"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:32:40 +00:00
parent 95b3c7e69c
commit 29782714e8
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
47 changed files with 3255 additions and 3255 deletions

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20041129 CuteFTP 6.0 Professional Remote Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=110182983622642&w=2"
},
{ {
"name": "cuteftp-reply-bo(18309)", "name": "cuteftp-reply-bo(18309)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18309" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18309"
},
{
"name": "20041129 CuteFTP 6.0 Professional Remote Buffer Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110182983622642&w=2"
} }
] ]
} }

View File

@ -52,21 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080103 securityvulns.com russian vulnerabilities digest",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/485786/100/0/threaded"
},
{ {
"name": "20080103 securityvulns.com russian vulnerabilities digest", "name": "20080103 securityvulns.com russian vulnerabilities digest",
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html" "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html"
}, },
{
"name" : "http://securityvulns.ru/Sdocument625.html",
"refsource" : "MISC",
"url" : "http://securityvulns.ru/Sdocument625.html"
},
{ {
"name": "http://websecurity.com.ua/1442/", "name": "http://websecurity.com.ua/1442/",
"refsource": "MISC", "refsource": "MISC",
@ -77,10 +67,20 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/27138" "url": "http://www.securityfocus.com/bid/27138"
}, },
{
"name": "20080103 securityvulns.com russian vulnerabilities digest",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485786/100/0/threaded"
},
{ {
"name": "3539", "name": "3539",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3539" "url": "http://securityreason.com/securityalert/3539"
},
{
"name": "http://securityvulns.ru/Sdocument625.html",
"refsource": "MISC",
"url": "http://securityvulns.ru/Sdocument625.html"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "BEA08-188.00", "name": "1019452",
"refsource" : "BEA", "refsource": "SECTRACK",
"url" : "http://dev2dev.bea.com/pub/advisory/261" "url": "http://www.securitytracker.com/id?1019452"
}, },
{ {
"name": "ADV-2008-0613", "name": "ADV-2008-0613",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0613" "url": "http://www.vupen.com/english/advisories/2008/0613"
}, },
{
"name" : "1019452",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019452"
},
{ {
"name": "29041", "name": "29041",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29041" "url": "http://secunia.com/advisories/29041"
},
{
"name": "BEA08-188.00",
"refsource": "BEA",
"url": "http://dev2dev.bea.com/pub/advisory/261"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "6018", "name": "neutrino-index-code-execution(43616)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/6018" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43616"
},
{
"name" : "30123",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30123"
}, },
{ {
"name": "30950", "name": "30950",
@ -68,9 +63,14 @@
"url": "http://secunia.com/advisories/30950" "url": "http://secunia.com/advisories/30950"
}, },
{ {
"name" : "neutrino-index-code-execution(43616)", "name": "30123",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43616" "url": "http://www.securityfocus.com/bid/30123"
},
{
"name": "6018",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6018"
} }
] ]
} }

View File

@ -52,11 +52,26 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "31239",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31239"
},
{ {
"name": "20080728 [DSECRG-08-033] Local File Include Vulnerability in Pixelpost 1.7.1", "name": "20080728 [DSECRG-08-033] Local File Include Vulnerability in Pixelpost 1.7.1",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494817/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/494817/100/0/threaded"
}, },
{
"name": "pixelpost-languagefull-file-include(44031)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44031"
},
{
"name": "4062",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4062"
},
{ {
"name": "6150", "name": "6150",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -67,30 +82,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.pixelpost.org/blog/2008/07/27/pixelpost-171-security-patch" "url": "http://www.pixelpost.org/blog/2008/07/27/pixelpost-171-security-patch"
}, },
{
"name" : "30397",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30397"
},
{ {
"name": "ADV-2008-2207", "name": "ADV-2008-2207",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2207/references" "url": "http://www.vupen.com/english/advisories/2008/2207/references"
}, },
{ {
"name" : "31239", "name": "30397",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/31239" "url": "http://www.securityfocus.com/bid/30397"
},
{
"name" : "4062",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4062"
},
{
"name" : "pixelpost-languagefull-file-include(44031)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44031"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "6572",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6572"
},
{
"name" : "6574",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6574"
},
{ {
"name": "31409", "name": "31409",
"refsource": "BID", "refsource": "BID",
@ -72,10 +62,20 @@
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2691" "url": "http://www.vupen.com/english/advisories/2008/2691"
}, },
{
"name": "6572",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6572"
},
{ {
"name": "atomicphotoalbum-album-sql-injection(45433)", "name": "atomicphotoalbum-album-sql-injection(45433)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45433" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45433"
},
{
"name": "6574",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6574"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "6411",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6411"
},
{ {
"name": "31085", "name": "31085",
"refsource": "BID", "refsource": "BID",
@ -67,6 +62,11 @@
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4330" "url": "http://securityreason.com/securityalert/4330"
}, },
{
"name": "6411",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6411"
},
{ {
"name": "photoalbum-pics-sql-injection(45017)", "name": "photoalbum-pics-sql-injection(45017)",
"refsource": "XF", "refsource": "XF",

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://forums.xaos-ia.com/?topic=765",
"refsource" : "CONFIRM",
"url" : "http://forums.xaos-ia.com/?topic=765"
},
{
"name" : "30656",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30656"
},
{ {
"name": "31439", "name": "31439",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -71,6 +61,16 @@
"name": "icebb-skin-sql-injection(44403)", "name": "icebb-skin-sql-injection(44403)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44403" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44403"
},
{
"name": "http://forums.xaos-ia.com/?topic=765",
"refsource": "CONFIRM",
"url": "http://forums.xaos-ia.com/?topic=765"
},
{
"name": "30656",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30656"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "6912",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6912"
},
{ {
"name": "32030", "name": "32030",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32030" "url": "http://www.securityfocus.com/bid/32030"
}, },
{ {
"name" : "32519", "name": "6912",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/32519" "url": "https://www.exploit-db.com/exploits/6912"
}, },
{ {
"name": "articlepublisherpro-admin-sql-injection(46373)", "name": "articlepublisherpro-admin-sql-injection(46373)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46373" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46373"
},
{
"name": "32519",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32519"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-2169", "ID": "CVE-2013-2169",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2184", "ID": "CVE-2013-2184",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20130613 CVE request: MovableType before 5.2.6",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2013/q2/560"
},
{ {
"name": "[oss-security] 20130614 Re: CVE request: MovableType before 5.2.6", "name": "[oss-security] 20130614 Re: CVE request: MovableType before 5.2.6",
"refsource": "MLIST", "refsource": "MLIST",
@ -67,6 +62,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://movabletype.org/documentation/appendices/release-notes/movable-type-526-release-notes.html" "url": "https://movabletype.org/documentation/appendices/release-notes/movable-type-526-release-notes.html"
}, },
{
"name": "[oss-security] 20130613 CVE request: MovableType before 5.2.6",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q2/560"
},
{ {
"name": "DSA-3183", "name": "DSA-3183",
"refsource": "DEBIAN", "refsource": "DEBIAN",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2013-6213", "ID": "CVE-2013-6213",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,12 +53,12 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBMU02935", "name": "SSRT101357",
"refsource": "HP", "refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437" "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437"
}, },
{ {
"name" : "SSRT101357", "name": "HPSBMU02935",
"refsource": "HP", "refsource": "HP",
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437" "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437"
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-6310", "ID": "CVE-2013-6310",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6375", "ID": "CVE-2013-6375",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20131120 Xen Security Advisory 78 - Insufficient TLB flushing in VT-d (iommu) code", "name": "GLSA-201407-03",
"refsource" : "MLIST", "refsource": "GENTOO",
"url" : "http://www.openwall.com/lists/oss-security/2013/11/20/3" "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
}, },
{ {
"name": "[oss-security] 20131121 Re: Xen Security Advisory 78 - Insufficient TLB flushing in VT-d (iommu) code", "name": "[oss-security] 20131121 Re: Xen Security Advisory 78 - Insufficient TLB flushing in VT-d (iommu) code",
@ -63,9 +63,9 @@
"url": "http://www.openwall.com/lists/oss-security/2013/11/21/1" "url": "http://www.openwall.com/lists/oss-security/2013/11/21/1"
}, },
{ {
"name" : "GLSA-201407-03", "name": "1029369",
"refsource" : "GENTOO", "refsource": "SECTRACK",
"url" : "http://security.gentoo.org/glsa/glsa-201407-03.xml" "url": "http://www.securitytracker.com/id/1029369"
}, },
{ {
"name": "openSUSE-SU-2013:1876", "name": "openSUSE-SU-2013:1876",
@ -73,9 +73,9 @@
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html"
}, },
{ {
"name" : "1029369", "name": "[oss-security] 20131120 Xen Security Advisory 78 - Insufficient TLB flushing in VT-d (iommu) code",
"refsource" : "SECTRACK", "refsource": "MLIST",
"url" : "http://www.securitytracker.com/id/1029369" "url": "http://www.openwall.com/lists/oss-security/2013/11/20/3"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-7176", "ID": "CVE-2013-7176",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821", "name": "VU#686662",
"refsource" : "CONFIRM", "refsource": "CERT-VN",
"url" : "https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821" "url": "http://www.kb.cert.org/vuls/id/686662"
},
{
"name" : "DSA-2979",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2979"
}, },
{ {
"name": "openSUSE-SU-2014:0348", "name": "openSUSE-SU-2014:0348",
@ -68,9 +63,14 @@
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html" "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html"
}, },
{ {
"name" : "VU#686662", "name": "DSA-2979",
"refsource" : "CERT-VN", "refsource": "DEBIAN",
"url" : "http://www.kb.cert.org/vuls/id/686662" "url": "http://www.debian.org/security/2014/dsa-2979"
},
{
"name": "https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821",
"refsource": "CONFIRM",
"url": "https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821"
} }
] ]
} }

View File

@ -52,86 +52,96 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/12/31/7"
},
{
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1039845",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1039845"
},
{
"name" : "https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c"
},
{
"name" : "USN-2113-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2113-1"
},
{
"name" : "USN-2117-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2117-1"
},
{
"name" : "USN-2109-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2109-1"
},
{
"name" : "USN-2110-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2110-1"
},
{
"name" : "USN-2128-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2128-1"
},
{
"name" : "USN-2129-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2129-1"
},
{ {
"name": "USN-2135-1", "name": "USN-2135-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2135-1" "url": "http://www.ubuntu.com/usn/USN-2135-1"
}, },
{
"name" : "USN-2136-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2136-1"
},
{ {
"name": "USN-2138-1", "name": "USN-2138-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2138-1" "url": "http://www.ubuntu.com/usn/USN-2138-1"
}, },
{ {
"name" : "USN-2139-1", "name": "USN-2113-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2139-1" "url": "http://www.ubuntu.com/usn/USN-2113-1"
}, },
{ {
"name": "USN-2141-1", "name": "USN-2141-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2141-1" "url": "http://www.ubuntu.com/usn/USN-2141-1"
}, },
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1039845",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039845"
},
{
"name": "USN-2110-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2110-1"
},
{
"name": "USN-2129-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2129-1"
},
{
"name": "USN-2136-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2136-1"
},
{
"name": "USN-2128-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2128-1"
},
{
"name": "linux-kernel-cve20137270-info-disc(90131)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90131"
},
{
"name": "USN-2139-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2139-1"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4"
},
{
"name": "USN-2117-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2117-1"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c"
},
{
"name": "56036",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56036"
},
{
"name": "USN-2109-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2109-1"
},
{
"name": "[oss-security] 20131231 Re: CVE request: Linux kernel: net: memory leak in recvmsg handlermsg_name & msg_namelen logic",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/12/31/7"
},
{
"name": "https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c"
},
{ {
"name": "64744", "name": "64744",
"refsource": "BID", "refsource": "BID",
@ -141,16 +151,6 @@
"name": "55882", "name": "55882",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55882" "url": "http://secunia.com/advisories/55882"
},
{
"name" : "56036",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56036"
},
{
"name" : "linux-kernel-cve20137270-info-disc(90131)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90131"
} }
] ]
} }

View File

@ -54,24 +54,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "name": "99797",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" "url": "http://www.securityfocus.com/bid/99797"
}, },
{ {
"name": "https://security.netapp.com/advisory/ntap-20170720-0001/", "name": "https://security.netapp.com/advisory/ntap-20170720-0001/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20170720-0001/" "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
}, },
{
"name" : "99797",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99797"
},
{ {
"name": "1038931", "name": "1038931",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038931" "url": "http://www.securitytracker.com/id/1038931"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[debian-lts-announce] 20180430 [SECURITY] [DLA 1368-1] libvorbis security update", "name": "USN-3569-1",
"refsource" : "MLIST", "refsource": "UBUNTU",
"url" : "https://lists.debian.org/debian-lts-announce/2018/04/msg00033.html" "url": "https://usn.ubuntu.com/3569-1/"
},
{
"name" : "https://gitlab.xiph.org/xiph/vorbis/issues/2329",
"refsource" : "MISC",
"url" : "https://gitlab.xiph.org/xiph/vorbis/issues/2329"
}, },
{ {
"name": "DSA-4113", "name": "DSA-4113",
@ -68,9 +63,14 @@
"url": "https://www.debian.org/security/2018/dsa-4113" "url": "https://www.debian.org/security/2018/dsa-4113"
}, },
{ {
"name" : "USN-3569-1", "name": "https://gitlab.xiph.org/xiph/vorbis/issues/2329",
"refsource" : "UBUNTU", "refsource": "MISC",
"url" : "https://usn.ubuntu.com/3569-1/" "url": "https://gitlab.xiph.org/xiph/vorbis/issues/2329"
},
{
"name": "[debian-lts-announce] 20180430 [SECURITY] [DLA 1368-1] libvorbis security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00033.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/restlet/restlet-framework-java/issues/1286",
"refsource" : "MISC",
"url" : "https://github.com/restlet/restlet-framework-java/issues/1286"
},
{ {
"name": "https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements", "name": "https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements",
"refsource": "MISC", "refsource": "MISC",
@ -66,6 +61,11 @@
"name": "https://lgtm.com/blog/restlet_CVE-2017-14868", "name": "https://lgtm.com/blog/restlet_CVE-2017-14868",
"refsource": "MISC", "refsource": "MISC",
"url": "https://lgtm.com/blog/restlet_CVE-2017-14868" "url": "https://lgtm.com/blog/restlet_CVE-2017-14868"
},
{
"name": "https://github.com/restlet/restlet-framework-java/issues/1286",
"refsource": "MISC",
"url": "https://github.com/restlet/restlet-framework-java/issues/1286"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://openwall.com/lists/oss-security/2017/10/04/9",
"refsource" : "MISC",
"url" : "http://openwall.com/lists/oss-security/2017/10/04/9"
},
{ {
"name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0", "name": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0" "url": "https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0"
}, },
{ {
"name" : "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524", "name": "http://openwall.com/lists/oss-security/2017/10/04/9",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524" "url": "http://openwall.com/lists/oss-security/2017/10/04/9"
}, },
{ {
"name": "https://kanboard.net/news/version-1.0.47", "name": "https://kanboard.net/news/version-1.0.47",
"refsource": "MISC", "refsource": "MISC",
"url": "https://kanboard.net/news/version-1.0.47" "url": "https://kanboard.net/news/version-1.0.47"
},
{
"name": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524",
"refsource": "MISC",
"url": "https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00027.html" "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00027.html"
}, },
{ {
"name" : "[debian-lts-announce] 20180705 [SECURITY] [DLA 1414-1] mercurial security update", "name": "https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.4.1_.282017-11-07.29",
"refsource" : "MLIST", "refsource": "MISC",
"url" : "https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html" "url": "https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.4.1_.282017-11-07.29"
}, },
{ {
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1414-2] mercurial regression update", "name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1414-2] mercurial regression update",
@ -68,9 +68,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00041.html" "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00041.html"
}, },
{ {
"name" : "https://bz.mercurial-scm.org/show_bug.cgi?id=5730", "name": "[debian-lts-announce] 20180705 [SECURITY] [DLA 1414-1] mercurial security update",
"refsource" : "MISC", "refsource": "MLIST",
"url" : "https://bz.mercurial-scm.org/show_bug.cgi?id=5730" "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html"
}, },
{ {
"name": "https://www.mercurial-scm.org/pipermail/mercurial-devel/2017-November/107333.html", "name": "https://www.mercurial-scm.org/pipermail/mercurial-devel/2017-November/107333.html",
@ -78,19 +78,19 @@
"url": "https://www.mercurial-scm.org/pipermail/mercurial-devel/2017-November/107333.html" "url": "https://www.mercurial-scm.org/pipermail/mercurial-devel/2017-November/107333.html"
}, },
{ {
"name" : "https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.4.1_.282017-11-07.29", "name": "102926",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102926"
},
{
"name": "https://bz.mercurial-scm.org/show_bug.cgi?id=5730",
"refsource": "MISC", "refsource": "MISC",
"url" : "https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.4.1_.282017-11-07.29" "url": "https://bz.mercurial-scm.org/show_bug.cgi?id=5730"
}, },
{ {
"name": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html", "name": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html" "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html"
},
{
"name" : "102926",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102926"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://bugzilla.opensuse.org/show_bug.cgi?id=1071709", "name": "https://www.fossil-scm.org/xfer/info/1f63db591c77108c",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://bugzilla.opensuse.org/show_bug.cgi?id=1071709" "url": "https://www.fossil-scm.org/xfer/info/1f63db591c77108c"
}, },
{ {
"name": "https://www.fossil-scm.org/xfer/doc/trunk/www/changes.wiki#v2_4", "name": "https://www.fossil-scm.org/xfer/doc/trunk/www/changes.wiki#v2_4",
@ -63,9 +63,9 @@
"url": "https://www.fossil-scm.org/xfer/doc/trunk/www/changes.wiki#v2_4" "url": "https://www.fossil-scm.org/xfer/doc/trunk/www/changes.wiki#v2_4"
}, },
{ {
"name" : "https://www.fossil-scm.org/xfer/info/1f63db591c77108c", "name": "https://bugzilla.opensuse.org/show_bug.cgi?id=1071709",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://www.fossil-scm.org/xfer/info/1f63db591c77108c" "url": "https://bugzilla.opensuse.org/show_bug.cgi?id=1071709"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-pcpt1",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-pcpt1"
},
{ {
"name": "103145", "name": "103145",
"refsource": "BID", "refsource": "BID",
@ -66,6 +61,11 @@
"name": "1040409", "name": "1040409",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040409" "url": "http://www.securitytracker.com/id/1040409"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-pcpt1",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-pcpt1"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://p3.support.panasonic.com/faq/show/5017?&site_domain=p3",
"refsource" : "MISC",
"url" : "https://p3.support.panasonic.com/faq/show/5017?&site_domain=p3"
},
{ {
"name": "JVN#65082538", "name": "JVN#65082538",
"refsource": "JVN", "refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN65082538/index.html" "url": "https://jvn.jp/en/jp/JVN65082538/index.html"
},
{
"name": "https://p3.support.panasonic.com/faq/show/5017?&site_domain=p3",
"refsource": "MISC",
"url": "https://p3.support.panasonic.com/faq/show/5017?&site_domain=p3"
} }
] ]
} }

View File

@ -53,11 +53,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0804",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0804"
},
{ {
"name": "102457", "name": "102457",
"refsource": "BID", "refsource": "BID",
@ -67,6 +62,11 @@
"name": "1040153", "name": "1040153",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040153" "url": "http://www.securitytracker.com/id/1040153"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0804",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0804"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-0979", "ID": "CVE-2018-0979",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -92,11 +92,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0979",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0979"
},
{ {
"name": "103625", "name": "103625",
"refsource": "BID", "refsource": "BID",
@ -106,6 +101,11 @@
"name": "1040650", "name": "1040650",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040650" "url": "http://www.securitytracker.com/id/1040650"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0979",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0979"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2/23/2018 11:20:58", "DATE_ASSIGNED": "2/23/2018 11:20:58",
"ID": "CVE-2018-1000132", "ID": "CVE-2018-1000132",
"REQUESTER": "gregory.szorc@gmail.com", "REQUESTER": "gregory.szorc@gmail.com",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Mercurial", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "4.5 and earlier" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Mercurial" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Incorrect Access Control (CWE-285)" "value": "n/a"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-05-18T21:46:02.318830", "DATE_ASSIGNED": "2018-05-18T21:46:02.318830",
"DATE_REQUESTED": "2018-04-03T08:28:21", "DATE_REQUESTED": "2018-04-03T08:28:21",
"ID": "CVE-2018-1000155", "ID": "CVE-2018-1000155",
@ -14,18 +14,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "OpenFlow", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "1.0 onwards" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "OpenFlow" "vendor_name": "n/a"
} }
] ]
} }
@ -47,7 +47,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Denial of Service and Improper authorization" "value": "n/a"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-12-28T04:34:37.680270", "DATE_ASSIGNED": "2018-12-28T04:34:37.680270",
"ID": "CVE-2018-1000413", "ID": "CVE-2018-1000413",
"REQUESTER": "ml@beckweb.net", "REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Jenkins Config File Provider Plugin", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "3.1 and earlier" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Jenkins project" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-79" "value": "n/a"
} }
] ]
} }
@ -54,15 +54,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1080",
"refsource" : "CONFIRM",
"url" : "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1080"
},
{ {
"name": "106532", "name": "106532",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106532" "url": "http://www.securityfocus.com/bid/106532"
},
{
"name": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1080",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1080"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-07-08T15:52:41.203289", "DATE_ASSIGNED": "2018-07-08T15:52:41.203289",
"DATE_REQUESTED": "2018-07-06T20:31:25", "DATE_REQUESTED": "2018-07-06T20:31:25",
"ID": "CVE-2018-1000622", "ID": "CVE-2018-1000622",
@ -14,18 +14,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "rustdoc", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "Between 0.8 and 1.27.0" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "The Rust Programming Language" "vendor_name": "n/a"
} }
] ]
} }
@ -47,7 +47,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-427: Uncontrolled Search Path Element" "value": "n/a"
} }
] ]
} }
@ -55,15 +55,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://groups.google.com/forum/#!topic/rustlang-security-announcements/4ybxYLTtXuM",
"refsource" : "CONFIRM",
"url" : "https://groups.google.com/forum/#!topic/rustlang-security-announcements/4ybxYLTtXuM"
},
{ {
"name": "GLSA-201812-11", "name": "GLSA-201812-11",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201812-11" "url": "https://security.gentoo.org/glsa/201812-11"
},
{
"name": "https://groups.google.com/forum/#!topic/rustlang-security-announcements/4ybxYLTtXuM",
"refsource": "CONFIRM",
"url": "https://groups.google.com/forum/#!topic/rustlang-security-announcements/4ybxYLTtXuM"
} }
] ]
} }

View File

@ -53,29 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20181120 CVE-2018-19364 Qemu: 9pfs: Use-after-free due to race condition while updating fid path", "name": "[debian-lts-announce] 20190129 [SECURITY] [DLA 1646-1] qemu security update",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2018/11/20/1" "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00023.html"
}, },
{ {
"name": "[qemu-devel] 20181107 [PATCH] 9p: write lock path in v9fs_co_open2()", "name": "[qemu-devel] 20181107 [PATCH] 9p: write lock path in v9fs_co_open2()",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg01139.html" "url": "https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg01139.html"
}, },
{
"name" : "[qemu-devel] 20181115 [PATCH] 9p: take write lock on fid path updates",
"refsource" : "MLIST",
"url" : "https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg02795.html"
},
{
"name" : "[debian-lts-announce] 20190129 [SECURITY] [DLA 1646-1] qemu security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2019/01/msg00023.html"
},
{ {
"name": "USN-3826-1", "name": "USN-3826-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3826-1/" "url": "https://usn.ubuntu.com/3826-1/"
},
{
"name": "[oss-security] 20181120 CVE-2018-19364 Qemu: 9pfs: Use-after-free due to race condition while updating fid path",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2018/11/20/1"
},
{
"name": "[qemu-devel] 20181115 [PATCH] 9p: take write lock on fid path updates",
"refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg02795.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/Dec/20"
},
{ {
"name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html", "name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html" "url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html"
},
{
"name": "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Dec/20"
} }
] ]
} }

View File

@ -57,15 +57,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html" "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
}, },
{
"name" : "104175",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/104175"
},
{ {
"name": "1040920", "name": "1040920",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040920" "url": "http://www.securitytracker.com/id/1040920"
},
{
"name": "104175",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104175"
} }
] ]
} }