"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 05:14:28 +00:00
parent 29d1c140c5
commit 26bd5a88b1
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
44 changed files with 2943 additions and 2943 deletions

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "simpleforum-forum-xss(39978)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39978"
},
{
"name": "28681",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28681"
},
{ {
"name": "4989", "name": "4989",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -61,16 +71,6 @@
"name": "27463", "name": "27463",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/27463" "url": "http://www.securityfocus.com/bid/27463"
},
{
"name" : "28681",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28681"
},
{
"name" : "simpleforum-forum-xss(39978)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39978"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "5059",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5059"
},
{ {
"name": "27609", "name": "27609",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "shambo2-index-sql-injection(40238)", "name": "shambo2-index-sql-injection(40238)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40238" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40238"
},
{
"name": "5059",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5059"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080212 Directory traversal and DoS in WinIPDS G52-33-021", "name": "27757",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/488015/100/0/threaded" "url": "http://www.securityfocus.com/bid/27757"
},
{
"name" : "20080313 Re: Directory traversal and DoS in WinIPDS G52-33-021",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/489499/100/0/threaded"
}, },
{ {
"name": "http://aluigi.altervista.org/adv/winipds-adv.txt", "name": "http://aluigi.altervista.org/adv/winipds-adv.txt",
@ -68,9 +63,14 @@
"url": "http://aluigi.altervista.org/adv/winipds-adv.txt" "url": "http://aluigi.altervista.org/adv/winipds-adv.txt"
}, },
{ {
"name" : "27757", "name": "3658",
"refsource" : "BID", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/bid/27757" "url": "http://securityreason.com/securityalert/3658"
},
{
"name": "20080212 Directory traversal and DoS in WinIPDS G52-33-021",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488015/100/0/threaded"
}, },
{ {
"name": "28934", "name": "28934",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/28934" "url": "http://secunia.com/advisories/28934"
}, },
{ {
"name" : "3658", "name": "20080313 Re: Directory traversal and DoS in WinIPDS G52-33-021",
"refsource" : "SREASON", "refsource": "BUGTRAQ",
"url" : "http://securityreason.com/securityalert/3658" "url": "http://www.securityfocus.com/archive/1/489499/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-1437", "ID": "CVE-2008-1437",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBST02336", "name": "30172",
"refsource" : "HP", "refsource": "SECUNIA",
"url" : "http://marc.info/?l=bugtraq&m=121129490723574&w=2" "url": "http://secunia.com/advisories/30172"
}, },
{ {
"name" : "SSRT080071", "name": "1020016",
"refsource" : "HP", "refsource": "SECTRACK",
"url" : "http://marc.info/?l=bugtraq&m=121129490723574&w=2" "url": "http://www.securitytracker.com/id?1020016"
},
{
"name" : "MS08-029",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029"
},
{
"name" : "TA08-134A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-134A.html"
}, },
{ {
"name": "29060", "name": "29060",
@ -88,14 +78,24 @@
"url": "http://www.vupen.com/english/advisories/2008/1506/references" "url": "http://www.vupen.com/english/advisories/2008/1506/references"
}, },
{ {
"name" : "1020016", "name": "SSRT080071",
"refsource" : "SECTRACK", "refsource": "HP",
"url" : "http://www.securitytracker.com/id?1020016" "url": "http://marc.info/?l=bugtraq&m=121129490723574&w=2"
}, },
{ {
"name" : "30172", "name": "TA08-134A",
"refsource" : "SECUNIA", "refsource": "CERT",
"url" : "http://secunia.com/advisories/30172" "url": "http://www.us-cert.gov/cas/techalerts/TA08-134A.html"
},
{
"name": "HPSBST02336",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=121129490723574&w=2"
},
{
"name": "MS08-029",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.03.10.html" "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.03.10.html"
}, },
{
"name" : "28110",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28110"
},
{ {
"name": "ADV-2008-0843", "name": "ADV-2008-0843",
"refsource": "VUPEN", "refsource": "VUPEN",
@ -72,15 +67,20 @@
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019569" "url": "http://www.securitytracker.com/id?1019569"
}, },
{
"name" : "29319",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29319"
},
{ {
"name": "symantec-altiris-aclient-priv-escalation(41100)", "name": "symantec-altiris-aclient-priv-escalation(41100)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41100" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41100"
},
{
"name": "28110",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28110"
},
{
"name": "29319",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29319"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-1675", "ID": "CVE-2008-1675",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,34 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080502 rPSA-2008-0157-1 kernel", "name": "ADV-2008-1406",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/491566/100/0/threaded" "url": "http://www.vupen.com/english/advisories/2008/1406/references"
},
{
"name" : "20080507 rPSA-2008-0157-1 kernel",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/491732/100/0/threaded"
},
{
"name" : "[linux-kernel] 20080429 [27/37] tehuti: move ioctl perm check closer to function start",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=linux-kernel&m=120949204619718&w=2"
},
{
"name" : "[linux-kernel] 20080429 [26/37] tehuti: check register size (CVE-2008-1675)",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=linux-kernel&m=120949204519706&w=2"
},
{
"name" : "[linux-kernel] 20080429 [04/12] tehuti: check register size (CVE-2008-1675)",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=linux-kernel&m=120949582428998&w=2"
},
{
"name" : "http://wiki.rpath.com/Advisories:rPSA-2008-0157",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/Advisories:rPSA-2008-0157"
}, },
{ {
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0157", "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0157",
@ -88,14 +63,9 @@
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0157" "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0157"
}, },
{ {
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.1", "name": "MDVSA-2008:167",
"refsource" : "CONFIRM", "refsource": "MANDRIVA",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.1" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:167"
},
{
"name" : "https://issues.rpath.com/browse/RPL-2501",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-2501"
}, },
{ {
"name": "FEDORA-2008-3873", "name": "FEDORA-2008-3873",
@ -103,14 +73,19 @@
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00232.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00232.html"
}, },
{ {
"name" : "MDVSA-2008:109", "name": "20080507 rPSA-2008-0157-1 kernel",
"refsource" : "MANDRIVA", "refsource": "BUGTRAQ",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:109" "url": "http://www.securityfocus.com/archive/1/491732/100/0/threaded"
}, },
{ {
"name" : "MDVSA-2008:167", "name": "30515",
"refsource" : "MANDRIVA", "refsource": "SECUNIA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:167" "url": "http://secunia.com/advisories/30515"
},
{
"name": "20080502 rPSA-2008-0157-1 kernel",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/491566/100/0/threaded"
}, },
{ {
"name": "USN-614-1", "name": "USN-614-1",
@ -118,14 +93,14 @@
"url": "https://usn.ubuntu.com/614-1/" "url": "https://usn.ubuntu.com/614-1/"
}, },
{ {
"name" : "29014", "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.1",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/29014" "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.1"
}, },
{ {
"name" : "ADV-2008-1406", "name": "30044",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2008/1406/references" "url": "http://secunia.com/advisories/30044"
}, },
{ {
"name": "1019960", "name": "1019960",
@ -138,9 +113,29 @@
"url": "http://secunia.com/advisories/30017" "url": "http://secunia.com/advisories/30017"
}, },
{ {
"name" : "30044", "name": "https://issues.rpath.com/browse/RPL-2501",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/30044" "url": "https://issues.rpath.com/browse/RPL-2501"
},
{
"name": "linux-kernel-tehuti-bo(42132)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42132"
},
{
"name": "[linux-kernel] 20080429 [27/37] tehuti: move ioctl perm check closer to function start",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel&m=120949204619718&w=2"
},
{
"name": "[linux-kernel] 20080429 [04/12] tehuti: check register size (CVE-2008-1675)",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel&m=120949582428998&w=2"
},
{
"name": "29014",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29014"
}, },
{ {
"name": "30260", "name": "30260",
@ -148,14 +143,19 @@
"url": "http://secunia.com/advisories/30260" "url": "http://secunia.com/advisories/30260"
}, },
{ {
"name" : "30515", "name": "[linux-kernel] 20080429 [26/37] tehuti: check register size (CVE-2008-1675)",
"refsource" : "SECUNIA", "refsource": "MLIST",
"url" : "http://secunia.com/advisories/30515" "url": "http://marc.info/?l=linux-kernel&m=120949204519706&w=2"
}, },
{ {
"name" : "linux-kernel-tehuti-bo(42132)", "name": "http://wiki.rpath.com/Advisories:rPSA-2008-0157",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42132" "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0157"
},
{
"name": "MDVSA-2008:109",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:109"
} }
] ]
} }

View File

@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080604 Skype File URI Security Bypass Code Execution Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=711"
},
{
"name" : "http://www.skype.com/security/skype-sb-2008-003.html",
"refsource" : "CONFIRM",
"url" : "http://www.skype.com/security/skype-sb-2008-003.html"
},
{
"name" : "29553",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29553"
},
{
"name" : "ADV-2008-1749",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1749/references"
},
{ {
"name": "1020201", "name": "1020201",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -81,6 +61,26 @@
"name": "30547", "name": "30547",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30547" "url": "http://secunia.com/advisories/30547"
},
{
"name": "ADV-2008-1749",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1749/references"
},
{
"name": "29553",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29553"
},
{
"name": "20080604 Skype File URI Security Bypass Code Execution Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=711"
},
{
"name": "http://www.skype.com/security/skype-sb-2008-003.html",
"refsource": "CONFIRM",
"url": "http://www.skype.com/security/skype-sb-2008-003.html"
} }
] ]
} }

View File

@ -57,80 +57,80 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499154/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/499154/100/0/threaded"
}, },
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2008-06.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2008-06.html"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1513",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1513"
},
{
"name" : "http://wiki.rpath.com/Advisories:rPSA-2008-0336",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/Advisories:rPSA-2008-0336"
},
{ {
"name": "http://support.avaya.com/elmodocs2/security/ASA-2009-082.htm", "name": "http://support.avaya.com/elmodocs2/security/ASA-2009-082.htm",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2009-082.htm" "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-082.htm"
}, },
{
"name" : "DSA-1673",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1673"
},
{
"name" : "MDVSA-2008:215",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:215"
},
{
"name" : "RHSA-2009:0313",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0313.html"
},
{
"name" : "31838",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31838"
},
{
"name" : "oval:org.mitre.oval:def:9821",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9821"
},
{
"name" : "oval:org.mitre.oval:def:14982",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14982"
},
{
"name" : "34144",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34144"
},
{
"name" : "ADV-2008-2872",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2872"
},
{
"name" : "1021069",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1021069"
},
{ {
"name": "32355", "name": "32355",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32355" "url": "http://secunia.com/advisories/32355"
}, },
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0336",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0336"
},
{
"name": "oval:org.mitre.oval:def:14982",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14982"
},
{
"name": "oval:org.mitre.oval:def:9821",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9821"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2008-06.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2008-06.html"
},
{
"name": "34144",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34144"
},
{
"name": "31838",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31838"
},
{ {
"name": "32944", "name": "32944",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32944" "url": "http://secunia.com/advisories/32944"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1513",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1513"
},
{
"name": "RHSA-2009:0313",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0313.html"
},
{
"name": "ADV-2008-2872",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2872"
},
{
"name": "MDVSA-2008:215",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:215"
},
{
"name": "1021069",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021069"
},
{
"name": "DSA-1673",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1673"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib", "name": "30797",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/495674/100/0/threaded" "url": "http://www.securityfocus.com/bid/30797"
}, },
{ {
"name": "http://www.ocert.org/analysis/2008-008/analysis.txt", "name": "http://www.ocert.org/analysis/2008-008/analysis.txt",
@ -63,29 +63,9 @@
"url": "http://www.ocert.org/analysis/2008-008/analysis.txt" "url": "http://www.ocert.org/analysis/2008-008/analysis.txt"
}, },
{ {
"name" : "FEDORA-2008-7512", "name": "4648",
"refsource" : "FEDORA", "refsource": "SREASON",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html" "url": "http://securityreason.com/securityalert/4648"
},
{
"name" : "FEDORA-2008-7572",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html"
},
{
"name" : "MDVSA-2009:020",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
},
{
"name" : "SUSE-SR:2009:004",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name" : "30797",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30797"
}, },
{ {
"name": "31827", "name": "31827",
@ -93,14 +73,34 @@
"url": "http://secunia.com/advisories/31827" "url": "http://secunia.com/advisories/31827"
}, },
{ {
"name" : "4648", "name": "FEDORA-2008-7572",
"refsource" : "SREASON", "refsource": "FEDORA",
"url" : "http://securityreason.com/securityalert/4648" "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495674/100/0/threaded"
},
{
"name": "MDVSA-2009:020",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
}, },
{ {
"name": "xinelib-demuxqtc-cmovatom-dos(44656)", "name": "xinelib-demuxqtc-cmovatom-dos(44656)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44656" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44656"
},
{
"name": "FEDORA-2008-7512",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html"
} }
] ]
} }

View File

@ -52,36 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=619869",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=619869"
},
{
"name" : "MDVSA-2009:020",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
},
{
"name" : "SUSE-SR:2009:004",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name" : "30698",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30698"
},
{
"name" : "47677",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/47677"
},
{
"name" : "ADV-2008-2382",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2382"
},
{ {
"name": "1020703", "name": "1020703",
"refsource": "SECTRACK", "refsource": "SECTRACK",
@ -91,6 +61,36 @@
"name": "xinelib-srcdemuxersid3-bo(44468)", "name": "xinelib-srcdemuxersid3-bo(44468)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44468" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44468"
},
{
"name": "47677",
"refsource": "OSVDB",
"url": "http://osvdb.org/47677"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "ADV-2008-2382",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2382"
},
{
"name": "MDVSA-2009:020",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
},
{
"name": "30698",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30698"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=619869",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=619869"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-0454", "ID": "CVE-2013-0454",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[samba-announce] 20120625 [Announce] Samba 3.6.6 Available for Download", "name": "storwize-cifs-incorrect-permissions(80970)",
"refsource" : "MLIST", "refsource": "XF",
"url" : "https://lists.samba.org/archive/samba-announce/2012/000259.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80970"
},
{
"name" : "https://bugzilla.samba.org/show_bug.cgi?id=8738",
"refsource" : "MISC",
"url" : "https://bugzilla.samba.org/show_bug.cgi?id=8738"
},
{
"name" : "http://www.ibm.com/support/docview.wss?uid=ssg1S1004289",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=ssg1S1004289"
}, },
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=928419", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=928419",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=928419" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928419"
}, },
{
"name" : "https://www.samba.org/samba/security/CVE-2013-0454",
"refsource" : "CONFIRM",
"url" : "https://www.samba.org/samba/security/CVE-2013-0454"
},
{ {
"name": "USN-1802-1", "name": "USN-1802-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1802-1" "url": "http://www.ubuntu.com/usn/USN-1802-1"
}, },
{ {
"name" : "storwize-cifs-incorrect-permissions(80970)", "name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004289",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/80970" "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004289"
},
{
"name": "https://www.samba.org/samba/security/CVE-2013-0454",
"refsource": "CONFIRM",
"url": "https://www.samba.org/samba/security/CVE-2013-0454"
},
{
"name": "https://bugzilla.samba.org/show_bug.cgi?id=8738",
"refsource": "MISC",
"url": "https://bugzilla.samba.org/show_bug.cgi?id=8738"
},
{
"name": "[samba-announce] 20120625 [Announce] Samba 3.6.6 Available for Download",
"refsource": "MLIST",
"url": "https://lists.samba.org/archive/samba-announce/2012/000259.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-3334", "ID": "CVE-2013-3334",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,25 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.adobe.com/support/security/bulletins/apsb13-14.html", "name": "openSUSE-SU-2013:0892",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.adobe.com/support/security/bulletins/apsb13-14.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html"
}, },
{ {
"name" : "RHSA-2013:0825", "name": "53442",
"refsource" : "REDHAT", "refsource": "SECUNIA",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0825.html" "url": "http://secunia.com/advisories/53442"
}, },
{ {
"name": "SUSE-SU-2013:0798", "name": "SUSE-SU-2013:0798",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html"
}, },
{
"name" : "openSUSE-SU-2013:0892",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html"
},
{ {
"name": "openSUSE-SU-2013:0954", "name": "openSUSE-SU-2013:0954",
"refsource": "SUSE", "refsource": "SUSE",
@ -83,9 +78,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16407" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16407"
}, },
{ {
"name" : "53442", "name": "http://www.adobe.com/support/security/bulletins/apsb13-14.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/53442" "url": "http://www.adobe.com/support/security/bulletins/apsb13-14.html"
},
{
"name": "RHSA-2013:0825",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0825.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-3824", "ID": "CVE-2013-3824",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1028800",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1028800"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html", "name": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html"
}, },
{
"name": "oracle-cpujuly2013-cve20133824(85675)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85675"
},
{ {
"name": "61216", "name": "61216",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/61216" "url": "http://www.securityfocus.com/bid/61216"
}, },
{
"name" : "95288",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/95288"
},
{
"name" : "1028800",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1028800"
},
{ {
"name": "54230", "name": "54230",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54230" "url": "http://secunia.com/advisories/54230"
}, },
{ {
"name" : "oracle-cpujuly2013-cve20133824(85675)", "name": "95288",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/85675" "url": "http://osvdb.org/95288"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3889", "ID": "CVE-2013-3889",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,25 +57,25 @@
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-084" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-084"
}, },
{
"name" : "MS13-085",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-085"
},
{ {
"name": "TA13-288A", "name": "TA13-288A",
"refsource": "CERT", "refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-288A" "url": "http://www.us-cert.gov/ncas/alerts/TA13-288A"
}, },
{
"name" : "oval:org.mitre.oval:def:18901",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18901"
},
{ {
"name": "oval:org.mitre.oval:def:19132", "name": "oval:org.mitre.oval:def:19132",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19132" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19132"
},
{
"name": "MS13-085",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-085"
},
{
"name": "oval:org.mitre.oval:def:18901",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18901"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3910", "ID": "CVE-2013-3910",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "MS13-088",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-088"
},
{ {
"name": "TA13-317A", "name": "TA13-317A",
"refsource": "CERT", "refsource": "CERT",
@ -66,6 +61,11 @@
"name": "oval:org.mitre.oval:def:19109", "name": "oval:org.mitre.oval:def:19109",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19109" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19109"
},
{
"name": "MS13-088",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-088"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4505", "ID": "CVE-2013-4505",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "55855",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55855"
},
{ {
"name": "http://subversion.apache.org/security/CVE-2013-4505-advisory.txt", "name": "http://subversion.apache.org/security/CVE-2013-4505-advisory.txt",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://subversion.apache.org/security/CVE-2013-4505-advisory.txt" "url": "http://subversion.apache.org/security/CVE-2013-4505-advisory.txt"
}, },
{
"name": "100364",
"refsource": "OSVDB",
"url": "http://osvdb.org/100364"
},
{ {
"name": "openSUSE-SU-2013:1836", "name": "openSUSE-SU-2013:1836",
"refsource": "SUSE", "refsource": "SUSE",
@ -66,16 +76,6 @@
"name": "openSUSE-SU-2013:1860", "name": "openSUSE-SU-2013:1860",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html"
},
{
"name" : "100364",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/100364"
},
{
"name" : "55855",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/55855"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-005/", "name": "90409",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-005/" "url": "http://osvdb.org/90409"
}, },
{ {
"name": "http://typo3.org/extensions/repository/view/myquizpoll", "name": "http://typo3.org/extensions/repository/view/myquizpoll",
@ -63,9 +63,9 @@
"url": "http://typo3.org/extensions/repository/view/myquizpoll" "url": "http://typo3.org/extensions/repository/view/myquizpoll"
}, },
{ {
"name" : "90409", "name": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-005/",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://osvdb.org/90409" "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-005/"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://scn.sap.com/docs/DOC-8218", "name": "https://service.sap.com/sap/support/notes/1893440",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://scn.sap.com/docs/DOC-8218" "url": "https://service.sap.com/sap/support/notes/1893440"
}, },
{ {
"name": "http://www.sybase.com/detail?id=1099371", "name": "http://www.sybase.com/detail?id=1099371",
@ -63,9 +63,9 @@
"url": "http://www.sybase.com/detail?id=1099371" "url": "http://www.sybase.com/detail?id=1099371"
}, },
{ {
"name" : "https://service.sap.com/sap/support/notes/1893440", "name": "http://scn.sap.com/docs/DOC-8218",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://service.sap.com/sap/support/notes/1893440" "url": "http://scn.sap.com/docs/DOC-8218"
}, },
{ {
"name": "55537", "name": "55537",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2013-7069", "ID": "CVE-2013-7069",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20131211 Re: CVE Request: ack-grep: potential remote code execution via per-project .ackrc files", "name": "55982",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://seclists.org/oss-sec/2013/q4/484" "url": "http://secunia.com/advisories/55982"
},
{
"name" : "https://github.com/petdance/ack2/issues/399",
"refsource" : "CONFIRM",
"url" : "https://github.com/petdance/ack2/issues/399"
}, },
{ {
"name": "openSUSE-SU-2014:0142", "name": "openSUSE-SU-2014:0142",
@ -73,9 +68,14 @@
"url": "http://www.securityfocus.com/bid/64196" "url": "http://www.securityfocus.com/bid/64196"
}, },
{ {
"name" : "55982", "name": "https://github.com/petdance/ack2/issues/399",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/55982" "url": "https://github.com/petdance/ack2/issues/399"
},
{
"name": "[oss-security] 20131211 Re: CVE Request: ack-grep: potential remote code execution via per-project .ackrc files",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q4/484"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{ {
"name": "99801", "name": "99801",
"refsource": "BID", "refsource": "BID",
@ -71,6 +66,11 @@
"name": "1038940", "name": "1038940",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038940" "url": "http://www.securitytracker.com/id/1038940"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/ImageMagick/ImageMagick/commit/9eedb5660f1704cde8e8cd784c5c2a09dd2fd60f",
"refsource" : "CONFIRM",
"url" : "https://github.com/ImageMagick/ImageMagick/commit/9eedb5660f1704cde8e8cd784c5c2a09dd2fd60f"
},
{ {
"name": "https://github.com/ImageMagick/ImageMagick/issues/549", "name": "https://github.com/ImageMagick/ImageMagick/issues/549",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,6 +62,11 @@
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3681-1/" "url": "https://usn.ubuntu.com/3681-1/"
}, },
{
"name": "https://github.com/ImageMagick/ImageMagick/commit/9eedb5660f1704cde8e8cd784c5c2a09dd2fd60f",
"refsource": "CONFIRM",
"url": "https://github.com/ImageMagick/ImageMagick/commit/9eedb5660f1704cde8e8cd784c5c2a09dd2fd60f"
},
{ {
"name": "100218", "name": "100218",
"refsource": "BID", "refsource": "BID",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-04-02T00:00:00", "DATE_PUBLIC": "2018-04-02T00:00:00",
"ID": "CVE-2017-13302", "ID": "CVE-2017-13302",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html"
},
{ {
"name": "https://github.com/erikd/libsndfile/issues/344", "name": "https://github.com/erikd/libsndfile/issues/344",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/erikd/libsndfile/issues/344" "url": "https://github.com/erikd/libsndfile/issues/344"
},
{
"name": "[debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://repo.or.cz/nasm.git/commit/c9244eaadd05b27637cde06021bac3fa1d920aa3" "url": "http://repo.or.cz/nasm.git/commit/c9244eaadd05b27637cde06021bac3fa1d920aa3"
}, },
{
"name" : "https://bugzilla.nasm.us/show_bug.cgi?id=3392436",
"refsource" : "MISC",
"url" : "https://bugzilla.nasm.us/show_bug.cgi?id=3392436"
},
{ {
"name": "USN-3694-1", "name": "USN-3694-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3694-1/" "url": "https://usn.ubuntu.com/3694-1/"
},
{
"name": "https://bugzilla.nasm.us/show_bug.cgi?id=3392436",
"refsource": "MISC",
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392436"
} }
] ]
} }

View File

@ -66,9 +66,9 @@
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-sm1t3e3" "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-sm1t3e3"
}, },
{ {
"name" : "105433", "name": "1041737",
"refsource" : "BID", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/bid/105433" "url": "http://www.securitytracker.com/id/1041737"
}, },
{ {
"name": "1041736", "name": "1041736",
@ -76,9 +76,9 @@
"url": "http://www.securitytracker.com/id/1041736" "url": "http://www.securitytracker.com/id/1041736"
}, },
{ {
"name" : "1041737", "name": "105433",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id/1041737" "url": "http://www.securityfocus.com/bid/105433"
} }
] ]
}, },

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://seccops.com/centos-web-panel-0-9-8-480-multiple-vulnerabilities/",
"refsource": "MISC",
"url": "https://seccops.com/centos-web-panel-0-9-8-480-multiple-vulnerabilities/"
},
{ {
"name": "45610", "name": "45610",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "https://0day.today/exploit/31304", "name": "https://0day.today/exploit/31304",
"refsource": "MISC", "refsource": "MISC",
"url": "https://0day.today/exploit/31304" "url": "https://0day.today/exploit/31304"
},
{
"name" : "https://seccops.com/centos-web-panel-0-9-8-480-multiple-vulnerabilities/",
"refsource" : "MISC",
"url" : "https://seccops.com/centos-web-panel-0-9-8-480-multiple-vulnerabilities/"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com", "ASSIGNER": "security@google.com",
"ID": "CVE-2018-18350", "ID": "CVE-2018-18350",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -63,16 +63,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
}, },
{
"name" : "DSA-4352",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4352"
},
{ {
"name": "RHSA-2018:3803", "name": "RHSA-2018:3803",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3803" "url": "https://access.redhat.com/errata/RHSA-2018:3803"
}, },
{
"name": "DSA-4352",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4352"
},
{ {
"name": "106084", "name": "106084",
"refsource": "BID", "refsource": "BID",

View File

@ -85,15 +85,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10787785",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10787785"
},
{ {
"name": "ibm-sam-cve20181887-info-disc(152078)", "name": "ibm-sam-cve20181887-info-disc(152078)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/152078" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/152078"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=ibm10787785",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10787785"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://irssi.org/security/irssi_sa_2018_01.txt",
"refsource" : "CONFIRM",
"url" : "https://irssi.org/security/irssi_sa_2018_01.txt"
},
{ {
"name": "DSA-4162", "name": "DSA-4162",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4162" "url": "https://www.debian.org/security/2018/dsa-4162"
},
{
"name": "https://irssi.org/security/irssi_sa_2018_01.txt",
"refsource": "CONFIRM",
"url": "https://irssi.org/security/irssi_sa_2018_01.txt"
} }
] ]
} }