"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:27:16 +00:00
parent 2da542e104
commit 2c8e50736e
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3702 additions and 3633 deletions

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-0030",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "5487",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5487"
"name": "ADV-2008-1345",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1345/references"
},
{
"name": "ereserv-idloc-sql-injection(41970)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41970"
},
{
"name": "28899",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28899"
},
{
"name" : "ADV-2008-1345",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1345/references"
},
{
"name": "29914",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29914"
},
{
"name" : "ereserv-idloc-sql-injection(41970)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41970"
"name": "5487",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5487"
}
]
}

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20080704 Panda ActiveScan 2.0 remote code execution",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2008-July/063068.html"
},
{
"name" : "20080705 Panda ActiveScan 2.0 remote code execution",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2008-July/063061.html"
},
{
"name" : "6004",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6004"
},
{
"name" : "http://karol.wiesek.pl/files/panda.tgz",
"refsource" : "MISC",
"url" : "http://karol.wiesek.pl/files/panda.tgz"
"name": "ADV-2008-2008",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2008/references"
},
{
"name": "30086",
@ -78,24 +63,39 @@
"url": "http://www.securityfocus.com/bid/30086"
},
{
"name" : "ADV-2008-2008",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2008/references"
"name": "6004",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6004"
},
{
"name" : "1020432",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020432"
"name": "20080705 Panda ActiveScan 2.0 remote code execution",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-July/063061.html"
},
{
"name": "30841",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30841"
},
{
"name": "20080704 Panda ActiveScan 2.0 remote code execution",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-July/063068.html"
},
{
"name": "1020432",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020432"
},
{
"name": "panda-activescan-file-download(43587)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43587"
},
{
"name": "http://karol.wiesek.pl/files/panda.tgz",
"refsource": "MISC",
"url": "http://karol.wiesek.pl/files/panda.tgz"
}
]
}

View File

@ -52,35 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20080728 ViArt <= 3.5 SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/494839/100/0/threaded"
},
{
"name" : "6154",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6154"
},
{
"name" : "http://www.gulftech.org/?node=research&article_id=00118-07292008",
"refsource" : "MISC",
"url" : "http://www.gulftech.org/?node=research&article_id=00118-07292008"
},
{
"name": "http://www.viart.com/another_critical_sql_injection_security_fix_for_version_3_5.html",
"refsource": "CONFIRM",
"url": "http://www.viart.com/another_critical_sql_injection_security_fix_for_version_3_5.html"
},
{
"name" : "30409",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30409"
},
{
"name" : "ADV-2008-2205",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2205/references"
"name": "viartshop-productsrss-sql-injection(44045)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44045"
},
{
"name": "31275",
@ -93,9 +73,29 @@
"url": "http://securityreason.com/securityalert/4065"
},
{
"name" : "viartshop-productsrss-sql-injection(44045)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44045"
"name": "ADV-2008-2205",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2205/references"
},
{
"name": "20080728 ViArt <= 3.5 SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494839/100/0/threaded"
},
{
"name": "http://www.gulftech.org/?node=research&article_id=00118-07292008",
"refsource": "MISC",
"url": "http://www.gulftech.org/?node=research&article_id=00118-07292008"
},
{
"name": "6154",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6154"
},
{
"name": "30409",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30409"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "31527",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31527"
},
{
"name": "20080819 Vanilla <= 1.1.4 Script Injection/ XSS",
"refsource": "BUGTRAQ",
@ -62,11 +67,6 @@
"refsource": "MISC",
"url": "http://lussumo.com/community/discussion/8559/vanilla-115-release-candidate-1/"
},
{
"name" : "http://lussumo.com/docs/doku.php?id=vanilla:releasenotes",
"refsource" : "MISC",
"url" : "http://lussumo.com/docs/doku.php?id=vanilla:releasenotes"
},
{
"name": "http://www.gulftech.org/?node=research&article_id=00126-08192008",
"refsource": "MISC",
@ -78,9 +78,9 @@
"url": "http://www.securityfocus.com/bid/30748"
},
{
"name" : "31527",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31527"
"name": "http://lussumo.com/docs/doku.php?id=vanilla:releasenotes",
"refsource": "MISC",
"url": "http://lussumo.com/docs/doku.php?id=vanilla:releasenotes"
},
{
"name": "4176",

View File

@ -52,31 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20080901 [oCERT-2008-014] WordNet stack and heap overflows",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495883/100/0/threaded"
},
{
"name" : "http://www.ocert.org/analysis/2008-014/analysis.txt",
"refsource" : "MISC",
"url" : "http://www.ocert.org/analysis/2008-014/analysis.txt"
},
{
"name" : "http://www.ocert.org/advisories/ocert-2008-014.html",
"refsource" : "MISC",
"url" : "http://www.ocert.org/advisories/ocert-2008-014.html"
},
{
"name" : "http://www.ocert.org/analysis/2008-014/wordnet.patch",
"refsource" : "MISC",
"url" : "http://www.ocert.org/analysis/2008-014/wordnet.patch"
},
{
"name" : "GLSA-200810-01",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200810-01.xml"
},
{
"name": "30958",
"refsource": "BID",
@ -88,9 +63,9 @@
"url": "http://secunia.com/advisories/32184"
},
{
"name" : "4217",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4217"
"name": "http://www.ocert.org/analysis/2008-014/wordnet.patch",
"refsource": "MISC",
"url": "http://www.ocert.org/analysis/2008-014/wordnet.patch"
},
{
"name": "wordnet-binsrch-search-bo(44851)",
@ -98,9 +73,34 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44851"
},
{
"name" : "wordnet-morph-search-bo(44848)",
"name": "20080901 [oCERT-2008-014] WordNet stack and heap overflows",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495883/100/0/threaded"
},
{
"name": "http://www.ocert.org/advisories/ocert-2008-014.html",
"refsource": "MISC",
"url": "http://www.ocert.org/advisories/ocert-2008-014.html"
},
{
"name": "wordnet-wninit-bo(44850)",
"refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44848"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44850"
},
{
"name": "http://www.ocert.org/analysis/2008-014/analysis.txt",
"refsource": "MISC",
"url": "http://www.ocert.org/analysis/2008-014/analysis.txt"
},
{
"name": "4217",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4217"
},
{
"name": "GLSA-200810-01",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200810-01.xml"
},
{
"name": "wordnet-morphinit-bo(44849)",
@ -108,9 +108,9 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44849"
},
{
"name" : "wordnet-wninit-bo(44850)",
"name": "wordnet-morph-search-bo(44848)",
"refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44850"
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44848"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "6460",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6460"
"name": "kasselercms-index-sql-injection(45120)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45120"
},
{
"name": "31170",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31170"
},
{
"name": "6460",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6460"
},
{
"name": "31862",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31862"
},
{
"name" : "kasselercms-index-sql-injection(45120)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45120"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "6411",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6411"
},
{
"name": "31085",
"refsource": "BID",
@ -67,6 +62,11 @@
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4330"
},
{
"name": "6411",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6411"
},
{
"name": "availscript-Photoalbum-pics-xss(45018)",
"refsource": "XF",

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "4848",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/4848"
},
{
"name": "http://www.aspapp.com/content.asp?CatId=197&ContentType=Downloads",
"refsource": "CONFIRM",
"url": "http://www.aspapp.com/content.asp?CatId=197&ContentType=Downloads"
},
{
"name": "4848",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4848"
},
{
"name": "27170",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27170"
},
{
"name" : "28337",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28337"
"name": "portalapp-forums-sql-injection(39454)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39454"
},
{
"name": "4439",
@ -78,9 +78,9 @@
"url": "http://securityreason.com/securityalert/4439"
},
{
"name" : "portalapp-forums-sql-injection(39454)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39454"
"name": "28337",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28337"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31657"
},
{
"name" : "32159",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32159"
},
{
"name": "yacy-multiple-unspecified(45769)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45769"
},
{
"name": "32159",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32159"
}
]
}

View File

@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "20081030 ZDI-08-071: IBM Tivoli Storage Manager Express for Microsoft SQL Heap Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/497950/100/0/threaded"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-071/",
"refsource" : "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-071/"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21322623",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21322623"
},
{
"name" : "IC56773",
"refsource" : "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1IC56773"
},
{
"name" : "31988",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31988"
},
{
"name" : "ADV-2008-2969",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2969"
},
{
"name" : "1021122",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021122"
},
{
"name": "32465",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32465"
},
{
"name": "IC56773",
"refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC56773"
},
{
"name": "20081030 ZDI-08-071: IBM Tivoli Storage Manager Express for Microsoft SQL Heap Overflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497950/100/0/threaded"
},
{
"name": "1021122",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021122"
},
{
"name": "ADV-2008-2969",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2969"
},
{
"name": "31988",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31988"
},
{
"name": "ibm-tsm-backuparchiveclient-bo(46208)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46208"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-071/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-071/"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "7478",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7478"
},
{
"name": "32845",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "theratcms-login-sql-injection(47335)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47335"
},
{
"name": "7478",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7478"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "CONFIRM",
"url": "https://midas.psi.ch/elog/download/ChangeLog"
},
{
"name" : "27526",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27526"
},
{
"name": "41685",
"refsource": "OSVDB",
@ -71,6 +66,11 @@
"name": "elog-logbook-xss(40124)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40124"
},
{
"name": "27526",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27526"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-2098",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2126",
"STATE": "PUBLIC"
},
@ -53,34 +53,14 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130529 Re: CVE request: libraw: multiple issues",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/05/29/7"
"name": "53883",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53883"
},
{
"name" : "[oss-security] 20130610 Re: CVE request: libraw: multiple issues",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/06/10/1"
},
{
"name" : "http://www.libraw.org/news/libraw-0-15-2",
"refsource" : "CONFIRM",
"url" : "http://www.libraw.org/news/libraw-0-15-2"
},
{
"name" : "https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6",
"refsource" : "CONFIRM",
"url" : "https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6"
},
{
"name" : "openSUSE-SU-2013:1083",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00193.html"
},
{
"name" : "openSUSE-SU-2013:1085",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00195.html"
"name": "53547",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53547"
},
{
"name": "USN-1884-1",
@ -93,24 +73,44 @@
"url": "http://www.ubuntu.com/usn/USN-1885-1"
},
{
"name" : "53547",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/53547"
"name": "http://www.libraw.org/news/libraw-0-15-2",
"refsource": "CONFIRM",
"url": "http://www.libraw.org/news/libraw-0-15-2"
},
{
"name" : "53883",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/53883"
"name": "openSUSE-SU-2013:1085",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00195.html"
},
{
"name" : "53888",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/53888"
"name": "https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6",
"refsource": "CONFIRM",
"url": "https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6"
},
{
"name": "[oss-security] 20130529 Re: CVE request: libraw: multiple issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/05/29/7"
},
{
"name": "openSUSE-SU-2013:1083",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00193.html"
},
{
"name": "53938",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53938"
},
{
"name": "[oss-security] 20130610 Re: CVE request: libraw: multiple issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/06/10/1"
},
{
"name": "53888",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53888"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-2399",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-2457",
"STATE": "PUBLIC"
},
@ -52,90 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/ffef9e05564e",
"refsource" : "MISC",
"url" : "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/ffef9e05564e"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=975133",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
},
{
"name" : "http://advisories.mageia.org/MGASA-2013-0185.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2013-0185.html"
},
{
"name" : "GLSA-201406-32",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "HPSBUX02922",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "SSRT101305",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "HPSBUX02907",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
},
{
"name" : "HPSBUX02908",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=137545592101387&w=2"
},
{
"name" : "MDVSA-2013:183",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:183"
},
{
"name" : "RHSA-2013:0963",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
},
{
"name" : "RHSA-2013:1081",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
},
{
"name": "RHSA-2013:1060",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
},
{
"name" : "RHSA-2013:1455",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name" : "RHSA-2013:1456",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name" : "RHSA-2013:1059",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
"name": "HPSBUX02908",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137545592101387&w=2"
},
{
"name": "RHSA-2014:0414",
@ -143,69 +73,139 @@
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "SUSE-SU-2013:1305",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "SUSE-SU-2013:1293",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
},
{
"name" : "SUSE-SU-2013:1255",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
},
{
"name" : "SUSE-SU-2013:1256",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
"name": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
},
{
"name": "SUSE-SU-2013:1257",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
},
{
"name": "HPSBUX02907",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
},
{
"name": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/ffef9e05564e",
"refsource": "MISC",
"url": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/ffef9e05564e"
},
{
"name": "SUSE-SU-2013:1256",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
},
{
"name": "54154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54154"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "SSRT101305",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "HPSBUX02922",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "SUSE-SU-2013:1263",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
},
{
"name" : "TA13-169A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-169A"
},
{
"name" : "60632",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/60632"
},
{
"name" : "oval:org.mitre.oval:def:17256",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17256"
},
{
"name" : "oval:org.mitre.oval:def:19276",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19276"
},
{
"name": "oval:org.mitre.oval:def:19638",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19638"
},
{
"name": "RHSA-2013:1059",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
},
{
"name": "oval:org.mitre.oval:def:19696",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19696"
},
{
"name" : "54154",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54154"
"name": "SUSE-SU-2013:1293",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
},
{
"name": "RHSA-2013:1081",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
},
{
"name": "TA13-169A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-169A"
},
{
"name": "http://advisories.mageia.org/MGASA-2013-0185.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2013-0185.html"
},
{
"name": "60632",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/60632"
},
{
"name": "RHSA-2013:0963",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
},
{
"name": "oval:org.mitre.oval:def:19276",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19276"
},
{
"name": "SUSE-SU-2013:1255",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
},
{
"name": "RHSA-2013:1456",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name": "MDVSA-2013:183",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:183"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
},
{
"name": "oval:org.mitre.oval:def:17256",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17256"
},
{
"name": "SUSE-SU-2013:1305",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
}
]
}

View File

@ -52,35 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2013:1675",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html"
},
{
"name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-sip.c?r1=52354&r2=52353&pathrev=52354",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-sip.c?r1=52354&r2=52353&pathrev=52354"
},
{
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=52354",
"refsource" : "CONFIRM",
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=52354"
},
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2013-63.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2013-63.html"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9228",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9228"
},
{
"name": "DSA-2792",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2792"
},
{
"name" : "RHSA-2014:0342",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0342.html"
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=52354",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=52354"
},
{
"name": "openSUSE-SU-2013:1671",
@ -88,14 +78,24 @@
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html"
},
{
"name" : "openSUSE-SU-2013:1675",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html"
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9228",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9228"
},
{
"name": "oval:org.mitre.oval:def:19145",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19145"
},
{
"name": "RHSA-2014:0342",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0342.html"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2013-63.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2013-63.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6440",
"STATE": "PUBLIC"
},
@ -57,25 +57,20 @@
"refsource": "MISC",
"url": "http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml"
},
{
"name" : "http://shibboleth.net/community/advisories/secadv_20131213.txt",
"refsource" : "CONFIRM",
"url" : "http://shibboleth.net/community/advisories/secadv_20131213.txt"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1043332",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1043332"
},
{
"name": "RHSA-2014:0170",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0170.html"
},
{
"name" : "RHSA-2014:0171",
"name": "RHSA-2014:0195",
"refsource": "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0171.html"
"url": "http://rhn.redhat.com/errata/RHSA-2014-0195.html"
},
{
"name": "http://shibboleth.net/community/advisories/secadv_20131213.txt",
"refsource": "CONFIRM",
"url": "http://shibboleth.net/community/advisories/secadv_20131213.txt"
},
{
"name": "RHSA-2014:0172",
@ -83,9 +78,14 @@
"url": "http://rhn.redhat.com/errata/RHSA-2014-0172.html"
},
{
"name" : "RHSA-2014:0195",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1043332",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1043332"
},
{
"name": "RHSA-2014:0171",
"refsource": "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0195.html"
"url": "http://rhn.redhat.com/errata/RHSA-2014-0171.html"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6588",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -57,11 +57,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20171019-0002/",
"refsource": "CONFIRM",
@ -72,11 +67,6 @@
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"name" : "RHSA-2017:3442",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"name": "101314",
"refsource": "BID",
@ -86,6 +76,16 @@
"name": "1039597",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039597"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "RHSA-2017:3442",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3442"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "100215",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100215"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=15d3042a937c13f5d9244241c7a9c8416ff6e82a",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=15d3042a937c13f5d9244241c7a9c8416ff6e82a"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.4",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.4"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1481149",
"refsource": "CONFIRM",
@ -78,9 +78,9 @@
"url": "https://source.android.com/security/bulletin/2017-08-01"
},
{
"name" : "100215",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/100215"
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.4",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.4"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://flets-w.com/topics/azukeru_vulnerability/",
"refsource" : "MISC",
"url" : "http://flets-w.com/topics/azukeru_vulnerability/"
},
{
"name": "JVN#14658714",
"refsource": "JVN",
"url": "https://jvn.jp/en/jp/JVN14658714/index.html"
},
{
"name": "http://flets-w.com/topics/azukeru_vulnerability/",
"refsource": "MISC",
"url": "http://flets-w.com/topics/azukeru_vulnerability/"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-14392",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-14658",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://zerodayinitiative.com/advisories/ZDI-17-869",
"refsource" : "MISC",
"url" : "https://zerodayinitiative.com/advisories/ZDI-17-869"
},
{
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://zerodayinitiative.com/advisories/ZDI-17-869",
"refsource": "MISC",
"url": "https://zerodayinitiative.com/advisories/ZDI-17-869"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugs.launchpad.net/mahara/+bug/1734767",
"refsource" : "MISC",
"url" : "https://bugs.launchpad.net/mahara/+bug/1734767"
},
{
"name": "https://mahara.org/interaction/forum/topic.php?id=8150",
"refsource": "CONFIRM",
"url": "https://mahara.org/interaction/forum/topic.php?id=8150"
},
{
"name": "https://bugs.launchpad.net/mahara/+bug/1734767",
"refsource": "MISC",
"url": "https://bugs.launchpad.net/mahara/+bug/1734767"
},
{
"name": "https://reviews.mahara.org/#/c/8312/",
"refsource": "CONFIRM",

View File

@ -53,20 +53,15 @@
"references": {
"reference_data": [
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07678eca2cf9c9a18584e546c2b2a0d0c9a3150c",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07678eca2cf9c9a18584e546c2b2a0d0c9a3150c"
"name": "DSA-3927",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3927"
},
{
"name": "https://github.com/torvalds/linux/commit/07678eca2cf9c9a18584e546c2b2a0d0c9a3150c",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/07678eca2cf9c9a18584e546c2b2a0d0c9a3150c"
},
{
"name" : "DSA-3927",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3927"
},
{
"name": "DSA-3945",
"refsource": "DEBIAN",
@ -76,6 +71,11 @@
"name": "99095",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99095"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07678eca2cf9c9a18584e546c2b2a0d0c9a3150c",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07678eca2cf9c9a18584e546c2b2a0d0c9a3150c"
}
]
}

View File

@ -76,34 +76,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html"
},
{
"name" : "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f",
"name": "https://www.tenable.com/security/tns-2018-14",
"refsource": "CONFIRM",
"url" : "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f"
},
{
"name" : "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787",
"refsource" : "CONFIRM",
"url" : "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787"
},
{
"name" : "https://www.openssl.org/news/secadv/20180416.txt",
"refsource" : "CONFIRM",
"url" : "https://www.openssl.org/news/secadv/20180416.txt"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20180726-0003/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20180726-0003/"
},
{
"name" : "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/",
"refsource" : "CONFIRM",
"url" : "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"
},
{
"name" : "https://www.tenable.com/security/tns-2018-12",
"refsource" : "CONFIRM",
"url" : "https://www.tenable.com/security/tns-2018-12"
"url": "https://www.tenable.com/security/tns-2018-14"
},
{
"name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133",
@ -111,59 +86,29 @@
"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f"
},
{
"name": "https://www.tenable.com/security/tns-2018-13",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-13"
},
{
"name" : "https://www.tenable.com/security/tns-2018-14",
"refsource" : "CONFIRM",
"url" : "https://www.tenable.com/security/tns-2018-14"
},
{
"name" : "https://www.tenable.com/security/tns-2018-17",
"refsource" : "CONFIRM",
"url" : "https://www.tenable.com/security/tns-2018-17"
},
{
"name" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource" : "CONFIRM",
"url" : "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name" : "DSA-4348",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4348"
},
{
"name": "DSA-4355",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4355"
},
{
"name" : "GLSA-201811-21",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201811-21"
},
{
"name" : "RHSA-2018:3221",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3221"
},
{
"name" : "RHSA-2018:3505",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3505"
},
{
"name" : "USN-3628-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3628-1/"
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787"
},
{
"name": "USN-3628-2",
@ -171,24 +116,79 @@
"url": "https://usn.ubuntu.com/3628-2/"
},
{
"name" : "USN-3692-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3692-1/"
"name": "GLSA-201811-21",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-21"
},
{
"name": "https://www.openssl.org/news/secadv/20180416.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20180416.txt"
},
{
"name": "https://www.tenable.com/security/tns-2018-17",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-17"
},
{
"name": "https://www.tenable.com/security/tns-2018-12",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-12"
},
{
"name": "USN-3692-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3692-2/"
},
{
"name": "RHSA-2018:3505",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3505"
},
{
"name": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/",
"refsource": "CONFIRM",
"url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"
},
{
"name": "103766",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103766"
},
{
"name": "USN-3692-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3692-1/"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name": "RHSA-2018:3221",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
},
{
"name": "DSA-4348",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4348"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180726-0003/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180726-0003/"
},
{
"name": "1040685",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040685"
},
{
"name": "USN-3628-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3628-1/"
}
]
}

View File

@ -53,25 +53,25 @@
},
"references": {
"reference_data": [
{
"name": "1040379",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040379"
},
{
"name": "44149",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44149/"
},
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0821",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0821"
},
{
"name": "102939",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102939"
},
{
"name" : "1040379",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040379"
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0821",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0821"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-12-28T04:34:37.679069",
"ID": "CVE-2018-1000410",
"REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Jenkins",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.145 and earlier, LTS 2.138.1 and earlier"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Jenkins project"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-312"
"value": "n/a"
}
]
}
@ -54,15 +54,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://jenkins.io/security/advisory/2018-10-10/#SECURITY-765",
"refsource" : "CONFIRM",
"url" : "https://jenkins.io/security/advisory/2018-10-10/#SECURITY-765"
},
{
"name": "106532",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106532"
},
{
"name": "https://jenkins.io/security/advisory/2018-10-10/#SECURITY-765",
"refsource": "CONFIRM",
"url": "https://jenkins.io/security/advisory/2018-10-10/#SECURITY-765"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-06-23T11:22:33.013855",
"DATE_REQUESTED": "2018-06-12T19:44:46",
"ID": "CVE-2018-1000512",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "Tooltipy (tooltips for WP)",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "5"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Tooltipy"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "Cross Site Scripting (XSS)"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-11-27T13:54:33.462021",
"DATE_REQUESTED": "2018-10-28T03:45:55",
"ID": "CVE-2018-1000824",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "MegaMek",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "< v0.45.1"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "MegaMek"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "Other/Unknown"
"value": "n/a"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{
"name" : "102994",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102994"
},
{
"name": "1040364",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040364"
},
{
"name": "102994",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102994"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-7385",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,53 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or below, The values of the newpass and confpass parameters in /bin/WebMGR are used in a system call in the firmware. Because there is no user input validation, this leads to authenticated code execution on the device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "BID",
"name": "107030",
"url": "http://www.securityfocus.com/bid/107030"
},
{
"url": "http://packetstormsecurity.com/files/151650/Raisecom-Technology-GPON-ONU-HT803G-07-Command-Injection.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/151650/Raisecom-Technology-GPON-ONU-HT803G-07-Command-Injection.html"
},
{
"refsource": "FULLDISC",
"name": "20190212 KSA-Dev-006:CVE-2019-7385: Authenticated remote code execution on Multiple Raisecom GPON Devices",
"url": "http://seclists.org/fulldisclosure/2019/Feb/34"
},
{
"url": "http://breakthesec.com",
"refsource": "MISC",
"name": "http://breakthesec.com"
},
{
"url": "http://www.breakthesec.com/search/label/0day",
"refsource": "MISC",
"name": "http://www.breakthesec.com/search/label/0day"
},
{
"url": "https://s3curityb3ast.github.io",
"refsource": "MISC",
"name": "https://s3curityb3ast.github.io"
}
]
}