +76,6 @@
|
|||||||
"name": "openSUSE-SU-2013:1860",
|
"name": "openSUSE-SU-2013:1860",
|
||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html"
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "100363",
|
|
||||||
"refsource" : "OSVDB",
|
|
||||||
"url" : "http://osvdb.org/100363"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER": "security_alert@emc.com",
|
||||||
"ID": "CVE-2013-6178",
|
"ID": "CVE-2013-6178",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -52,25 +52,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "20131203 McAfee Email Gateway multiple vulns",
|
|
||||||
"refsource" : "FULLDISC",
|
|
||||||
"url" : "http://seclists.org/fulldisclosure/2013/Dec/18"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html",
|
"name": "http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html"
|
"url": "http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-Execution-SQL-Injection.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "100581",
|
||||||
|
"refsource": "OSVDB",
|
||||||
|
"url": "http://osvdb.org/100581"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "64150",
|
"name": "64150",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/64150"
|
"url": "http://www.securityfocus.com/bid/64150"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "100581",
|
"name": "20131203 McAfee Email Gateway multiple vulns",
|
||||||
"refsource" : "OSVDB",
|
"refsource": "FULLDISC",
|
||||||
"url" : "http://osvdb.org/100581"
|
"url": "http://seclists.org/fulldisclosure/2013/Dec/18"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "mcafee-gateway-cve20137103-command-exec(90162)",
|
"name": "mcafee-gateway-cve20137103-command-exec(90162)",
|
||||||
|
@ -52,6 +52,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://github.com/fatfreecrm/fat_free_crm/commit/a7fedbb36388bad0c0f32b2346481e0ea126dea6",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://github.com/fatfreecrm/fat_free_crm/commit/a7fedbb36388bad0c0f32b2346481e0ea126dea6"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "20131224 Happy Holidays / Xmas Advisory",
|
"name": "20131224 Happy Holidays / Xmas Advisory",
|
||||||
"refsource": "FULLDISC",
|
"refsource": "FULLDISC",
|
||||||
@ -67,11 +72,6 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "http://www.phenoelit.org/stuff/ffcrm.txt"
|
"url": "http://www.phenoelit.org/stuff/ffcrm.txt"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://github.com/fatfreecrm/fat_free_crm/commit/a7fedbb36388bad0c0f32b2346481e0ea126dea6",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/fatfreecrm/fat_free_crm/commit/a7fedbb36388bad0c0f32b2346481e0ea126dea6"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://github.com/fatfreecrm/fat_free_crm/issues/300",
|
"name": "https://github.com/fatfreecrm/fat_free_crm/issues/300",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
|
@ -52,11 +52,6 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://security.netapp.com/advisory/ntap-20171019-0002/",
|
"name": "https://security.netapp.com/advisory/ntap-20171019-0002/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -68,9 +63,19 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2017:3265"
|
"url": "https://access.redhat.com/errata/RHSA-2017:3265"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2017:3442",
|
"name": "RHSA-2018:0574",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
|
"url": "https://access.redhat.com/errata/RHSA-2018:0574"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "1039597",
|
||||||
|
"refsource": "SECTRACK",
|
||||||
|
"url": "http://www.securitytracker.com/id/1039597"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "RHSA-2018:0279",
|
"name": "RHSA-2018:0279",
|
||||||
@ -78,19 +83,14 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2018:0279"
|
"url": "https://access.redhat.com/errata/RHSA-2018:0279"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "RHSA-2018:0574",
|
"name": "RHSA-2017:3442",
|
||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"url" : "https://access.redhat.com/errata/RHSA-2018:0574"
|
"url": "https://access.redhat.com/errata/RHSA-2017:3442"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "101397",
|
"name": "101397",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/101397"
|
"url": "http://www.securityfocus.com/bid/101397"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "1039597",
|
|
||||||
"refsource" : "SECTRACK",
|
|
||||||
"url" : "http://www.securitytracker.com/id/1039597"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -57,15 +57,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "101320",
|
"name": "101320",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/101320"
|
"url": "http://www.securityfocus.com/bid/101320"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -52,15 +52,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-cma",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-cma"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "101158",
|
"name": "101158",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/101158"
|
"url": "http://www.securityfocus.com/bid/101158"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-cma",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-cma"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,14 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "http://www.tcpdump.org/tcpdump-changes.txt",
|
"name": "GLSA-201709-23",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "GENTOO",
|
||||||
"url" : "http://www.tcpdump.org/tcpdump-changes.txt"
|
"url": "https://security.gentoo.org/glsa/201709-23"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://support.apple.com/HT208221",
|
"name": "https://support.apple.com/HT208221",
|
||||||
@ -73,19 +68,24 @@
|
|||||||
"url": "http://www.debian.org/security/2017/dsa-3971"
|
"url": "http://www.debian.org/security/2017/dsa-3971"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "GLSA-201709-23",
|
"name": "https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38",
|
||||||
"refsource" : "GENTOO",
|
"refsource": "CONFIRM",
|
||||||
"url" : "https://security.gentoo.org/glsa/201709-23"
|
"url": "https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "RHEA-2018:0705",
|
|
||||||
"refsource" : "REDHAT",
|
|
||||||
"url" : "https://access.redhat.com/errata/RHEA-2018:0705"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1039307",
|
"name": "1039307",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1039307"
|
"url": "http://www.securitytracker.com/id/1039307"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "http://www.tcpdump.org/tcpdump-changes.txt",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "http://www.tcpdump.org/tcpdump-changes.txt"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "RHEA-2018:0705",
|
||||||
|
"refsource": "REDHAT",
|
||||||
|
"url": "https://access.redhat.com/errata/RHEA-2018:0705"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"DATE_PUBLIC": "2018-01-02T00:00:00",
|
"DATE_PUBLIC": "2018-01-02T00:00:00",
|
||||||
"ID": "CVE-2017-13193",
|
"ID": "CVE-2017-13193",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
@ -79,15 +79,15 @@
|
|||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://source.android.com/security/bulletin/2018-01-01"
|
"url": "https://source.android.com/security/bulletin/2018-01-01"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "102414",
|
|
||||||
"refsource" : "BID",
|
|
||||||
"url" : "http://www.securityfocus.com/bid/102414"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "1040106",
|
"name": "1040106",
|
||||||
"refsource": "SECTRACK",
|
"refsource": "SECTRACK",
|
||||||
"url": "http://www.securitytracker.com/id/1040106"
|
"url": "http://www.securitytracker.com/id/1040106"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "102414",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/102414"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "security@google.com",
|
"ASSIGNER": "security@android.com",
|
||||||
"DATE_PUBLIC": "2018-01-02T00:00:00",
|
"DATE_PUBLIC": "2018-01-02T00:00:00",
|
||||||
"ID": "CVE-2017-13226",
|
"ID": "CVE-2017-13226",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
|
@ -52,45 +52,45 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugs.debian.org/883528#35",
|
"name": "https://bugs.debian.org/883528#35",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://bugs.debian.org/883528#35"
|
"url": "https://bugs.debian.org/883528#35"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html",
|
"name": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html"
|
"url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html",
|
"name": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html"
|
"url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "102116",
|
"name": "102116",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/102116"
|
"url": "http://www.securityfocus.com/bid/102116"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -85,6 +85,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "SUSE-SU-2017:2040",
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1045735",
|
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1045735",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -94,11 +99,6 @@
|
|||||||
"name": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/",
|
"name": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/"
|
"url": "https://www.suse.com/de-de/security/cve/CVE-2017-9269/"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "SUSE-SU-2017:2040",
|
|
||||||
"refsource" : "SUSE",
|
|
||||||
"url" : "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -54,9 +54,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0846",
|
"name": "1040380",
|
||||||
"refsource" : "CONFIRM",
|
"refsource": "SECTRACK",
|
||||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0846"
|
"url": "http://www.securitytracker.com/id/1040380"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "102931",
|
"name": "102931",
|
||||||
@ -64,9 +64,9 @@
|
|||||||
"url": "http://www.securityfocus.com/bid/102931"
|
"url": "http://www.securityfocus.com/bid/102931"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "1040380",
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0846",
|
||||||
"refsource" : "SECTRACK",
|
"refsource": "CONFIRM",
|
||||||
"url" : "http://www.securitytracker.com/id/1040380"
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0846"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -53,9 +53,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"name" : "https://github.com/Yoast/wordpress-seo/pull/11502/commits/3bfa70a143f5ea3ee1934f3a1703bb5caf139ffa",
|
"name": "https://www.youtube.com/watch?v=nL141dcDGCY",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "https://github.com/Yoast/wordpress-seo/pull/11502/commits/3bfa70a143f5ea3ee1934f3a1703bb5caf139ffa"
|
"url": "https://www.youtube.com/watch?v=nL141dcDGCY"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "https://wordpress.org/plugins/wordpress-seo/#developers",
|
"name": "https://wordpress.org/plugins/wordpress-seo/#developers",
|
||||||
@ -63,9 +63,9 @@
|
|||||||
"url": "https://wordpress.org/plugins/wordpress-seo/#developers"
|
"url": "https://wordpress.org/plugins/wordpress-seo/#developers"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://www.youtube.com/watch?v=nL141dcDGCY",
|
"name": "https://github.com/Yoast/wordpress-seo/pull/11502/commits/3bfa70a143f5ea3ee1934f3a1703bb5caf139ffa",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"url" : "https://www.youtube.com/watch?v=nL141dcDGCY"
|
"url": "https://github.com/Yoast/wordpress-seo/pull/11502/commits/3bfa70a143f5ea3ee1934f3a1703bb5caf139ffa"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2018-19737",
|
"ID": "CVE-2018-19737",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
{
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
|
||||||
"ID": "CVE-2018-19744",
|
"ID": "CVE-2018-19744",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "REJECT"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
|
@ -53,25 +53,25 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "103549",
|
||||||
|
"refsource": "BID",
|
||||||
|
"url": "http://www.securityfocus.com/bid/103549"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "44581",
|
"name": "44581",
|
||||||
"refsource": "EXPLOIT-DB",
|
"refsource": "EXPLOIT-DB",
|
||||||
"url": "https://www.exploit-db.com/exploits/44581/"
|
"url": "https://www.exploit-db.com/exploits/44581/"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name" : "https://blog.xpnsec.com/total-meltdown-cve-2018-1038/",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://blog.xpnsec.com/total-meltdown-cve-2018-1038/"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1038",
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1038",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1038"
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1038"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name" : "103549",
|
"name": "https://blog.xpnsec.com/total-meltdown-cve-2018-1038/",
|
||||||
"refsource" : "BID",
|
"refsource": "MISC",
|
||||||
"url" : "http://www.securityfocus.com/bid/103549"
|
"url": "https://blog.xpnsec.com/total-meltdown-cve-2018-1038/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "1040632",
|
"name": "1040632",
|
||||||
|
@ -77,6 +77,11 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"name": "ibm-jazz-cve20181363-xss(137448)",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/137448"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "http://www.ibm.com/support/docview.wss?uid=swg22015712",
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg22015712",
|
||||||
"refsource": "CONFIRM",
|
"refsource": "CONFIRM",
|
||||||
@ -86,11 +91,6 @@
|
|||||||
"name": "104014",
|
"name": "104014",
|
||||||
"refsource": "BID",
|
"refsource": "BID",
|
||||||
"url": "http://www.securityfocus.com/bid/104014"
|
"url": "http://www.securityfocus.com/bid/104014"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ibm-jazz-cve20181363-xss(137448)",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/137448"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -89,15 +89,15 @@
|
|||||||
},
|
},
|
||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
|
||||||
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10719659",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10719659"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "ibm-spectrum-cve20181702-xxe(146189)",
|
"name": "ibm-spectrum-cve20181702-xxe(146189)",
|
||||||
"refsource": "XF",
|
"refsource": "XF",
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/146189"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/146189"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10719659",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10719659"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user