"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:10:05 +00:00
parent a566728267
commit 38b6174405
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3450 additions and 3450 deletions

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20010727 TXT or HTML? -- IE NEW BUG",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/200109"
},
{
"name": "20010729 Re: TXT or HTML? -- IE NEW BUG",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/200291"
},
{
"name": "20010727 TXT or HTML? -- IE NEW BUG",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/200109"
},
{
"name": "3116",
"refsource": "BID",

View File

@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "20080220 Advisory SE-2008-01: PunBB Blind Password Recovery Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488408/100/200/threaded"
"name": "http://punbb.org/forums/viewtopic.php?id=18460",
"refsource": "CONFIRM",
"url": "http://punbb.org/forums/viewtopic.php?id=18460"
},
{
"name": "29043",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29043"
},
{
"name": "http://sektioneins.de/advisories/SE-2008-01.txt",
"refsource": "MISC",
"url": "http://sektioneins.de/advisories/SE-2008-01.txt"
},
{
"name" : "5165",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5165"
},
{
"name": "http://punbb.org/download/changelogs/1.2.16_to_1.2.17.txt",
"refsource": "CONFIRM",
"url": "http://punbb.org/download/changelogs/1.2.16_to_1.2.17.txt"
},
{
"name" : "http://punbb.org/forums/viewtopic.php?id=18460",
"refsource" : "CONFIRM",
"url" : "http://punbb.org/forums/viewtopic.php?id=18460"
},
{
"name" : "27908",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27908"
},
{
"name": "45561",
"refsource": "OSVDB",
"url": "http://osvdb.org/45561"
},
{
"name" : "29043",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29043"
"name": "20080220 Advisory SE-2008-01: PunBB Blind Password Recovery Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488408/100/200/threaded"
},
{
"name": "5165",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5165"
},
{
"name": "27908",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27908"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20080728 Hewlett-Packard OVIS Probe Builder Arbitrary Process Termination Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=728"
},
{
"name" : "HPSBMA02353",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=121726629109585&w=2"
"name": "31282",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31282"
},
{
"name": "SSRT080066",
@ -68,34 +63,34 @@
"url": "http://marc.info/?l=bugtraq&m=121726629109585&w=2"
},
{
"name" : "30403",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30403"
"name": "HPSBMA02353",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=121726629109585&w=2"
},
{
"name": "hp-ovis-pbovisserver-dos(44041)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44041"
},
{
"name": "ADV-2008-2227",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2227/references"
},
{
"name": "30403",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30403"
},
{
"name": "ADV-2008-2228",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2228/references"
},
{
"name" : "1020568",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020568"
},
{
"name" : "31278",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31278"
},
{
"name" : "31282",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31282"
"name": "20080728 Hewlett-Packard OVIS Probe Builder Arbitrary Process Termination Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=728"
},
{
"name": "4054",
@ -103,9 +98,14 @@
"url": "http://securityreason.com/securityalert/4054"
},
{
"name" : "hp-ovis-pbovisserver-dos(44041)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44041"
"name": "31278",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31278"
},
{
"name": "1020568",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020568"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28812"
},
{
"name" : "29820",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29820"
},
{
"name": "jomcomment-unspecified-sql-injection(41866)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41866"
},
{
"name": "29820",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29820"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.securityfocus.com/bid/32239/exploit",
"refsource" : "MISC",
"url" : "http://www.securityfocus.com/bid/32239/exploit"
"name": "diziportali-film-sql-injection(46522)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46522"
},
{
"name": "32239",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/32239"
},
{
"name" : "49803",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/49803"
"name": "http://www.securityfocus.com/bid/32239/exploit",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/32239/exploit"
},
{
"name": "32675",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/32675"
},
{
"name" : "diziportali-film-sql-injection(46522)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46522"
"name": "49803",
"refsource": "OSVDB",
"url": "http://osvdb.org/49803"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "32818",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32818"
},
{
"name": "32373",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32373"
},
{
"name": "[debian-devel] 20080813 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages",
"refsource": "MLIST",
@ -62,16 +72,6 @@
"refsource": "MISC",
"url": "http://uvw.ru/report.sid.txt"
},
{
"name" : "32373",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32373"
},
{
"name" : "32818",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32818"
},
{
"name": "p3nfs-bluetooth-symlink(46707)",
"refsource": "XF",

View File

@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "7052",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7052"
},
{
"name": "32201",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32201"
},
{
"name" : "ADV-2008-3076",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3076"
"name": "4833",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4833"
},
{
"name": "32637",
@ -73,9 +68,14 @@
"url": "http://secunia.com/advisories/32637"
},
{
"name" : "4833",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4833"
"name": "7052",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7052"
},
{
"name": "ADV-2008-3076",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3076"
},
{
"name": "domainsellerpro-index-sql-injection(46475)",

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "4881",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4881"
},
{
"name": "7515",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7515"
},
{
"name" : "32915",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32915"
},
{
"name": "33211",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33211"
},
{
"name" : "4881",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4881"
"name": "32915",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32915"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "7302",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7302"
"name": "32894",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32894"
},
{
"name": "32551",
@ -68,9 +68,9 @@
"url": "http://www.vupen.com/english/advisories/2008/3294"
},
{
"name" : "32894",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32894"
"name": "7302",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7302"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2011-2275",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
},
{
"name": "TA11-201A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2508",
"STATE": "PUBLIC"
},
@ -52,45 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20110707 phpMyAdmin 3.x Multiple Remote Code Executions",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/518804/100/0/threaded"
},
{
"name" : "[oss-security] 20110628 CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/28/2"
},
{
"name" : "[oss-security] 20110628 Re: CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/28/6"
},
{
"name" : "[oss-security] 20110628 Re: [Phpmyadmin-security] CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/28/8"
},
{
"name" : "[oss-security] 20110629 Re: CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/06/29/11"
},
{
"name" : "http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html",
"refsource" : "MISC",
"url" : "http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html"
},
{
"name": "http://www.xxor.se/advisories/phpMyAdmin_3.x_Multiple_Remote_Code_Executions.txt",
"refsource": "MISC",
"url": "http://www.xxor.se/advisories/phpMyAdmin_3.x_Multiple_Remote_Code_Executions.txt"
},
{
"name" : "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=b434320eff8ca9c2fc1b043c1804f868341af9a7",
"refsource" : "CONFIRM",
"url" : "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=b434320eff8ca9c2fc1b043c1804f868341af9a7"
"name": "[oss-security] 20110628 CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/28/2"
},
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2011-008/",
@ -103,34 +73,64 @@
"url": "http://www.phpmyadmin.net/home_page/security/PMASA-2011-8.php"
},
{
"name" : "DSA-2286",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2011/dsa-2286"
"name": "45292",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45292"
},
{
"name" : "FEDORA-2011-9144",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062719.html"
"name": "[oss-security] 20110628 Re: CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/28/6"
},
{
"name" : "MDVSA-2011:124",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:124"
"name": "[oss-security] 20110628 Re: [Phpmyadmin-security] CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/28/8"
},
{
"name": "73614",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/73614"
},
{
"name": "MDVSA-2011:124",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:124"
},
{
"name": "8306",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8306"
},
{
"name": "45139",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45139"
},
{
"name" : "45292",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/45292"
"name": "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=b434320eff8ca9c2fc1b043c1804f868341af9a7",
"refsource": "CONFIRM",
"url": "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=b434320eff8ca9c2fc1b043c1804f868341af9a7"
},
{
"name": "DSA-2286",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2286"
},
{
"name": "20110707 phpMyAdmin 3.x Multiple Remote Code Executions",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/518804/100/0/threaded"
},
{
"name": "[oss-security] 20110629 Re: CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/06/29/11"
},
{
"name": "http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html",
"refsource": "MISC",
"url": "http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html"
},
{
"name": "45315",
@ -138,9 +138,9 @@
"url": "http://secunia.com/advisories/45315"
},
{
"name" : "8306",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/8306"
"name": "FEDORA-2011-9144",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062719.html"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119",
"refsource" : "CONFIRM",
"url" : "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=720694",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=720694"
},
{
"name": "DSA-2291",
"refsource": "DEBIAN",
@ -72,6 +62,16 @@
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:123"
},
{
"name": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119",
"refsource": "CONFIRM",
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=720694",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720694"
},
{
"name": "RHSA-2012:0103",
"refsource": "REDHAT",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2903",
"STATE": "PUBLIC"
},
@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110809 Re: CVE request: heap overflow in tcptrack < 1.4.2",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2011/q3/293"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=729096",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=729096"
},
{
"name" : "[oss-security] 20110831 Re: CVE request: heap overflow in tcptrack < 1.4.2",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/08/31/1"
"name": "tcptrack-commandline-bo(69467)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69467"
},
{
"name": "http://www.rhythm.cx/~steve/devel/tcptrack/",
"refsource": "CONFIRM",
"url": "http://www.rhythm.cx/~steve/devel/tcptrack/"
},
{
"name" : "https://bugs.gentoo.org/show_bug.cgi?id=377917",
"refsource" : "CONFIRM",
"url" : "https://bugs.gentoo.org/show_bug.cgi?id=377917"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=729096",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=729096"
},
{
"name": "49352",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49352"
},
{
"name" : "tcptrack-commandline-bo(69467)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69467"
"name": "https://bugs.gentoo.org/show_bug.cgi?id=377917",
"refsource": "CONFIRM",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=377917"
},
{
"name": "[oss-security] 20110831 Re: CVE request: heap overflow in tcptrack < 1.4.2",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/31/1"
},
{
"name": "[oss-security] 20110809 Re: CVE request: heap overflow in tcptrack < 1.4.2",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2011/q3/293"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-0017",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-0123",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-0413",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
},
{
"name" : "MDVSA-2013:150",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name": "oval:org.mitre.oval:def:19409",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19409"
},
{
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-0633",
"STATE": "PUBLIC"
},
@ -62,16 +62,16 @@
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0243.html"
},
{
"name" : "SUSE-SU-2013:0288",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00007.html"
},
{
"name": "openSUSE-SU-2013:0279",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00004.html"
},
{
"name": "SUSE-SU-2013:0288",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00007.html"
},
{
"name": "openSUSE-SU-2013:0284",
"refsource": "SUSE",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-0707",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.justsystems.com/jp/info/js13001.html",
"refsource" : "CONFIRM",
"url" : "http://www.justsystems.com/jp/info/js13001.html"
"name": "JVNDB-2013-000015",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000015"
},
{
"name": "JVN#16817324",
@ -63,9 +63,9 @@
"url": "http://jvn.jp/en/jp/JVN16817324/index.html"
},
{
"name" : "JVNDB-2013-000015",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000015"
"name": "http://www.justsystems.com/jp/info/js13001.html",
"refsource": "CONFIRM",
"url": "http://www.justsystems.com/jp/info/js13001.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2013-0726",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-1017",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT5770",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5770"
},
{
"name": "APPLE-SA-2013-05-22-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/May/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT5770",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5770"
},
{
"name": "oval:org.mitre.oval:def:16606",
"refsource": "OVAL",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3116",
"STATE": "PUBLIC"
},
@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "MS13-047",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-047"
},
{
"name": "TA13-168A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-168A"
},
{
"name": "MS13-047",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-047"
},
{
"name": "oval:org.mitre.oval:def:16914",
"refsource": "OVAL",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-3329",
"STATE": "PUBLIC"
},
@ -52,31 +52,11 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb13-14.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb13-14.html"
},
{
"name" : "RHSA-2013:0825",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0825.html"
},
{
"name" : "SUSE-SU-2013:0798",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html"
},
{
"name": "openSUSE-SU-2013:0892",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html"
},
{
"name" : "openSUSE-SU-2013:0954",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html"
},
{
"name": "oval:org.mitre.oval:def:16913",
"refsource": "OVAL",
@ -86,6 +66,26 @@
"name": "53442",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53442"
},
{
"name": "SUSE-SU-2013:0798",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html"
},
{
"name": "openSUSE-SU-2013:0954",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb13-14.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb13-14.html"
},
{
"name": "RHSA-2013:0825",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0825.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-3575",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3856",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-072"
},
{
"name" : "TA13-253A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-253A"
},
{
"name": "oval:org.mitre.oval:def:18797",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18797"
},
{
"name": "TA13-253A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4283",
"STATE": "PUBLIC"
},
@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:1182",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1182.html"
},
{
"name": "http://directory.fedoraproject.org/wiki/Releases/1.3.0.8",
"refsource": "CONFIRM",
"url": "http://directory.fedoraproject.org/wiki/Releases/1.3.0.8"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=999634",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=999634"
},
{
"name" : "RHSA-2013:1182",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1182.html"
"name": "54650",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54650"
},
{
"name": "54586",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/54586"
},
{
"name" : "54650",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54650"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=999634",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=999634"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4404",
"STATE": "PUBLIC"
},

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf",
"name": "http://www.kb.cert.org/vuls/id/AAMN-98MUK2",
"refsource": "CONFIRM",
"url" : "http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf"
"url": "http://www.kb.cert.org/vuls/id/AAMN-98MUK2"
},
{
"name": "VU#662676",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/662676"
},
{
"name": "http://www.kb.cert.org/vuls/id/AAMN-98MU7H",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/AAMN-98MU7H"
},
{
"name" : "http://www.kb.cert.org/vuls/id/AAMN-98MUK2",
"refsource" : "CONFIRM",
"url" : "http://www.kb.cert.org/vuls/id/AAMN-98MUK2"
},
{
"name": "http://www.monroe-electronics.com/MONROE_ELECTRONICS_PDF/130604-Monroe-Security-PR.pdf",
"refsource": "CONFIRM",
"url": "http://www.monroe-electronics.com/MONROE_ELECTRONICS_PDF/130604-Monroe-Security-PR.pdf"
},
{
"name" : "VU#662676",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/662676"
"name": "http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf",
"refsource": "CONFIRM",
"url": "http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf"
}
]
}

View File

@ -54,9 +54,9 @@
"references": {
"reference_data": [
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
"name": "1039152",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039152"
},
{
"name": "100367",
@ -64,9 +64,9 @@
"url": "http://www.securityfocus.com/bid/100367"
},
{
"name" : "1039152",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039152"
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4408",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,70 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2019/01/msg00025.html"
},
{
"name" : "[debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2019/02/msg00024.html"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2019-01/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2019-01/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2019-02/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2019-02/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2019-03/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2019-03/"
},
{
"name" : "DSA-4376",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2019/dsa-4376"
},
{
"name" : "DSA-4392",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2019/dsa-4392"
},
{
"name" : "GLSA-201903-04",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201903-04"
},
{
"name" : "RHSA-2019:0218",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2019:0218"
},
{
"name": "RHSA-2019:0219",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0219"
},
{
"name" : "RHSA-2019:0269",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2019:0269"
},
{
"name" : "RHSA-2019:0270",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2019:0270"
},
{
"name" : "USN-3874-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3874-1/"
"name": "https://www.mozilla.org/security/advisories/mfsa2019-01/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-01/"
},
{
"name": "USN-3897-1",
@ -126,6 +71,61 @@
"name": "106781",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106781"
},
{
"name": "GLSA-201903-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201903-04"
},
{
"name": "USN-3874-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3874-1/"
},
{
"name": "RHSA-2019:0269",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0269"
},
{
"name": "RHSA-2019:0218",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0218"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-02/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-02/"
},
{
"name": "DSA-4376",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4376"
},
{
"name": "[debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00024.html"
},
{
"name": "[debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00025.html"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-03/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-03/"
},
{
"name": "DSA-4392",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4392"
},
{
"name": "RHSA-2019:0270",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0270"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20181023 [SYSS-2018-027] missing X.509 validation with Polycom VVX Phones (Skype for Business, on-premise) - CVE-2018-18568",
"refsource" : "BUGTRAQ",
"url" : "https://seclists.org/bugtraq/2018/Oct/36"
},
{
"name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-027.txt",
"refsource": "MISC",
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-027.txt"
},
{
"name": "20181023 [SYSS-2018-027] missing X.509 validation with Polycom VVX Phones (Skype for Business, on-premise) - CVE-2018-18568",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2018/Oct/36"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html"
},
{
"name": "45782",
"refsource": "EXPLOIT-DB",
@ -61,11 +66,6 @@
"name": "20181102 Multiple Privilege Escalation Vulnerabilities in LiquidVPN for MacOS (CVE-2018-18856, CVE-2018-18857, CVE-2018-18858, CVE-2018-18859)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Nov/1"
},
{
"name" : "http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html"
}
]
}

View File

@ -65,16 +65,16 @@
},
"references": {
"reference_data": [
{
"name" : "44920",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/44920/"
},
{
"name": "20180522 DSA-2018-095: Dell EMC RecoverPoint Multiple Vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/May/61"
},
{
"name": "44920",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44920/"
},
{
"name": "104246",
"refsource": "BID",

View File

@ -57,24 +57,24 @@
"references": {
"reference_data": [
{
"name" : "[www-announce] 20180408 [SECURITY] CVE-2018-1308: XXE attack through Apache Solr's DIH's dataConfig request parameter",
"refsource" : "MLIST",
"url" : "https://mail-archives.apache.org/mod_mbox/www-announce/201804.mbox/%3C000001d3cf68%245ac69af0%241053d0d0%24%40apache.org%3E"
"name": "DSA-4194",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4194"
},
{
"name": "[debian-lts-announce] 20180424 [SECURITY] [DLA 1360-1] lucene-solr security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00025.html"
},
{
"name": "[www-announce] 20180408 [SECURITY] CVE-2018-1308: XXE attack through Apache Solr's DIH's dataConfig request parameter",
"refsource": "MLIST",
"url": "https://mail-archives.apache.org/mod_mbox/www-announce/201804.mbox/%3C000001d3cf68%245ac69af0%241053d0d0%24%40apache.org%3E"
},
{
"name": "https://issues.apache.org/jira/browse/SOLR-11971",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/SOLR-11971"
},
{
"name" : "DSA-4194",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4194"
}
]
}

View File

@ -73,6 +73,11 @@
},
"references": {
"reference_data": [
{
"name": "ibm-netezza-cve20181460-priv-escalation(140211)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/140211"
},
{
"name": "https://www.tenable.com/security/research/tra-2018-13",
"refsource": "MISC",
@ -87,11 +92,6 @@
"name": "104486",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104486"
},
{
"name" : "ibm-netezza-cve20181460-priv-escalation(140211)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/140211"
}
]
}