"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 03:27:23 +00:00
parent 23ad40d237
commit 341ce96e75
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
55 changed files with 3562 additions and 3565 deletions

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20001206 DoS by SMTP AUTH command in IPSwitch IMail server",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2000-12/0071.html"
},
{
"name": "2083",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2083"
},
{
"name": "20001206 DoS by SMTP AUTH command in IPSwitch IMail server",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-12/0071.html"
},
{
"name": "http://www.ipswitch.com/Support/IMail/news.html",
"refsource": "CONFIRM",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "MS01-043",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-043"
},
{
"name": "win-nntp-dos(6977)",
"refsource": "XF",
@ -67,6 +62,11 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3183"
},
{
"name": "MS01-043",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-043"
},
{
"name": "oval:org.mitre.oval:def:334",
"refsource": "OVAL",

View File

@ -57,6 +57,11 @@
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2001-148.html"
},
{
"name": "3527",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3527"
},
{
"name": "HPSBTL0112-006",
"refsource": "HP",
@ -66,11 +71,6 @@
"name": "linux-korean-default-umask(7549)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7549"
},
{
"name" : "3527",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/3527"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20011121 PhpNuke Admin password can be stolen !",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=100638850219503&w=2"
"name": "phpnuke-postnuke-insecure-passwords(7596)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7596"
},
{
"name": "3567",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/3567"
},
{
"name" : "phpnuke-postnuke-insecure-passwords(7596)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/7596"
"name": "20011121 PhpNuke Admin password can be stolen !",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=100638850219503&w=2"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/213331"
},
{
"name" : "3314",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/3314"
},
{
"name": "postgresql-nss-authentication-modules(7111)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7111"
},
{
"name": "3314",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3314"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "mandrake-apache-browse-directories(8029)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8029"
},
{
"name": "MDKSA-2001:077",
"refsource": "MANDRAKE",
@ -61,11 +66,6 @@
"name": "VU#913704",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/913704"
},
{
"name" : "mandrake-apache-browse-directories(8029)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/8029"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737385",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737385"
},
{
"name": "http://pkgs.fedoraproject.org/cgit/a2ps.git/plain/a2ps-4.13-security.patch",
"refsource": "CONFIRM",
"url": "http://pkgs.fedoraproject.org/cgit/a2ps.git/plain/a2ps-4.13-security.patch"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1060630",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060630"
},
{
"name": "[oss-security] 20140204 Re: CVE request: a2ps insecure temporary file use",
"refsource": "MLIST",
@ -62,30 +77,15 @@
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q1/257"
},
{
"name" : "[oss-security] 20140205 Re: CVE request: a2ps insecure temporary file use",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2014/q1/237"
},
{
"name" : "http://pkgs.fedoraproject.org/cgit/a2ps.git/plain/a2ps-4.13-security.patch",
"refsource" : "CONFIRM",
"url" : "http://pkgs.fedoraproject.org/cgit/a2ps.git/plain/a2ps-4.13-security.patch"
},
{
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737385",
"refsource" : "CONFIRM",
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737385"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1060630",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1060630"
},
{
"name": "DSA-2892",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2892"
},
{
"name": "[oss-security] 20140205 Re: CVE request: a2ps insecure temporary file use",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q1/237"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20060424 Multiple browsers Windows mailto protocol Office 2003 file attachment exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432009/100/0/threaded"
"name": "ADV-2006-1538",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1538"
},
{
"name": "http://ingehenriksen.blogspot.com/2006/04/office-2003-file-attachment-exploit.html",
@ -63,9 +63,9 @@
"url": "http://ingehenriksen.blogspot.com/2006/04/office-2003-file-attachment-exploit.html"
},
{
"name" : "ADV-2006-1538",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1538"
"name": "20060424 Multiple browsers Windows mailto protocol Office 2003 file attachment exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432009/100/0/threaded"
},
{
"name": "office-mailto-obtain-information(26118)",

View File

@ -62,15 +62,15 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2050"
},
{
"name" : "20316",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20316"
},
{
"name": "geeklog-auth-libsecurity-sql-injection(26863)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26863"
},
{
"name": "20316",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20316"
}
]
}

View File

@ -52,11 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "sun-storade-code-execution(26899)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26899"
},
{
"name": "20445",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20445"
},
{
"name": "102305",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102305-1"
},
{
"name": "1016215",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016215"
},
{
"name": "18266",
"refsource": "BID",
@ -66,21 +81,6 @@
"name": "ADV-2006-2139",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2139"
},
{
"name" : "1016215",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016215"
},
{
"name" : "20445",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20445"
},
{
"name" : "sun-storade-code-execution(26899)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26899"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20061202 [ISecAuditors Advisories] BlueSocket web administration is vulnerable to XSS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/453412/100/0/threaded"
"name": "ADV-2006-4844",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4844"
},
{
"name": "21419",
@ -63,14 +63,14 @@
"url": "http://www.securityfocus.com/bid/21419"
},
{
"name" : "ADV-2006-4844",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/4844"
"name": "bluesecurecontroller-admin-xss(30735)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30735"
},
{
"name" : "23238",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/23238"
"name": "20061202 [ISecAuditors Advisories] BlueSocket web administration is vulnerable to XSS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/453412/100/0/threaded"
},
{
"name": "1991",
@ -78,9 +78,9 @@
"url": "http://securityreason.com/securityalert/1991"
},
{
"name" : "bluesecurecontroller-admin-xss(30735)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30735"
"name": "23238",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23238"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "mhbook-inmailshow-symlink(46709)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46709"
},
{
"name": "32399",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32399"
},
{
"name": "[debian-devel] 20080813 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages",
"refsource": "MLIST",
@ -61,16 +71,6 @@
"name": "http://uvw.ru/report.sid.txt",
"refsource": "MISC",
"url": "http://uvw.ru/report.sid.txt"
},
{
"name" : "32399",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32399"
},
{
"name" : "mhbook-inmailshow-symlink(46709)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46709"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "6519",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6519"
},
{
"name": "phpicalendar-print-file-include(48322)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48322"
},
{
"name": "6519",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6519"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2011/mfsa2011-43.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2011/mfsa2011-43.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=653926",
"refsource": "CONFIRM",
@ -67,6 +62,11 @@
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:141"
},
{
"name": "http://www.mozilla.org/security/announce/2011/mfsa2011-43.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-43.html"
},
{
"name": "oval:org.mitre.oval:def:14121",
"refsource": "OVAL",

View File

@ -57,25 +57,25 @@
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-49.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=674776",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=674776"
},
{
"name": "RHSA-2011:1439",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1439.html"
},
{
"name" : "SUSE-SU-2011:1256",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html"
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=674776",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=674776"
},
{
"name": "oval:org.mitre.oval:def:13870",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13870"
},
{
"name": "SUSE-SU-2011:1256",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html"
}
]
}

View File

@ -52,40 +52,40 @@
},
"references": {
"reference_data": [
{
"name" : "20111017 AST-2011-012: Remote crash vulnerability in SIP channel driver",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/520141/100/0/threaded"
},
{
"name" : "http://downloads.digium.com/pub/security/AST-2011-012.html",
"refsource" : "CONFIRM",
"url" : "http://downloads.digium.com/pub/security/AST-2011-012.html"
},
{
"name" : "50177",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/50177"
},
{
"name": "1026191",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026191"
},
{
"name" : "46420",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/46420"
},
{
"name": "8478",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8478"
},
{
"name": "46420",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46420"
},
{
"name": "20111017 AST-2011-012: Remote crash vulnerability in SIP channel driver",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/520141/100/0/threaded"
},
{
"name": "50177",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50177"
},
{
"name": "asterisk-sip-channel-driver-dos(70706)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70706"
},
{
"name": "http://downloads.digium.com/pub/security/AST-2011-012.html",
"refsource": "CONFIRM",
"url": "http://downloads.digium.com/pub/security/AST-2011-012.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4087",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20111028 Re: CVE Request: Multiple remote denial of service in Linux bridge networking code 2.6.37-3.0",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/10/28/14"
},
{
"name" : "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"name": "https://github.com/torvalds/linux/commit/f8e9881c2aef1e982e5abc25c046820cd0b7cf64",
"refsource": "CONFIRM",
"url" : "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
"url": "https://github.com/torvalds/linux/commit/f8e9881c2aef1e982e5abc25c046820cd0b7cf64"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f8e9881c2aef1e982e5abc25c046820cd0b7cf64",
@ -68,9 +63,14 @@
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f8e9881c2aef1e982e5abc25c046820cd0b7cf64"
},
{
"name" : "https://github.com/torvalds/linux/commit/f8e9881c2aef1e982e5abc25c046820cd0b7cf64",
"name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39",
"refsource": "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/f8e9881c2aef1e982e5abc25c046820cd0b7cf64"
"url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39"
},
{
"name": "[oss-security] 20111028 Re: CVE Request: Multiple remote denial of service in Linux bridge networking code 2.6.37-3.0",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/10/28/14"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-0007",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "MS13-002",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-002"
},
{
"name": "TA13-008A",
"refsource": "CERT",
@ -66,6 +61,11 @@
"name": "oval:org.mitre.oval:def:15458",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15458"
},
{
"name": "MS13-002",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-002"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-0632",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/30210"
},
{
"name" : "http://www.adobe.com/support/security/advisories/apsa13-01.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/advisories/apsa13-01.html"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb13-03.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb13-03.html"
},
{
"name": "http://www.adobe.com/support/security/advisories/apsa13-01.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/advisories/apsa13-01.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2013-0884",
"STATE": "PUBLIC"
},
@ -62,15 +62,15 @@
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=172984"
},
{
"name" : "openSUSE-SU-2013:0454",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-03/msg00045.html"
},
{
"name": "oval:org.mitre.oval:def:16101",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16101"
},
{
"name": "openSUSE-SU-2013:0454",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00045.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1236",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1915",
"STATE": "PUBLIC"
},
@ -53,64 +53,24 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130403 Re: CVE Request -- ModSecurity (X < 2.7.3): Vulnerable to XXE attacks",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/04/03/7"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=947842",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=947842"
},
{
"name" : "https://github.com/SpiderLabs/ModSecurity/blob/master/CHANGES",
"refsource" : "CONFIRM",
"url" : "https://github.com/SpiderLabs/ModSecurity/blob/master/CHANGES"
"name": "openSUSE-SU-2013:1342",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html"
},
{
"name": "https://github.com/SpiderLabs/ModSecurity/commit/d4d80b38aa85eccb26e3c61b04d16e8ca5de76fe",
"refsource": "CONFIRM",
"url": "https://github.com/SpiderLabs/ModSecurity/commit/d4d80b38aa85eccb26e3c61b04d16e8ca5de76fe"
},
{
"name" : "DSA-2659",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2659"
},
{
"name" : "FEDORA-2013-4831",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101911.html"
},
{
"name" : "FEDORA-2013-4834",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101898.html"
},
{
"name" : "FEDORA-2013-4908",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102616.html"
},
{
"name" : "MDVSA-2013:156",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:156"
},
{
"name": "openSUSE-SU-2013:1331",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html"
},
{
"name" : "openSUSE-SU-2013:1336",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html"
},
{
"name" : "openSUSE-SU-2013:1342",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html"
"name": "[oss-security] 20130403 Re: CVE Request -- ModSecurity (X < 2.7.3): Vulnerable to XXE attacks",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/03/7"
},
{
"name": "58810",
@ -118,14 +78,54 @@
"url": "http://www.securityfocus.com/bid/58810"
},
{
"name" : "52847",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/52847"
"name": "FEDORA-2013-4831",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101911.html"
},
{
"name": "MDVSA-2013:156",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:156"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=947842",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=947842"
},
{
"name": "FEDORA-2013-4834",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101898.html"
},
{
"name": "https://github.com/SpiderLabs/ModSecurity/blob/master/CHANGES",
"refsource": "CONFIRM",
"url": "https://github.com/SpiderLabs/ModSecurity/blob/master/CHANGES"
},
{
"name": "FEDORA-2013-4908",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102616.html"
},
{
"name": "52977",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52977"
},
{
"name": "52847",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52847"
},
{
"name": "DSA-2659",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2659"
},
{
"name": "openSUSE-SU-2013:1336",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1956",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130416 Re: Re: Summary of security bugs (now fixed) in user namespaces",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/04/16/11"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3151527ee007b73a0ebd296010f1c0454a919c7d",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3151527ee007b73a0ebd296010f1c0454a919c7d"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6"
},
{
"name": "https://github.com/torvalds/linux/commit/3151527ee007b73a0ebd296010f1c0454a919c7d",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/3151527ee007b73a0ebd296010f1c0454a919c7d"
},
{
"name": "[oss-security] 20130416 Re: Re: Summary of security bugs (now fixed) in user namespaces",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/16/11"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.6"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1988",
"STATE": "PUBLIC"
},
@ -52,6 +52,26 @@
},
"references": {
"reference_data": [
{
"name": "USN-1864-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1864-1"
},
{
"name": "DSA-2688",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2688"
},
{
"name": "openSUSE-SU-2013:1027",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00155.html"
},
{
"name": "FEDORA-2013-9060",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106880.html"
},
{
"name": "[oss-security] 20130523 Fwd: [ANNOUNCE] X.Org Security Advisory: Protocol handling issues in X Window System client libraries",
"refsource": "MLIST",
@ -61,26 +81,6 @@
"name": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23",
"refsource": "CONFIRM",
"url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"
},
{
"name" : "DSA-2688",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2688"
},
{
"name" : "FEDORA-2013-9060",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106880.html"
},
{
"name" : "openSUSE-SU-2013:1027",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00155.html"
},
{
"name" : "USN-1864-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1864-1"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-5473",
"STATE": "PUBLIC"
},

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-5628",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5839",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
"name": "oval:org.mitre.oval:def:19247",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19247"
},
{
"name": "63078",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/63078"
},
{
"name" : "oval:org.mitre.oval:def:19247",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19247"
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5840",
"STATE": "PUBLIC"
},
@ -53,109 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name" : "http://support.apple.com/kb/HT5982",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5982"
},
{
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1018831",
"refsource" : "CONFIRM",
"url" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1018831"
},
{
"name" : "APPLE-SA-2013-10-15-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
"name": "RHSA-2014:0414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "HPSBUX02943",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
},
{
"name" : "HPSBUX02944",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name" : "RHSA-2013:1440",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"name": "RHSA-2013:1447",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
},
{
"name" : "RHSA-2013:1451",
"name": "RHSA-2013:1440",
"refsource": "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"name" : "RHSA-2013:1505",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"name" : "RHSA-2013:1507",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"name" : "RHSA-2013:1508",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"name" : "RHSA-2013:1509",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1509.html"
},
{
"name" : "RHSA-2013:1793",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name" : "RHSA-2014:0414",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "SUSE-SU-2013:1666",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name" : "SUSE-SU-2013:1677",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"name" : "openSUSE-SU-2013:1663",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
"url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
},
{
"name": "USN-2033-1",
@ -167,20 +82,105 @@
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2089-1"
},
{
"name" : "63148",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/63148"
},
{
"name": "oval:org.mitre.oval:def:18990",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18990"
},
{
"name": "RHSA-2013:1508",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1508.html"
},
{
"name": "SUSE-SU-2013:1677",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html"
},
{
"name": "HPSBUX02944",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
},
{
"name": "63148",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63148"
},
{
"name": "RHSA-2013:1505",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21655201"
},
{
"name": "HPSBUX02943",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
},
{
"name": "openSUSE-SU-2013:1663",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
},
{
"name": "SUSE-SU-2013:1666",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
},
{
"name": "RHSA-2013:1793",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1793.html"
},
{
"name": "RHSA-2013:1509",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1509.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "APPLE-SA-2013-10-15-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
},
{
"name": "RHSA-2013:1507",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1507.html"
},
{
"name": "http://support.apple.com/kb/HT5982",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5982"
},
{
"name": "56338",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56338"
},
{
"name": "RHSA-2013:1451",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
},
{
"name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
},
{
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1018831",
"refsource": "CONFIRM",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1018831"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5847",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "55352",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55352"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "63108",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63108"
},
{
"name" : "55352",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/55352"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://iw.mapandroute.de/MapAPI-1.0/releaseHistory.jsp",
"name": "http://www.christian-schneider.net/advisories/CVE-2014-2233.txt",
"refsource": "MISC",
"url" : "http://iw.mapandroute.de/MapAPI-1.0/releaseHistory.jsp"
"url": "http://www.christian-schneider.net/advisories/CVE-2014-2233.txt"
},
{
"name": "http://iw.mapandroute.de/MapAPI-1.1/releaseHistory.jsp",
@ -63,9 +63,9 @@
"url": "http://iw.mapandroute.de/MapAPI-1.1/releaseHistory.jsp"
},
{
"name" : "http://www.christian-schneider.net/advisories/CVE-2014-2233.txt",
"name": "http://iw.mapandroute.de/MapAPI-1.0/releaseHistory.jsp",
"refsource": "MISC",
"url" : "http://www.christian-schneider.net/advisories/CVE-2014-2233.txt"
"url": "http://iw.mapandroute.de/MapAPI-1.0/releaseHistory.jsp"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/03/08/1"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=c88507fbad8055297c1d1e21e599f46960cbee39",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=c88507fbad8055297c1d1e21e599f46960cbee39"
},
{
"name": "[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/03/08/1"
},
{
"name": "SUSE-SU-2015:0481",
"refsource": "SUSE",
@ -77,15 +77,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66095"
},
{
"name" : "1029894",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029894"
},
{
"name": "57250",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57250"
},
{
"name": "1029894",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029894"
}
]
}

View File

@ -57,6 +57,16 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/03/25/2"
},
{
"name": "openSUSE-SU-2014:1279",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html"
},
{
"name": "GLSA-201407-03",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201407-03.xml"
},
{
"name": "[oss-security] 20140325 Xen Security Advisory 89 - HVMOP_set_mem_access is not preemptible",
"refsource": "MLIST",
@ -73,24 +83,14 @@
"url": "http://www.debian.org/security/2014/dsa-3006"
},
{
"name" : "GLSA-201407-03",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201407-03.xml"
},
{
"name" : "openSUSE-SU-2014:1279",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html"
"name": "1029956",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029956"
},
{
"name": "66407",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66407"
},
{
"name" : "1029956",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029956"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20140327 Dell SonicWall EMail Security Appliance Application v7.4.5 - Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/531642/100/0/threaded"
},
{
"name" : "20140328 Dell SonicWall EMail Security 7.4.5 - Multiple Vulnerabilities (Bulletin)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2014/Mar/409"
"name": "1029965",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029965"
},
{
"name": "http://www.vulnerability-lab.com/get_content.php?id=1191",
@ -68,9 +63,9 @@
"url": "http://www.vulnerability-lab.com/get_content.php?id=1191"
},
{
"name" : "http://www.sonicwall.com/us/shared/download/Support-Bulletin_Email-Security_Scripting_Vulnerability__Resolved_in__ES746.pdf",
"refsource" : "CONFIRM",
"url" : "http://www.sonicwall.com/us/shared/download/Support-Bulletin_Email-Security_Scripting_Vulnerability__Resolved_in__ES746.pdf"
"name": "20140327 Dell SonicWall EMail Security Appliance Application v7.4.5 - Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531642/100/0/threaded"
},
{
"name": "66501",
@ -78,9 +73,14 @@
"url": "http://www.securityfocus.com/bid/66501"
},
{
"name" : "1029965",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029965"
"name": "20140328 Dell SonicWall EMail Security 7.4.5 - Multiple Vulnerabilities (Bulletin)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Mar/409"
},
{
"name": "http://www.sonicwall.com/us/shared/download/Support-Bulletin_Email-Security_Scripting_Vulnerability__Resolved_in__ES746.pdf",
"refsource": "CONFIRM",
"url": "http://www.sonicwall.com/us/shared/download/Support-Bulletin_Email-Security_Scripting_Vulnerability__Resolved_in__ES746.pdf"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0185",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0185"
"name": "1038230",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038230"
},
{
"name": "97437",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/97437"
},
{
"name" : "1038230",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038230"
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0185",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0185"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0504",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-03-01"
},
{
"name" : "96726",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/96726"
},
{
"name": "1037968",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037968"
},
{
"name": "96726",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96726"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0539",
"STATE": "PUBLIC"
},
@ -67,16 +67,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://android.googlesource.com/platform/external/libhevc/+/1ab5ce7e42feccd49e49752e6f58f9097ac5d254",
"refsource" : "CONFIRM",
"url" : "https://android.googlesource.com/platform/external/libhevc/+/1ab5ce7e42feccd49e49752e6f58f9097ac5d254"
},
{
"name": "https://source.android.com/security/bulletin/2017-04-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-04-01"
},
{
"name": "https://android.googlesource.com/platform/external/libhevc/+/1ab5ce7e42feccd49e49752e6f58f9097ac5d254",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/external/libhevc/+/1ab5ce7e42feccd49e49752e6f58f9097ac5d254"
},
{
"name": "97330",
"refsource": "BID",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-07-05T00:00:00",
"ID": "CVE-2017-0698",
"STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-09-05T00:00:00",
"ID": "CVE-2017-0802",
"STATE": "PUBLIC"
@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-09-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-09-01"
},
{
"name": "100652",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100652"
},
{
"name": "https://source.android.com/security/bulletin/2017-09-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-09-01"
}
]
}

View File

@ -1,15 +1,12 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"DATE_ASSIGNED" : "2017-05-06T20:43:28.325859",
"ID" : "CVE-2017-1000076",
"REQUESTER" : "ashutoss@andrew.cmu.edu",
"STATE" : "REJECT",
"STATE_DETAIL" : "BAD_REF_URL"
},
"data_format" : "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-1000076",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-switch",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-switch"
},
{
"name": "102069",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102069"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-switch",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-switch"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-12828",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[newsbeuter] 20170817 [CVE-2017-12904] Remote code execution",
"refsource" : "MLIST",
"url" : "https://groups.google.com/forum/#!topic/newsbeuter/iFqSE7Vz-DE"
"name": "https://github.com/akrennmair/newsbeuter/issues/591",
"refsource": "CONFIRM",
"url": "https://github.com/akrennmair/newsbeuter/issues/591"
},
{
"name": "https://github.com/akrennmair/newsbeuter/commit/96e9506ae9e252c548665152d1b8968297128307",
@ -63,9 +63,9 @@
"url": "https://github.com/akrennmair/newsbeuter/commit/96e9506ae9e252c548665152d1b8968297128307"
},
{
"name" : "https://github.com/akrennmair/newsbeuter/issues/591",
"refsource" : "CONFIRM",
"url" : "https://github.com/akrennmair/newsbeuter/issues/591"
"name": "[newsbeuter] 20170817 [CVE-2017-12904] Remote code execution",
"refsource": "MLIST",
"url": "https://groups.google.com/forum/#!topic/newsbeuter/iFqSE7Vz-DE"
},
{
"name": "DSA-3947",

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru",
"refsource" : "MISC",
"url" : "https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru"
},
{
"name": "https://nodesecurity.io/advisories/389",
"refsource": "MISC",
"url": "https://nodesecurity.io/advisories/389"
},
{
"name": "https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru",
"refsource": "MISC",
"url": "https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4306",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4380",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4770",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4774",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{