"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:51:47 +00:00
parent fa4c4381c3
commit 269d145fc6
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3477 additions and 3477 deletions

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20020712 Three BadBlue Vulnerabilities", "name": "badblue-null-file-disclosure(9557)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-07/0143.html" "url": "http://www.iss.net/security_center/static/9557.php"
}, },
{ {
"name": "5226", "name": "5226",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/5226" "url": "http://www.securityfocus.com/bid/5226"
}, },
{ {
"name" : "badblue-null-file-disclosure(9557)", "name": "20020712 Three BadBlue Vulnerabilities",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "http://www.iss.net/security_center/static/9557.php" "url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0143.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml"
},
{ {
"name": "cisco-ons-plaintext-accounts(10506)", "name": "cisco-ons-plaintext-accounts(10506)",
"refsource": "XF", "refsource": "XF",
@ -66,6 +61,11 @@
"name": "6078", "name": "6078",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/6078" "url": "http://www.securityfocus.com/bid/6078"
},
{
"name": "20021031 Cisco ONS15454 and Cisco ONS15327 Vulnerabilities",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/ons-multiple-vuln-pub.shtml"
} }
] ]
} }

View File

@ -53,44 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20030527 CORE-2003-0403: Axis Network Camera HTTP Authentication Bypass", "name": "1006854",
"refsource" : "BUGTRAQ", "refsource": "SECTRACK",
"url" : "http://marc.info/?l=bugtraq&m=105406374731579&w=2" "url": "http://securitytracker.com/id?1006854"
},
{
"name": "axis-admin-authentication-bypass(12104)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12104"
}, },
{ {
"name": "http://www.coresecurity.com/common/showdoc.php?idx=329&idxseccion=10", "name": "http://www.coresecurity.com/common/showdoc.php?idx=329&idxseccion=10",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.coresecurity.com/common/showdoc.php?idx=329&idxseccion=10" "url": "http://www.coresecurity.com/common/showdoc.php?idx=329&idxseccion=10"
}, },
{
"name" : "VU#799060",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/799060"
},
{ {
"name": "7652", "name": "7652",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/7652" "url": "http://www.securityfocus.com/bid/7652"
}, },
{
"name": "20030527 CORE-2003-0403: Axis Network Camera HTTP Authentication Bypass",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=105406374731579&w=2"
},
{
"name": "VU#799060",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/799060"
},
{ {
"name": "4804", "name": "4804",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/4804" "url": "http://www.osvdb.org/4804"
}, },
{
"name" : "1006854",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1006854"
},
{ {
"name": "8876", "name": "8876",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/8876" "url": "http://secunia.com/advisories/8876"
},
{
"name" : "axis-admin-authentication-bypass(12104)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/12104"
} }
] ]
} }

View File

@ -52,31 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "RHSA-2003:198",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2003-198.html"
},
{ {
"name": "RHSA-2003:238", "name": "RHSA-2003:238",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2003-238.html" "url": "http://www.redhat.com/support/errata/RHSA-2003-238.html"
}, },
{
"name" : "DSA-358",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-358"
},
{ {
"name": "DSA-423", "name": "DSA-423",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-423" "url": "http://www.debian.org/security/2004/dsa-423"
}, },
{
"name": "RHSA-2003:198",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2003-198.html"
},
{ {
"name": "RHSA-2003:239", "name": "RHSA-2003:239",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2003-239.html" "url": "http://www.redhat.com/support/errata/RHSA-2003-239.html"
}, },
{
"name": "DSA-358",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-358"
},
{ {
"name": "oval:org.mitre.oval:def:384", "name": "oval:org.mitre.oval:def:384",
"refsource": "OVAL", "refsource": "OVAL",

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS03-038", "name": "8536",
"refsource" : "MS", "refsource": "BID",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-038" "url": "http://www.securityfocus.com/bid/8536"
}, },
{ {
"name": "VU#992132", "name": "VU#992132",
@ -63,9 +63,9 @@
"url": "http://www.kb.cert.org/vuls/id/992132" "url": "http://www.kb.cert.org/vuls/id/992132"
}, },
{ {
"name" : "8536", "name": "MS03-038",
"refsource" : "BID", "refsource": "MS",
"url" : "http://www.securityfocus.com/bid/8536" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-038"
}, },
{ {
"name": "9668", "name": "9668",

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20030509 ttcms and ttforum exploits", "name": "ttcms-profile-sql-injection(12273)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/321000" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12273"
},
{
"name" : "7543",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/7543"
}, },
{ {
"name": "3278", "name": "3278",
@ -68,9 +63,14 @@
"url": "http://securityreason.com/securityalert/3278" "url": "http://securityreason.com/securityalert/3278"
}, },
{ {
"name" : "ttcms-profile-sql-injection(12273)", "name": "7543",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/12273" "url": "http://www.securityfocus.com/bid/7543"
},
{
"name": "20030509 ttcms and ttforum exploits",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/321000"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[linux-kernel] 20040219 Re: Oopsing cryptoapi (or loop device?) on 2.6.*",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=linux-kernel&m=107719798631935&w=2"
},
{ {
"name": "http://mareichelt.de/pub/notmine/diskenc.pdf", "name": "http://mareichelt.de/pub/notmine/diskenc.pdf",
"refsource": "MISC", "refsource": "MISC",
"url": "http://mareichelt.de/pub/notmine/diskenc.pdf" "url": "http://mareichelt.de/pub/notmine/diskenc.pdf"
}, },
{
"name": "13775",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/13775"
},
{ {
"name": "http://www.securiteam.com/exploits/5UP0P1PFPM.html", "name": "http://www.securiteam.com/exploits/5UP0P1PFPM.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.securiteam.com/exploits/5UP0P1PFPM.html" "url": "http://www.securiteam.com/exploits/5UP0P1PFPM.html"
}, },
{ {
"name" : "13775", "name": "[linux-kernel] 20040219 Re: Oopsing cryptoapi (or loop device?) on 2.6.*",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/13775" "url": "http://marc.info/?l=linux-kernel&m=107719798631935&w=2"
} }
] ]
} }

View File

@ -62,11 +62,6 @@
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/5991" "url": "http://www.osvdb.org/5991"
}, },
{
"name" : "1010094",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1010094"
},
{ {
"name": "11573", "name": "11573",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -76,6 +71,11 @@
"name": "effingerd-sockfingerdataarrival-bo(16097)", "name": "effingerd-sockfingerdataarrival-bo(16097)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16097" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16097"
},
{
"name": "1010094",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1010094"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=227554",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=227554"
},
{
"name" : "10017",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/10017"
},
{ {
"name": "11255", "name": "11255",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -71,6 +61,16 @@
"name": "quoteengine-sql-injection(15685)", "name": "quoteengine-sql-injection(15685)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15685" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15685"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=227554",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=227554"
},
{
"name": "10017",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10017"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2012-0004", "ID": "CVE-2012-0004",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "MS12-004", "name": "oval:org.mitre.oval:def:14832",
"refsource" : "MS", "refsource": "OVAL",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-004" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14832"
}, },
{ {
"name": "TA12-010A", "name": "TA12-010A",
@ -63,24 +63,24 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA12-010A.html"
}, },
{ {
"name" : "51295", "name": "MS12-004",
"refsource" : "BID", "refsource": "MS",
"url" : "http://www.securityfocus.com/bid/51295" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-004"
},
{
"name" : "oval:org.mitre.oval:def:14832",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14832"
},
{
"name" : "1026492",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1026492"
}, },
{ {
"name": "47485", "name": "47485",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47485" "url": "http://secunia.com/advisories/47485"
},
{
"name": "51295",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/51295"
},
{
"name": "1026492",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026492"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-0102", "ID": "CVE-2012-0102",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,29 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "name": "mysql-serveruns2-dos(72521)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
},
{
"name" : "DSA-2429",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2429"
},
{
"name" : "GLSA-201308-06",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"name" : "SUSE-SU-2012:0984",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
}, },
{ {
"name": "USN-1397-1", "name": "USN-1397-1",
@ -92,15 +72,35 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53372" "url": "http://secunia.com/advisories/53372"
}, },
{
"name": "GLSA-201308-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{ {
"name": "48250", "name": "48250",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48250" "url": "http://secunia.com/advisories/48250"
}, },
{ {
"name" : "mysql-serveruns2-dos(72521)", "name": "SUSE-SU-2012:0984",
"refsource" : "XF", "refsource": "SUSE",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521" "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
},
{
"name": "DSA-2429",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2429"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2012-0123", "ID": "CVE-2012-0123",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "HPSBMU02746",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/521944"
},
{ {
"name": "SSRT100781", "name": "SSRT100781",
"refsource": "HP", "refsource": "HP",
@ -66,6 +61,11 @@
"name": "hp-dataprotector-code-execution(73947)", "name": "hp-dataprotector-code-execution(73947)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73947" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73947"
},
{
"name": "HPSBMU02746",
"refsource": "HP",
"url": "http://www.securityfocus.com/archive/1/521944"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2012-0137", "ID": "CVE-2012-0137",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS12-015",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-015"
},
{ {
"name": "TA12-045A", "name": "TA12-045A",
"refsource": "CERT", "refsource": "CERT",
@ -66,6 +61,11 @@
"name": "oval:org.mitre.oval:def:14602", "name": "oval:org.mitre.oval:def:14602",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14602" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14602"
},
{
"name": "MS12-015",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-015"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2012-0277", "ID": "CVE-2012-0277",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/19336" "url": "http://www.exploit-db.com/exploits/19336"
}, },
{
"name" : "http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=50",
"refsource" : "MISC",
"url" : "http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=50"
},
{ {
"name": "http://newsgroup.xnview.com/viewtopic.php?f=35&t=25858", "name": "http://newsgroup.xnview.com/viewtopic.php?f=35&t=25858",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "48666", "name": "48666",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48666" "url": "http://secunia.com/advisories/48666"
},
{
"name": "http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=50",
"refsource": "MISC",
"url": "http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=50"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS12-082",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-082"
},
{ {
"name": "TA12-346A", "name": "TA12-346A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA12-346A.html" "url": "http://www.us-cert.gov/cas/techalerts/TA12-346A.html"
}, },
{
"name": "MS12-082",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-082"
},
{ {
"name": "oval:org.mitre.oval:def:16086", "name": "oval:org.mitre.oval:def:16086",
"refsource": "OVAL", "refsource": "OVAL",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1564", "ID": "CVE-2012-1564",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20120227 Case YVS Image Gallery",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/02/27/7"
},
{
"name" : "[oss-security] 20120227 Re: Case YVS Image Gallery",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/02/27/27"
},
{ {
"name": "[oss-security] 20120319 Re: Case YVS Image Gallery", "name": "[oss-security] 20120319 Re: Case YVS Image Gallery",
"refsource": "MLIST", "refsource": "MLIST",
@ -71,6 +61,16 @@
"name": "yvsimagegallery-createalbum-xsss(79529)", "name": "yvsimagegallery-createalbum-xsss(79529)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79529" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79529"
},
{
"name": "[oss-security] 20120227 Case YVS Image Gallery",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/02/27/7"
},
{
"name": "[oss-security] 20120227 Re: Case YVS Image Gallery",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/02/27/27"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1652", "ID": "CVE-2012-1652",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/04/07/1"
},
{ {
"name": "http://drupal.org/node/1461318", "name": "http://drupal.org/node/1461318",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,6 +62,21 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://drupal.org/node/1461724" "url": "http://drupal.org/node/1461724"
}, },
{
"name": "48235",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48235"
},
{
"name": "79683",
"refsource": "OSVDB",
"url": "http://osvdb.org/79683"
},
{
"name": "[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/07/1"
},
{ {
"name": "http://drupalcode.org/project/hierarchical_select.git/commit/be32dceb17d25553e474c295a8c3db69eab95cee", "name": "http://drupalcode.org/project/hierarchical_select.git/commit/be32dceb17d25553e474c295a8c3db69eab95cee",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -77,16 +87,6 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/52228" "url": "http://www.securityfocus.com/bid/52228"
}, },
{
"name" : "79683",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/79683"
},
{
"name" : "48235",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48235"
},
{ {
"name": "hierarchicalselect-textvocabularies-xss(73611)", "name": "hierarchicalselect-textvocabularies-xss(73611)",
"refsource": "XF", "refsource": "XF",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-5087", "ID": "CVE-2012-5087",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "name": "SUSE-SU-2012:1398",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html"
}, },
{ {
"name": "GLSA-201406-32", "name": "GLSA-201406-32",
@ -63,64 +63,29 @@
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
}, },
{ {
"name" : "HPSBUX02832", "name": "RHSA-2012:1386",
"refsource" : "HP", "refsource": "REDHAT",
"url" : "http://marc.info/?l=bugtraq&m=135542848327757&w=2" "url": "http://rhn.redhat.com/errata/RHSA-2012-1386.html"
},
{
"name" : "SSRT101042",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
},
{
"name" : "HPSBOV02833",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
}, },
{ {
"name": "SSRT101043", "name": "SSRT101043",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=135758563611658&w=2" "url": "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
}, },
{
"name" : "RHSA-2012:1386",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1386.html"
},
{ {
"name": "RHSA-2012:1391", "name": "RHSA-2012:1391",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1391.html" "url": "http://rhn.redhat.com/errata/RHSA-2012-1391.html"
}, },
{
"name" : "RHSA-2012:1467",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1467.html"
},
{
"name" : "SUSE-SU-2012:1398",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html"
},
{
"name" : "56043",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/56043"
},
{
"name" : "oval:org.mitre.oval:def:16560",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16560"
},
{ {
"name": "51029", "name": "51029",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51029" "url": "http://secunia.com/advisories/51029"
}, },
{ {
"name" : "51326", "name": "HPSBOV02833",
"refsource" : "SECUNIA", "refsource": "HP",
"url" : "http://secunia.com/advisories/51326" "url": "http://marc.info/?l=bugtraq&m=135758563611658&w=2"
}, },
{ {
"name": "51390", "name": "51390",
@ -131,6 +96,41 @@
"name": "javaruntimeenvironment-beans-cve20125087(79415)", "name": "javaruntimeenvironment-beans-cve20125087(79415)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79415" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79415"
},
{
"name": "oval:org.mitre.oval:def:16560",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16560"
},
{
"name": "RHSA-2012:1467",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1467.html"
},
{
"name": "SSRT101042",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html"
},
{
"name": "51326",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51326"
},
{
"name": "56043",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56043"
},
{
"name": "HPSBUX02832",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=135542848327757&w=2"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2012-5264", "ID": "CVE-2012-5264",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb12-22.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb12-22.html"
},
{ {
"name": "openSUSE-SU-2013:0370", "name": "openSUSE-SU-2013:0370",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html"
}, },
{
"name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html"
},
{ {
"name": "86041", "name": "86041",
"refsource": "OSVDB", "refsource": "OSVDB",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-5574", "ID": "CVE-2012-5574",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,56 +52,46 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20121126 Re: CVE Request -- Symfony (php-symfony-symfony) < 1.4.20: Ability to read arbitrary files on the server, readable with the web server privileges",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/11/26/12"
},
{
"name" : "https://bugs.gentoo.org/show_bug.cgi?id=444696",
"refsource" : "MISC",
"url" : "https://bugs.gentoo.org/show_bug.cgi?id=444696"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=880240", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=880240",
"refsource": "MISC", "refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=880240" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880240"
}, },
{
"name" : "http://symfony.com/blog/security-release-symfony-1-4-20-released",
"refsource" : "CONFIRM",
"url" : "http://symfony.com/blog/security-release-symfony-1-4-20-released"
},
{
"name" : "http://trac.symfony-project.org/changeset/33598",
"refsource" : "CONFIRM",
"url" : "http://trac.symfony-project.org/changeset/33598"
},
{
"name" : "FEDORA-2012-19076",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/093698.html"
},
{
"name" : "FEDORA-2012-19195",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/093922.html"
},
{ {
"name": "FEDORA-2012-19235", "name": "FEDORA-2012-19235",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/093920.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/093920.html"
}, },
{
"name": "FEDORA-2012-19076",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/093698.html"
},
{
"name": "http://symfony.com/blog/security-release-symfony-1-4-20-released",
"refsource": "CONFIRM",
"url": "http://symfony.com/blog/security-release-symfony-1-4-20-released"
},
{ {
"name": "56685", "name": "56685",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/56685" "url": "http://www.securityfocus.com/bid/56685"
}, },
{
"name": "https://bugs.gentoo.org/show_bug.cgi?id=444696",
"refsource": "MISC",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=444696"
},
{ {
"name": "87869", "name": "87869",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/87869" "url": "http://www.osvdb.org/87869"
}, },
{
"name": "FEDORA-2012-19195",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-December/093922.html"
},
{ {
"name": "51372", "name": "51372",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -111,6 +101,16 @@
"name": "symfony-unspecified-information-disclosure(80309)", "name": "symfony-unspecified-information-disclosure(80309)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80309" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80309"
},
{
"name": "[oss-security] 20121126 Re: CVE Request -- Symfony (php-symfony-symfony) < 1.4.20: Ability to read arbitrary files on the server, readable with the web server privileges",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/11/26/12"
},
{
"name": "http://trac.symfony-project.org/changeset/33598",
"refsource": "CONFIRM",
"url": "http://trac.symfony-project.org/changeset/33598"
} }
] ]
} }

View File

@ -54,19 +54,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-17-634/", "name": "1039088",
"refsource" : "MISC", "refsource": "SECTRACK",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-17-634/" "url": "http://www.securitytracker.com/id/1039088"
},
{
"name" : "https://blog.bjornweb.nl/2017/08/flash-remote-sandbox-escape-windows-user-credentials-leak/",
"refsource" : "MISC",
"url" : "https://blog.bjornweb.nl/2017/08/flash-remote-sandbox-escape-windows-user-credentials-leak/"
},
{
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb17-23.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb17-23.html"
}, },
{ {
"name": "GLSA-201709-16", "name": "GLSA-201709-16",
@ -78,15 +68,25 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2457" "url": "https://access.redhat.com/errata/RHSA-2017:2457"
}, },
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb17-23.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb17-23.html"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-17-634/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-17-634/"
},
{
"name": "https://blog.bjornweb.nl/2017/08/flash-remote-sandbox-escape-windows-user-credentials-leak/",
"refsource": "MISC",
"url": "https://blog.bjornweb.nl/2017/08/flash-remote-sandbox-escape-windows-user-credentials-leak/"
},
{ {
"name": "100191", "name": "100191",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/100191" "url": "http://www.securityfocus.com/bid/100191"
},
{
"name" : "1039088",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039088"
} }
] ]
} }

View File

@ -62,15 +62,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
}, },
{
"name" : "97885",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/97885"
},
{ {
"name": "1038301", "name": "1038301",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038301" "url": "http://www.securitytracker.com/id/1038301"
},
{
"name": "97885",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97885"
} }
] ]
} }

View File

@ -70,24 +70,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://erpscan.io/advisories/erpscan-17-026-xss-oracle-e-business-suite-jtffmprintserver/", "name": "97773",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://erpscan.io/advisories/erpscan-17-026-xss-oracle-e-business-suite-jtffmprintserver/" "url": "http://www.securityfocus.com/bid/97773"
}, },
{ {
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
}, },
{
"name" : "97773",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/97773"
},
{ {
"name": "1038299", "name": "1038299",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038299" "url": "http://www.securitytracker.com/id/1038299"
},
{
"name": "https://erpscan.io/advisories/erpscan-17-026-xss-oracle-e-business-suite-jtffmprintserver/",
"refsource": "MISC",
"url": "https://erpscan.io/advisories/erpscan-17-026-xss-oracle-e-business-suite-jtffmprintserver/"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin",
"refsource" : "MISC",
"url" : "https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin"
},
{ {
"name": "96783", "name": "96783",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/96783" "url": "http://www.securityfocus.com/bid/96783"
},
{
"name": "https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin",
"refsource": "MISC",
"url": "https://github.com/hamkovic/Mail-Masta-Wordpress-Plugin"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-usp2",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-usp2"
},
{ {
"name": "98963", "name": "98963",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/98963" "url": "http://www.securityfocus.com/bid/98963"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-usp2",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-usp2"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT207922", "name": "1038951",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT207922" "url": "http://www.securitytracker.com/id/1038951"
}, },
{ {
"name": "99882", "name": "99882",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/99882" "url": "http://www.securityfocus.com/bid/99882"
}, },
{ {
"name" : "1038951", "name": "https://support.apple.com/HT207922",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1038951" "url": "https://support.apple.com/HT207922"
} }
] ]
} }

View File

@ -52,45 +52,45 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/HT208112",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208112"
},
{
"name" : "https://support.apple.com/HT208113",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208113"
},
{
"name" : "https://support.apple.com/HT208116",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208116"
},
{ {
"name": "https://support.apple.com/HT208141", "name": "https://support.apple.com/HT208141",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT208141" "url": "https://support.apple.com/HT208141"
}, },
{
"name" : "https://support.apple.com/HT208142",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208142"
},
{
"name" : "100985",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/100985"
},
{ {
"name": "1039384", "name": "1039384",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039384" "url": "http://www.securitytracker.com/id/1039384"
}, },
{
"name": "100985",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100985"
},
{
"name": "https://support.apple.com/HT208142",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208142"
},
{
"name": "https://support.apple.com/HT208113",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208113"
},
{
"name": "https://support.apple.com/HT208112",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208112"
},
{ {
"name": "1039428", "name": "1039428",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039428" "url": "http://www.securitytracker.com/id/1039428"
},
{
"name": "https://support.apple.com/HT208116",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208116"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1478792",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1478792"
},
{ {
"name": "RHSA-2017:2674", "name": "RHSA-2017:2674",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -66,6 +61,11 @@
"name": "RHSA-2017:2675", "name": "RHSA-2017:2675",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2675" "url": "https://access.redhat.com/errata/RHSA-2017:2675"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1478792",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478792"
} }
] ]
} }

View File

@ -54,24 +54,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1346515", "name": "1039465",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1346515" "url": "http://www.securitytracker.com/id/1039465"
}, },
{ {
"name": "https://www.mozilla.org/security/advisories/mfsa2017-21/", "name": "https://www.mozilla.org/security/advisories/mfsa2017-21/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2017-21/" "url": "https://www.mozilla.org/security/advisories/mfsa2017-21/"
}, },
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1346515",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1346515"
},
{ {
"name": "101057", "name": "101057",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/101057" "url": "http://www.securityfocus.com/bid/101057"
},
{
"name" : "1039465",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039465"
} }
] ]
} }

View File

@ -57,16 +57,16 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://bugs.icu-project.org/trac/changeset/39671" "url": "http://bugs.icu-project.org/trac/changeset/39671"
}, },
{
"name" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=213",
"refsource" : "MISC",
"url" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=213"
},
{ {
"name": "DSA-3830", "name": "DSA-3830",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3830" "url": "http://www.debian.org/security/2017/dsa-3830"
}, },
{
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=213",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=213"
},
{ {
"name": "GLSA-201710-03", "name": "GLSA-201710-03",
"refsource": "GENTOO", "refsource": "GENTOO",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
"refsource" : "MISC",
"url" : "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
},
{ {
"name": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/AthletiCoin", "name": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/AthletiCoin",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/AthletiCoin" "url": "https://github.com/BlockChainsSecurity/EtherTokens/tree/master/AthletiCoin"
},
{
"name": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md",
"refsource": "MISC",
"url": "https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-17163", "ID": "CVE-2018-17163",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-17851", "ID": "CVE-2018-17851",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "USN-3860-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3860-2/"
},
{ {
"name": "[debian-lts-announce] 20190109 [SECURITY] [DLA 1631-1] libcaca security update", "name": "[debian-lts-announce] 20190109 [SECURITY] [DLA 1631-1] libcaca security update",
"refsource": "MLIST", "refsource": "MLIST",
@ -66,11 +71,6 @@
"name": "USN-3860-1", "name": "USN-3860-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3860-1/" "url": "https://usn.ubuntu.com/3860-1/"
},
{
"name" : "USN-3860-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3860-2/"
} }
] ]
} }