"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:55:53 +00:00
parent 0b8cbb59f7
commit 28fb3b5ef3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
61 changed files with 4290 additions and 4290 deletions

View File

@ -53,34 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.squid-cache.org/Advisories/SQUID-2002_3.txt", "name": "squid-ftp-dir-bo(9481)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.squid-cache.org/Advisories/SQUID-2002_3.txt" "url": "http://www.iss.net/security_center/static/9481.php"
},
{
"name" : "http://www.squid-cache.org/Versions/v2/2.4/bugs/",
"refsource" : "CONFIRM",
"url" : "http://www.squid-cache.org/Versions/v2/2.4/bugs/"
},
{
"name" : "RHSA-2002:051",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2002-051.html"
},
{
"name" : "RHSA-2002:130",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2002-130.html"
},
{
"name" : "CSSA-2002-046.0",
"refsource" : "CALDERA",
"url" : "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt"
},
{
"name" : "MDKSA-2002:044",
"refsource" : "MANDRAKE",
"url" : "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php"
}, },
{ {
"name": "20020715 TSLSA-2002-0062 - squid", "name": "20020715 TSLSA-2002-0062 - squid",
@ -88,14 +63,14 @@
"url": "http://marc.info/?l=bugtraq&m=102674543407606&w=2" "url": "http://marc.info/?l=bugtraq&m=102674543407606&w=2"
}, },
{ {
"name" : "5155", "name": "CSSA-2002-046.0",
"refsource" : "BID", "refsource": "CALDERA",
"url" : "http://www.securityfocus.com/bid/5155" "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt"
}, },
{ {
"name" : "5156", "name": "squid-gopher-bo(9480)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/5156" "url": "http://www.iss.net/security_center/static/9480.php"
}, },
{ {
"name": "5157", "name": "5157",
@ -108,14 +83,39 @@
"url": "http://www.iss.net/security_center/static/9482.php" "url": "http://www.iss.net/security_center/static/9482.php"
}, },
{ {
"name" : "squid-gopher-bo(9480)", "name": "http://www.squid-cache.org/Versions/v2/2.4/bugs/",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "http://www.iss.net/security_center/static/9480.php" "url": "http://www.squid-cache.org/Versions/v2/2.4/bugs/"
}, },
{ {
"name" : "squid-ftp-dir-bo(9481)", "name": "RHSA-2002:051",
"refsource" : "XF", "refsource": "REDHAT",
"url" : "http://www.iss.net/security_center/static/9481.php" "url": "http://rhn.redhat.com/errata/RHSA-2002-051.html"
},
{
"name": "5155",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5155"
},
{
"name": "5156",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5156"
},
{
"name": "http://www.squid-cache.org/Advisories/SQUID-2002_3.txt",
"refsource": "CONFIRM",
"url": "http://www.squid-cache.org/Advisories/SQUID-2002_3.txt"
},
{
"name": "RHSA-2002:130",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2002-130.html"
},
{
"name": "MDKSA-2002:044",
"refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "SUNALERT", "refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57728-1" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57728-1"
}, },
{
"name" : "12385",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/12385"
},
{ {
"name": "solaris-udp-end-point-dos(19119)", "name": "solaris-udp-end-point-dos(19119)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19119" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19119"
},
{
"name": "12385",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12385"
} }
] ]
} }

View File

@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://digitalparadox.org/advisories/pafdb.txt",
"refsource": "MISC",
"url": "http://digitalparadox.org/advisories/pafdb.txt"
},
{ {
"name": "20050312 [SECURITYREASON.COM] SQL injection and XSS in paFileDB", "name": "20050312 [SECURITYREASON.COM] SQL injection and XSS in paFileDB",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=111065796525043&w=2" "url": "http://marc.info/?l=bugtraq&m=111065796525043&w=2"
}, },
{ {
"name" : "20050330 PaFileDB Version 3.1 and below are exploitable via a XSS and a SQL injection vulnerability", "name": "pafiledb-viewall-category-xss(19690)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://marc.info/?l=bugtraq&m=111221940107161&w=2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19690"
},
{
"name" : "http://digitalparadox.org/advisories/pafdb.txt",
"refsource" : "MISC",
"url" : "http://digitalparadox.org/advisories/pafdb.txt"
}, },
{ {
"name": "12788", "name": "12788",
@ -73,9 +73,9 @@
"url": "http://www.securityfocus.com/bid/12788" "url": "http://www.securityfocus.com/bid/12788"
}, },
{ {
"name" : "pafiledb-viewall-category-xss(19690)", "name": "20050330 PaFileDB Version 3.1 and below are exploitable via a XSS and a SQL injection vulnerability",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19690" "url": "http://marc.info/?l=bugtraq&m=111221940107161&w=2"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "14617",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/14617"
},
{ {
"name": "VU#131828", "name": "VU#131828",
"refsource": "CERT-VN", "refsource": "CERT-VN",
@ -61,11 +66,6 @@
"name": "12843", "name": "12843",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/12843" "url": "http://www.securityfocus.com/bid/12843"
},
{
"name" : "14617",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/14617"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20050413 Multiple Sql injection and XSS vulnerabilities in phpBB Plus and below and some of its modules", "name": "phpbb-multiple-modules-xss(20085)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://marc.info/?l=bugtraq&m=111343406309969&w=2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20085"
}, },
{ {
"name": "http://www.digitalparadox.org/advisories/phpbbp.txt", "name": "http://www.digitalparadox.org/advisories/phpbbp.txt",
@ -63,9 +63,9 @@
"url": "http://www.digitalparadox.org/advisories/phpbbp.txt" "url": "http://www.digitalparadox.org/advisories/phpbbp.txt"
}, },
{ {
"name" : "phpbb-multiple-modules-xss(20085)", "name": "20050413 Multiple Sql injection and XSS vulnerabilities in phpBB Plus and below and some of its modules",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20085" "url": "http://marc.info/?l=bugtraq&m=111343406309969&w=2"
} }
] ]
} }

View File

@ -52,20 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20050428 File appending vulnerability in Oracle Webcache 9i",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=111472615519295&w=2"
},
{ {
"name": "http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html", "name": "http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html" "url": "http://www.red-database-security.com/advisory/oracle_webcache_append_file_vulnerabilitiy.html"
}, },
{ {
"name" : "13420", "name": "20050428 File appending vulnerability in Oracle Webcache 9i",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/13420" "url": "http://marc.info/?l=bugtraq&m=111472615519295&w=2"
},
{
"name": "15143",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/15143"
}, },
{ {
"name": "15909", "name": "15909",
@ -73,9 +73,9 @@
"url": "http://www.osvdb.org/15909" "url": "http://www.osvdb.org/15909"
}, },
{ {
"name" : "15143", "name": "13420",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/15143" "url": "http://www.securityfocus.com/bid/13420"
}, },
{ {
"name": "oracle9ias-application-cache-file-corruption(20310)", "name": "oracle9ias-application-cache-file-corruption(20310)",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-1462", "ID": "CVE-2005-1462",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.ethereal.com/appnotes/enpa-sa-00019.html", "name": "13504",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.ethereal.com/appnotes/enpa-sa-00019.html" "url": "http://www.securityfocus.com/bid/13504"
},
{
"name" : "http://www.ethereal.com/news/item_20050504_01.html",
"refsource" : "CONFIRM",
"url" : "http://www.ethereal.com/news/item_20050504_01.html"
},
{
"name" : "CLSA-2005:963",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000963"
},
{
"name" : "FLSA-2006:152922",
"refsource" : "FEDORA",
"url" : "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html"
}, },
{ {
"name": "RHSA-2005:427", "name": "RHSA-2005:427",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-427.html" "url": "http://www.redhat.com/support/errata/RHSA-2005-427.html"
}, },
{
"name" : "13504",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/13504"
},
{ {
"name": "oval:org.mitre.oval:def:9713", "name": "oval:org.mitre.oval:def:9713",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9713" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9713"
},
{
"name": "http://www.ethereal.com/appnotes/enpa-sa-00019.html",
"refsource": "CONFIRM",
"url": "http://www.ethereal.com/appnotes/enpa-sa-00019.html"
},
{
"name": "FLSA-2006:152922",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html"
},
{
"name": "CLSA-2005:963",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000963"
},
{
"name": "http://www.ethereal.com/news/item_20050504_01.html",
"refsource": "CONFIRM",
"url": "http://www.ethereal.com/news/item_20050504_01.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://rgod.altervista.org/602_en.html",
"refsource" : "MISC",
"url" : "http://rgod.altervista.org/602_en.html"
},
{ {
"name": "1014105", "name": "1014105",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014105" "url": "http://securitytracker.com/id?1014105"
},
{
"name": "http://rgod.altervista.org/602_en.html",
"refsource": "MISC",
"url": "http://rgod.altervista.org/602_en.html"
} }
] ]
} }

View File

@ -57,6 +57,11 @@
"refsource": "VIM", "refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2006-April/000687.html" "url": "http://www.attrition.org/pipermail/vim/2006-April/000687.html"
}, },
{
"name": "1015359",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1015359"
},
{ {
"name": "16406", "name": "16406",
"refsource": "BID", "refsource": "BID",
@ -66,11 +71,6 @@
"name": "22096", "name": "22096",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/22096" "url": "http://www.osvdb.org/22096"
},
{
"name" : "1015359",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1015359"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://pear.php.net/package/Text_Password/download/",
"refsource" : "CONFIRM",
"url" : "http://pear.php.net/package/Text_Password/download/"
},
{ {
"name": "23825", "name": "23825",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://www.osvdb.org/23825" "url": "http://www.osvdb.org/23825"
},
{
"name": "http://pear.php.net/package/Text_Password/download/",
"refsource": "CONFIRM",
"url": "http://pear.php.net/package/Text_Password/download/"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20090119 Microsoft Bluetooth Stack OBEX Directory Traversal", "name": "33598",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/500199/100/0/threaded" "url": "http://secunia.com/advisories/33598"
}, },
{ {
"name": "http://www.seguridadmobile.com/windows-mobile/windows-mobile-security/Microsoft-Bluetooth-Stack-Directory-Traversal.html", "name": "http://www.seguridadmobile.com/windows-mobile/windows-mobile-security/Microsoft-Bluetooth-Stack-Directory-Traversal.html",
@ -63,20 +63,20 @@
"url": "http://www.seguridadmobile.com/windows-mobile/windows-mobile-security/Microsoft-Bluetooth-Stack-Directory-Traversal.html" "url": "http://www.seguridadmobile.com/windows-mobile/windows-mobile-security/Microsoft-Bluetooth-Stack-Directory-Traversal.html"
}, },
{ {
"name" : "33359", "name": "20090119 Microsoft Bluetooth Stack OBEX Directory Traversal",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/33359" "url": "http://www.securityfocus.com/archive/1/500199/100/0/threaded"
},
{
"name" : "33598",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33598"
}, },
{ {
"name": "4938", "name": "4938",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4938" "url": "http://securityreason.com/securityalert/4938"
}, },
{
"name": "33359",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33359"
},
{ {
"name": "winmobile-obexftp-directory-traversal(48124)", "name": "winmobile-obexftp-directory-traversal(48124)",
"refsource": "XF", "refsource": "XF",

View File

@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/8017" "url": "https://www.exploit-db.com/exploits/8017"
}, },
{
"name" : "33705",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33705"
},
{ {
"name": "33865", "name": "33865",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33865" "url": "http://secunia.com/advisories/33865"
},
{
"name": "33705",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33705"
} }
] ]
} }

View File

@ -53,44 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[zope-announce] 20090806 CVE-2009-0668 and CVE-2009-0669: Releases to fix ZODB ZEO server vulnerabilities", "name": "ADV-2009-2217",
"refsource" : "MLIST", "refsource": "VUPEN",
"url" : "http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html" "url": "http://www.vupen.com/english/advisories/2009/2217"
},
{
"name" : "http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2",
"refsource" : "CONFIRM",
"url" : "http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2"
},
{
"name" : "35987",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35987"
},
{
"name" : "56827",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/56827"
}, },
{ {
"name": "36204", "name": "36204",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36204" "url": "http://secunia.com/advisories/36204"
}, },
{
"name": "zope-protocol-code-execution(52377)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52377"
},
{
"name": "http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2",
"refsource": "CONFIRM",
"url": "http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2"
},
{ {
"name": "36205", "name": "36205",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36205" "url": "http://secunia.com/advisories/36205"
}, },
{ {
"name" : "ADV-2009-2217", "name": "[zope-announce] 20090806 CVE-2009-0668 and CVE-2009-0669: Releases to fix ZODB ZEO server vulnerabilities",
"refsource" : "VUPEN", "refsource": "MLIST",
"url" : "http://www.vupen.com/english/advisories/2009/2217" "url": "http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html"
}, },
{ {
"name" : "zope-protocol-code-execution(52377)", "name": "56827",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/52377" "url": "http://osvdb.org/56827"
},
{
"name": "35987",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35987"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "HPSBMA02414",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=124025839111157&w=2"
},
{ {
"name": "SSRT080185", "name": "SSRT080185",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=124025839111157&w=2" "url": "http://marc.info/?l=bugtraq&m=124025839111157&w=2"
}, },
{ {
"name" : "53881", "name": "ADV-2009-1109",
"refsource" : "OSVDB", "refsource": "VUPEN",
"url" : "http://osvdb.org/53881" "url": "http://www.vupen.com/english/advisories/2009/1109"
},
{
"name": "HPSBMA02414",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=124025839111157&w=2"
}, },
{ {
"name": "1022084", "name": "1022084",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022084" "url": "http://www.securitytracker.com/id?1022084"
}, },
{
"name": "53881",
"refsource": "OSVDB",
"url": "http://osvdb.org/53881"
},
{ {
"name": "34807", "name": "34807",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34807" "url": "http://secunia.com/advisories/34807"
},
{
"name" : "ADV-2009-1109",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/1109"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "34583",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34583"
},
{ {
"name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html"
}, },
{
"name" : "GLSA-200904-11",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200904-11.xml"
},
{
"name" : "33713",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33713"
},
{ {
"name": "33880", "name": "33880",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33880" "url": "http://secunia.com/advisories/33880"
}, },
{ {
"name" : "34583", "name": "33713",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/34583" "url": "http://www.securityfocus.com/bid/33713"
},
{
"name": "GLSA-200904-11",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200904-11.xml"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "vidshare-listingvideo-sql-injection(50635)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50635"
},
{ {
"name": "8737", "name": "8737",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/8737" "url": "https://www.exploit-db.com/exploits/8737"
}, },
{
"name" : "35033",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/35033"
},
{ {
"name": "54599", "name": "54599",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/35149" "url": "http://secunia.com/advisories/35149"
}, },
{ {
"name" : "vidshare-listingvideo-sql-injection(50635)", "name": "35033",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50635" "url": "http://www.securityfocus.com/bid/35033"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-4270", "ID": "CVE-2009-4270",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,44 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20091217 possible vulnerability in ghostscript >= 8.64", "name": "GLSA-201412-17",
"refsource" : "MLIST", "refsource": "GENTOO",
"url" : "http://www.openwall.com/lists/oss-security/2009/12/18/1" "url": "http://security.gentoo.org/glsa/glsa-201412-17.xml"
}, },
{ {
"name": "[oss-security] 20091218 Re: possible vulnerability in ghostscript >= 8.64", "name": "[oss-security] 20091218 Re: possible vulnerability in ghostscript >= 8.64",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/12/18/2" "url": "http://www.openwall.com/lists/oss-security/2009/12/18/2"
}, },
{
"name" : "http://bugs.ghostscript.com/show_bug.cgi?id=690829",
"refsource" : "CONFIRM",
"url" : "http://bugs.ghostscript.com/show_bug.cgi?id=690829"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=540760",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=540760"
},
{
"name" : "GLSA-201412-17",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201412-17.xml"
},
{ {
"name": "MDVSA-2010:134", "name": "MDVSA-2010:134",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:134" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:134"
}, },
{ {
"name" : "MDVSA-2010:135", "name": "[oss-security] 20091217 possible vulnerability in ghostscript >= 8.64",
"refsource" : "MANDRIVA", "refsource": "MLIST",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:135" "url": "http://www.openwall.com/lists/oss-security/2009/12/18/1"
},
{
"name" : "SUSE-SR:2010:014",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
}, },
{ {
"name": "USN-961-1", "name": "USN-961-1",
@ -98,29 +78,49 @@
"url": "http://www.ubuntu.com/usn/USN-961-1" "url": "http://www.ubuntu.com/usn/USN-961-1"
}, },
{ {
"name" : "37410", "name": "MDVSA-2010:135",
"refsource" : "BID", "refsource": "MANDRIVA",
"url" : "http://www.securityfocus.com/bid/37410" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:135"
},
{
"name": "ADV-2009-3597",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3597"
}, },
{ {
"name": "61140", "name": "61140",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/61140" "url": "http://osvdb.org/61140"
}, },
{
"name" : "37851",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37851"
},
{ {
"name": "40580", "name": "40580",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40580" "url": "http://secunia.com/advisories/40580"
}, },
{ {
"name" : "ADV-2009-3597", "name": "SUSE-SR:2010:014",
"refsource" : "VUPEN", "refsource": "SUSE",
"url" : "http://www.vupen.com/english/advisories/2009/3597" "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=540760",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=540760"
},
{
"name": "37851",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37851"
},
{
"name": "37410",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37410"
},
{
"name": "http://bugs.ghostscript.com/show_bug.cgi?id=690829",
"refsource": "CONFIRM",
"url": "http://bugs.ghostscript.com/show_bug.cgi?id=690829"
} }
] ]
} }

View File

@ -52,25 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "10645",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/10645"
},
{
"name" : "37482",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37482"
},
{ {
"name": "61357", "name": "61357",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/61357" "url": "http://osvdb.org/61357"
}, },
{ {
"name" : "61358", "name": "freepbx-zap-xss(55054)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://osvdb.org/61358" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55054"
},
{
"name": "10645",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/10645"
}, },
{ {
"name": "37972", "name": "37972",
@ -83,9 +78,14 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55053" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55053"
}, },
{ {
"name" : "freepbx-zap-xss(55054)", "name": "61358",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55054" "url": "http://osvdb.org/61358"
},
{
"name": "37482",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37482"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20091013 Quick Heal Local Privilege Escalation Vulnerability", "name": "quickheal-quhlpsvc-priv-escalation(53746)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/507121/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53746"
}, },
{ {
"name": "36662", "name": "36662",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/36662" "url": "http://www.securityfocus.com/bid/36662"
}, },
{
"name": "20091013 Quick Heal Local Privilege Escalation Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/507121/100/0/threaded"
},
{ {
"name": "37033", "name": "37033",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37033" "url": "http://secunia.com/advisories/37033"
},
{
"name" : "quickheal-quhlpsvc-priv-escalation(53746)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/53746"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "10738",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/10738"
},
{
"name" : "37503",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37503"
},
{ {
"name": "61354", "name": "61354",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -76,6 +66,16 @@
"name": "qpersonel-personelsira-xss(55128)", "name": "qpersonel-personelsira-xss(55128)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55128" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55128"
},
{
"name": "37503",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37503"
},
{
"name": "10738",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/10738"
} }
] ]
} }

View File

@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.maxdev.com/Article661.phtml",
"refsource" : "CONFIRM",
"url" : "http://www.maxdev.com/Article661.phtml"
},
{
"name" : "37488",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37488"
},
{
"name" : "61347",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/61347"
},
{ {
"name": "37748", "name": "37748",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -76,6 +61,21 @@
"name": "mdpro-mdforum-index-sql-injection(55138)", "name": "mdpro-mdforum-index-sql-injection(55138)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55138" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55138"
},
{
"name": "61347",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/61347"
},
{
"name": "37488",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37488"
},
{
"name": "http://www.maxdev.com/Article661.phtml",
"refsource": "CONFIRM",
"url": "http://www.maxdev.com/Article661.phtml"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2012-2048", "ID": "CVE-2012-2048",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.adobe.com/support/security/bulletins/apsb12-21.html", "name": "50523",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.adobe.com/support/security/bulletins/apsb12-21.html" "url": "http://secunia.com/advisories/50523"
}, },
{ {
"name": "85317", "name": "85317",
@ -67,15 +67,15 @@
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027516" "url": "http://www.securitytracker.com/id?1027516"
}, },
{
"name" : "50523",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/50523"
},
{ {
"name": "coldfusion-unspecified-dos(78410)", "name": "coldfusion-unspecified-dos(78410)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78410" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78410"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb12-21.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb12-21.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2315", "ID": "CVE-2012-2315",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20120103 OpenKM 5.1.7 Privilege Escalation",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-01/0007.html"
},
{
"name" : "20120104 Re: OpenKM 5.1.7 Privilege Escalation",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2012-01/0021.html"
},
{ {
"name": "[oss-security] 20120323 CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)", "name": "[oss-security] 20120323 CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/03/23/6" "url": "http://www.openwall.com/lists/oss-security/2012/03/23/6"
}, },
{
"name" : "[oss-security] 20120323 Re: CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/03/23/8"
},
{
"name" : "[oss-security] 20120427 Re: CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/04/27/6"
},
{ {
"name": "[oss-security] 20120504 Re: CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)", "name": "[oss-security] 20120504 Re: CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/04/2" "url": "http://www.openwall.com/lists/oss-security/2012/05/04/2"
}, },
{
"name" : "[oss-security] 20120504 Re: CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2012/05/04/13"
},
{ {
"name": "51250", "name": "51250",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/51250" "url": "http://www.securityfocus.com/bid/51250"
}, },
{ {
"name" : "78105", "name": "20120103 OpenKM 5.1.7 Privilege Escalation",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://osvdb.org/78105" "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0007.html"
},
{
"name": "[oss-security] 20120323 Re: CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/03/23/8"
},
{
"name": "20120104 Re: OpenKM 5.1.7 Privilege Escalation",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0021.html"
},
{
"name": "[oss-security] 20120504 Re: CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/04/13"
},
{
"name": "openkm-userpermissions-security-bypass(72112)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72112"
},
{
"name": "[oss-security] 20120427 Re: CVE-request: OpenKM 5.1.7 Privilege Escalation / OS Command Execution (XSRF based)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/27/6"
}, },
{ {
"name": "47424", "name": "47424",
@ -103,9 +103,9 @@
"url": "http://secunia.com/advisories/47424" "url": "http://secunia.com/advisories/47424"
}, },
{ {
"name" : "openkm-userpermissions-security-bypass(72112)", "name": "78105",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/72112" "url": "http://osvdb.org/78105"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2012-2497", "ID": "CVE-2012-2497",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2012-2882", "ID": "CVE-2012-2882",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://code.google.com/p/chromium/issues/detail?id=140647",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=140647"
},
{ {
"name": "http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html", "name": "http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -62,11 +67,6 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://chromiumcodereview.appspot.com/10829204" "url": "https://chromiumcodereview.appspot.com/10829204"
}, },
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=140647",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=140647"
},
{ {
"name": "https://src.chromium.org/viewvc/chrome?view=rev&revision=150239", "name": "https://src.chromium.org/viewvc/chrome?view=rev&revision=150239",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -77,15 +77,15 @@
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00012.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00012.html"
}, },
{
"name" : "oval:org.mitre.oval:def:15688",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15688"
},
{ {
"name": "google-chrome-cve20122882(78839)", "name": "google-chrome-cve20122882(78839)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78839" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78839"
},
{
"name": "oval:org.mitre.oval:def:15688",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15688"
} }
] ]
} }

View File

@ -53,35 +53,15 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[Xen-announce] 20120612 [Xen-announce] Xen Security Advisory 9 (CVE-2012-2934) - PV guest\thost DoS (AMD erratum #121)", "name": "55082",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://lists.xen.org/archives/html/xen-announce/2012-06/msg00002.html" "url": "http://secunia.com/advisories/55082"
}, },
{ {
"name": "http://support.amd.com/us/Processor_TechDocs/25759.pdf", "name": "http://support.amd.com/us/Processor_TechDocs/25759.pdf",
"refsource": "MISC", "refsource": "MISC",
"url": "http://support.amd.com/us/Processor_TechDocs/25759.pdf" "url": "http://support.amd.com/us/Processor_TechDocs/25759.pdf"
}, },
{
"name" : "DSA-2501",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2501"
},
{
"name" : "GLSA-201309-24",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201309-24.xml"
},
{
"name" : "openSUSE-SU-2012:1572",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
},
{
"name" : "openSUSE-SU-2012:1573",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
},
{ {
"name": "53961", "name": "53961",
"refsource": "BID", "refsource": "BID",
@ -93,9 +73,29 @@
"url": "http://secunia.com/advisories/51413" "url": "http://secunia.com/advisories/51413"
}, },
{ {
"name" : "55082", "name": "GLSA-201309-24",
"refsource" : "SECUNIA", "refsource": "GENTOO",
"url" : "http://secunia.com/advisories/55082" "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
},
{
"name": "DSA-2501",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2501"
},
{
"name": "openSUSE-SU-2012:1572",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
},
{
"name": "[Xen-announce] 20120612 [Xen-announce] Xen Security Advisory 9 (CVE-2012-2934) - PV guest\thost DoS (AMD erratum #121)",
"refsource": "MLIST",
"url": "http://lists.xen.org/archives/html/xen-announce/2012-06/msg00002.html"
},
{
"name": "openSUSE-SU-2012:1573",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-3058", "ID": "CVE-2012-3058",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -52,51 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "50904",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50904"
},
{
"name": "50984",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50984"
},
{
"name": "50935",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/50935"
},
{ {
"name": "http://www.mozilla.org/security/announce/2012/mfsa2012-83.html", "name": "http://www.mozilla.org/security/announce/2012/mfsa2012-83.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2012/mfsa2012-83.html" "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-83.html"
}, },
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=768101",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=768101"
},
{
"name" : "MDVSA-2012:163",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:163"
},
{
"name" : "RHSA-2012:1351",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-1351.html"
},
{
"name" : "SUSE-SU-2012:1351",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html"
},
{
"name" : "USN-1611-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1611-1"
},
{
"name" : "56119",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/56119"
},
{
"name" : "86111",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/86111"
},
{
"name" : "oval:org.mitre.oval:def:16718",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16718"
},
{ {
"name": "50856", "name": "50856",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -108,14 +83,19 @@
"url": "http://secunia.com/advisories/50892" "url": "http://secunia.com/advisories/50892"
}, },
{ {
"name" : "50904", "name": "oval:org.mitre.oval:def:16718",
"refsource" : "SECUNIA", "refsource": "OVAL",
"url" : "http://secunia.com/advisories/50904" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16718"
}, },
{ {
"name" : "50935", "name": "RHSA-2012:1351",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/50935" "url": "http://rhn.redhat.com/errata/RHSA-2012-1351.html"
},
{
"name": "firefox-cow-privilege-escalation(79153)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79153"
}, },
{ {
"name": "50936", "name": "50936",
@ -123,9 +103,14 @@
"url": "http://secunia.com/advisories/50936" "url": "http://secunia.com/advisories/50936"
}, },
{ {
"name" : "50984", "name": "86111",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/50984" "url": "http://osvdb.org/86111"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=768101",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=768101"
}, },
{ {
"name": "55318", "name": "55318",
@ -133,9 +118,24 @@
"url": "http://secunia.com/advisories/55318" "url": "http://secunia.com/advisories/55318"
}, },
{ {
"name" : "firefox-cow-privilege-escalation(79153)", "name": "SUSE-SU-2012:1351",
"refsource" : "XF", "refsource": "SUSE",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/79153" "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html"
},
{
"name": "MDVSA-2012:163",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:163"
},
{
"name": "USN-1611-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1611-1"
},
{
"name": "56119",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/56119"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2012-6026", "ID": "CVE-2012-6026",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -57,31 +57,31 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-eigrp.c?r1=45408&r2=45407&pathrev=45408" "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-eigrp.c?r1=45408&r2=45407&pathrev=45408"
}, },
{
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45408",
"refsource" : "CONFIRM",
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45408"
},
{ {
"name": "http://www.wireshark.org/security/wnpa-sec-2012-34.html", "name": "http://www.wireshark.org/security/wnpa-sec-2012-34.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2012-34.html" "url": "http://www.wireshark.org/security/wnpa-sec-2012-34.html"
}, },
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7800",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7800"
},
{ {
"name": "openSUSE-SU-2012:1633", "name": "openSUSE-SU-2012:1633",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html"
}, },
{
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45408",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45408"
},
{ {
"name": "openSUSE-SU-2013:0151", "name": "openSUSE-SU-2013:0151",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html"
}, },
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7800",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7800"
},
{ {
"name": "oval:org.mitre.oval:def:15883", "name": "oval:org.mitre.oval:def:15883",
"refsource": "OVAL", "refsource": "OVAL",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-6080", "ID": "CVE-2012-6080",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,54 +53,54 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20121229 Re: CVE request: MoinMoin Wiki (path traversal vulnerability)", "name": "57076",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2012/12/30/6" "url": "http://www.securityfocus.com/bid/57076"
},
{
"name" : "https://bugs.launchpad.net/ubuntu/+source/moin/+bug/1094599",
"refsource" : "MISC",
"url" : "https://bugs.launchpad.net/ubuntu/+source/moin/+bug/1094599"
},
{
"name" : "http://hg.moinmo.in/moin/1.9/rev/3c27131a3c52",
"refsource" : "CONFIRM",
"url" : "http://hg.moinmo.in/moin/1.9/rev/3c27131a3c52"
}, },
{ {
"name": "http://moinmo.in/SecurityFixes", "name": "http://moinmo.in/SecurityFixes",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://moinmo.in/SecurityFixes" "url": "http://moinmo.in/SecurityFixes"
}, },
{
"name": "51663",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51663"
},
{ {
"name": "DSA-2593", "name": "DSA-2593",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2593" "url": "http://www.debian.org/security/2012/dsa-2593"
}, },
{ {
"name" : "USN-1680-1", "name": "https://bugs.launchpad.net/ubuntu/+source/moin/+bug/1094599",
"refsource" : "UBUNTU", "refsource": "MISC",
"url" : "http://ubuntu.com/usn/usn-1680-1" "url": "https://bugs.launchpad.net/ubuntu/+source/moin/+bug/1094599"
},
{
"name" : "57076",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/57076"
},
{
"name" : "51663",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/51663"
}, },
{ {
"name": "51676", "name": "51676",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51676" "url": "http://secunia.com/advisories/51676"
}, },
{
"name": "http://hg.moinmo.in/moin/1.9/rev/3c27131a3c52",
"refsource": "CONFIRM",
"url": "http://hg.moinmo.in/moin/1.9/rev/3c27131a3c52"
},
{ {
"name": "51696", "name": "51696",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51696" "url": "http://secunia.com/advisories/51696"
},
{
"name": "USN-1680-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-1680-1"
},
{
"name": "[oss-security] 20121229 Re: CVE request: MoinMoin Wiki (path traversal vulnerability)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/12/30/6"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20063", "name": "49978",
"refsource" : "EXPLOIT-DB", "refsource": "SECUNIA",
"url" : "http://www.exploit-db.com/exploits/20063" "url": "http://secunia.com/advisories/49978/"
}, },
{ {
"name": "84112", "name": "84112",
@ -63,9 +63,9 @@
"url": "http://osvdb.org/84112" "url": "http://osvdb.org/84112"
}, },
{ {
"name" : "49978", "name": "20063",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/49978/" "url": "http://www.exploit-db.com/exploits/20063"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-5266", "ID": "CVE-2015-5266",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20150921 Moodle security release",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2015/09/21/1"
},
{ {
"name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50744", "name": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50744",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -67,6 +62,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://moodle.org/mod/forum/discuss.php?d=320290" "url": "https://moodle.org/mod/forum/discuss.php?d=320290"
}, },
{
"name": "[oss-security] 20150921 Moodle security release",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/09/21/1"
},
{ {
"name": "1033619", "name": "1033619",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-5309", "ID": "CVE-2015-5309",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-ech-overflow.html",
"refsource" : "CONFIRM",
"url" : "http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-ech-overflow.html"
},
{ {
"name": "DSA-3409", "name": "DSA-3409",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -72,6 +67,16 @@
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173094.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173094.html"
}, },
{
"name": "1034308",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034308"
},
{
"name": "http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-ech-overflow.html",
"refsource": "CONFIRM",
"url": "http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-ech-overflow.html"
},
{ {
"name": "GLSA-201606-01", "name": "GLSA-201606-01",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -81,11 +86,6 @@
"name": "openSUSE-SU-2015:2023", "name": "openSUSE-SU-2015:2023",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00099.html" "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00099.html"
},
{
"name" : "1034308",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1034308"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-202-03A", "name": "1033022",
"refsource" : "MISC", "refsource": "SECTRACK",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-202-03A" "url": "http://www.securitytracker.com/id/1033022"
}, },
{ {
"name": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-396873.pdf", "name": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-396873.pdf",
@ -63,9 +63,9 @@
"url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-396873.pdf" "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-396873.pdf"
}, },
{ {
"name" : "1033022", "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-202-03A",
"refsource" : "SECTRACK", "refsource": "MISC",
"url" : "http://www.securitytracker.com/id/1033022" "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-202-03A"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-5634", "ID": "CVE-2015-5634",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://jvn.jp/en/jp/JVN83862346/995707/index.html" "url": "http://jvn.jp/en/jp/JVN83862346/995707/index.html"
}, },
{
"name" : "JVN#83862346",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN83862346/index.html"
},
{ {
"name": "JVNDB-2015-000132", "name": "JVNDB-2015-000132",
"refsource": "JVNDB", "refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000132" "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000132"
},
{
"name": "JVN#83862346",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN83862346/index.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-5851", "ID": "CVE-2015-5851",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1033609",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033609"
},
{ {
"name": "https://support.apple.com/HT205212", "name": "https://support.apple.com/HT205212",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT205212" "url": "https://support.apple.com/HT205212"
}, },
{
"name" : "https://support.apple.com/HT205267",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT205267"
},
{
"name" : "APPLE-SA-2015-09-16-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
},
{ {
"name": "APPLE-SA-2015-09-30-3", "name": "APPLE-SA-2015-09-30-3",
"refsource": "APPLE", "refsource": "APPLE",
@ -78,9 +73,14 @@
"url": "http://www.securityfocus.com/bid/76764" "url": "http://www.securityfocus.com/bid/76764"
}, },
{ {
"name" : "1033609", "name": "https://support.apple.com/HT205267",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1033609" "url": "https://support.apple.com/HT205267"
},
{
"name": "APPLE-SA-2015-09-16-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.gsi.go.jp/sokuchikijun/sokuchikijun41011.html",
"refsource" : "CONFIRM",
"url" : "http://www.gsi.go.jp/sokuchikijun/sokuchikijun41011.html"
},
{ {
"name": "JVN#52691241", "name": "JVN#52691241",
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN52691241/index.html" "url": "http://jvn.jp/en/jp/JVN52691241/index.html"
},
{
"name": "http://www.gsi.go.jp/sokuchikijun/sokuchikijun41011.html",
"refsource": "CONFIRM",
"url": "http://www.gsi.go.jp/sokuchikijun/sokuchikijun41011.html"
} }
] ]
} }

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://lists.apache.org/thread.html/cba8f18df15af862aa07c584d8dc85c44a199fb8f460edd498059247@%3Cdev.impala.apache.org%3E",
"refsource" : "MISC",
"url" : "https://lists.apache.org/thread.html/cba8f18df15af862aa07c584d8dc85c44a199fb8f460edd498059247@%3Cdev.impala.apache.org%3E"
},
{ {
"name": "105739", "name": "105739",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/105739" "url": "http://www.securityfocus.com/bid/105739"
},
{
"name": "https://lists.apache.org/thread.html/cba8f18df15af862aa07c584d8dc85c44a199fb8f460edd498059247@%3Cdev.impala.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/cba8f18df15af862aa07c584d8dc85c44a199fb8f460edd498059247@%3Cdev.impala.apache.org%3E"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "secure@dell.com", "ASSIGNER": "security_alert@emc.com",
"DATE_PUBLIC": "2018-10-15T07:10:00.000Z", "DATE_PUBLIC": "2018-10-15T07:10:00.000Z",
"ID": "CVE-2018-15765", "ID": "CVE-2018-15765",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-15791", "ID": "CVE-2018-15791",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://seclists.org/oss-sec/2018/q3/180",
"refsource" : "MISC",
"url" : "http://seclists.org/oss-sec/2018/q3/180"
},
{ {
"name": "https://security.netapp.com/advisory/ntap-20181221-0001/", "name": "https://security.netapp.com/advisory/ntap-20181221-0001/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "105163", "name": "105163",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/105163" "url": "http://www.securityfocus.com/bid/105163"
},
{
"name": "http://seclists.org/oss-sec/2018/q3/180",
"refsource": "MISC",
"url": "http://seclists.org/oss-sec/2018/q3/180"
} }
] ]
} }

View File

@ -58,114 +58,114 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html" "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "name": "105587",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" "url": "http://www.securityfocus.com/bid/105587"
}, },
{ {
"name": "https://security.netapp.com/advisory/ntap-20181018-0001/", "name": "https://security.netapp.com/advisory/ntap-20181018-0001/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181018-0001/" "url": "https://security.netapp.com/advisory/ntap-20181018-0001/"
}, },
{
"name" : "DSA-4326",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4326"
},
{ {
"name": "RHSA-2018:2942", "name": "RHSA-2018:2942",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2942" "url": "https://access.redhat.com/errata/RHSA-2018:2942"
}, },
{
"name" : "RHSA-2018:2943",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2943"
},
{
"name" : "RHSA-2018:3000",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3000"
},
{
"name" : "RHSA-2018:3001",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3001"
},
{
"name" : "RHSA-2018:3002",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3002"
},
{
"name" : "RHSA-2018:3003",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3003"
},
{
"name" : "RHSA-2018:3350",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3350"
},
{
"name" : "RHSA-2018:3409",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3409"
},
{
"name" : "RHSA-2018:3521",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3521"
},
{
"name" : "RHSA-2018:3533",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3533"
},
{
"name" : "RHSA-2018:3534",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3534"
},
{
"name" : "RHSA-2018:3671",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3671"
},
{
"name" : "RHSA-2018:3672",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3672"
},
{ {
"name": "RHSA-2018:3779", "name": "RHSA-2018:3779",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3779" "url": "https://access.redhat.com/errata/RHSA-2018:3779"
}, },
{ {
"name" : "RHSA-2018:3852", "name": "RHSA-2018:3534",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3852" "url": "https://access.redhat.com/errata/RHSA-2018:3534"
},
{
"name": "RHSA-2018:3350",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3350"
},
{
"name": "RHSA-2018:3003",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3003"
}, },
{ {
"name": "USN-3804-1", "name": "USN-3804-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3804-1/" "url": "https://usn.ubuntu.com/3804-1/"
}, },
{
"name": "RHSA-2018:3002",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3002"
},
{
"name": "RHSA-2018:3671",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3671"
},
{
"name": "RHSA-2018:3852",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3852"
},
{
"name": "DSA-4326",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4326"
},
{ {
"name": "USN-3824-1", "name": "USN-3824-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3824-1/" "url": "https://usn.ubuntu.com/3824-1/"
}, },
{ {
"name" : "105587", "name": "RHSA-2018:2943",
"refsource" : "BID", "refsource": "REDHAT",
"url" : "http://www.securityfocus.com/bid/105587" "url": "https://access.redhat.com/errata/RHSA-2018:2943"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name": "RHSA-2018:3533",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3533"
},
{
"name": "RHSA-2018:3409",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3409"
},
{
"name": "RHSA-2018:3001",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3001"
},
{
"name": "RHSA-2018:3000",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3000"
}, },
{ {
"name": "1041889", "name": "1041889",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041889" "url": "http://www.securitytracker.com/id/1041889"
},
{
"name": "RHSA-2018:3672",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3672"
},
{
"name": "RHSA-2018:3521",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3521"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8441", "ID": "CVE-2018-8441",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -70,15 +70,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8441" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8441"
}, },
{
"name" : "105271",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/105271"
},
{ {
"name": "1041641", "name": "1041641",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041641" "url": "http://www.securitytracker.com/id/1041641"
},
{
"name": "105271",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105271"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8568", "ID": "CVE-2018-8568",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -65,16 +65,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8568",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8568"
},
{ {
"name": "105829", "name": "105829",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/105829" "url": "http://www.securityfocus.com/bid/105829"
}, },
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8568",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8568"
},
{ {
"name": "1042136", "name": "1042136",
"refsource": "SECTRACK", "refsource": "SECTRACK",