mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
a566728267
commit
38b6174405
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20010727 TXT or HTML? -- IE NEW BUG",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/200109"
|
||||
},
|
||||
{
|
||||
"name": "20010729 Re: TXT or HTML? -- IE NEW BUG",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/200291"
|
||||
},
|
||||
{
|
||||
"name": "20010727 TXT or HTML? -- IE NEW BUG",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/200109"
|
||||
},
|
||||
{
|
||||
"name": "3116",
|
||||
"refsource": "BID",
|
||||
|
@ -53,44 +53,44 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080220 Advisory SE-2008-01: PunBB Blind Password Recovery Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/488408/100/200/threaded"
|
||||
"name": "http://punbb.org/forums/viewtopic.php?id=18460",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://punbb.org/forums/viewtopic.php?id=18460"
|
||||
},
|
||||
{
|
||||
"name": "29043",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29043"
|
||||
},
|
||||
{
|
||||
"name": "http://sektioneins.de/advisories/SE-2008-01.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://sektioneins.de/advisories/SE-2008-01.txt"
|
||||
},
|
||||
{
|
||||
"name" : "5165",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/5165"
|
||||
},
|
||||
{
|
||||
"name": "http://punbb.org/download/changelogs/1.2.16_to_1.2.17.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://punbb.org/download/changelogs/1.2.16_to_1.2.17.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://punbb.org/forums/viewtopic.php?id=18460",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://punbb.org/forums/viewtopic.php?id=18460"
|
||||
},
|
||||
{
|
||||
"name" : "27908",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27908"
|
||||
},
|
||||
{
|
||||
"name": "45561",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/45561"
|
||||
},
|
||||
{
|
||||
"name" : "29043",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29043"
|
||||
"name": "20080220 Advisory SE-2008-01: PunBB Blind Password Recovery Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/488408/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name": "5165",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5165"
|
||||
},
|
||||
{
|
||||
"name": "27908",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27908"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080728 Hewlett-Packard OVIS Probe Builder Arbitrary Process Termination Vulnerability",
|
||||
"refsource" : "IDEFENSE",
|
||||
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=728"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMA02353",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=121726629109585&w=2"
|
||||
"name": "31282",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31282"
|
||||
},
|
||||
{
|
||||
"name": "SSRT080066",
|
||||
@ -68,34 +63,34 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=121726629109585&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "30403",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30403"
|
||||
"name": "HPSBMA02353",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=121726629109585&w=2"
|
||||
},
|
||||
{
|
||||
"name": "hp-ovis-pbovisserver-dos(44041)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44041"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2227",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2227/references"
|
||||
},
|
||||
{
|
||||
"name": "30403",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30403"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2228",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2228/references"
|
||||
},
|
||||
{
|
||||
"name" : "1020568",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1020568"
|
||||
},
|
||||
{
|
||||
"name" : "31278",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31278"
|
||||
},
|
||||
{
|
||||
"name" : "31282",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31282"
|
||||
"name": "20080728 Hewlett-Packard OVIS Probe Builder Arbitrary Process Termination Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=728"
|
||||
},
|
||||
{
|
||||
"name": "4054",
|
||||
@ -103,9 +98,14 @@
|
||||
"url": "http://securityreason.com/securityalert/4054"
|
||||
},
|
||||
{
|
||||
"name" : "hp-ovis-pbovisserver-dos(44041)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44041"
|
||||
"name": "31278",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31278"
|
||||
},
|
||||
{
|
||||
"name": "1020568",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020568"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/28812"
|
||||
},
|
||||
{
|
||||
"name" : "29820",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/29820"
|
||||
},
|
||||
{
|
||||
"name": "jomcomment-unspecified-sql-injection(41866)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41866"
|
||||
},
|
||||
{
|
||||
"name": "29820",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29820"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.securityfocus.com/bid/32239/exploit",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.securityfocus.com/bid/32239/exploit"
|
||||
"name": "diziportali-film-sql-injection(46522)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46522"
|
||||
},
|
||||
{
|
||||
"name": "32239",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/32239"
|
||||
},
|
||||
{
|
||||
"name" : "49803",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/49803"
|
||||
"name": "http://www.securityfocus.com/bid/32239/exploit",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securityfocus.com/bid/32239/exploit"
|
||||
},
|
||||
{
|
||||
"name": "32675",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://secunia.com/advisories/32675"
|
||||
},
|
||||
{
|
||||
"name" : "diziportali-film-sql-injection(46522)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46522"
|
||||
"name": "49803",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/49803"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "32818",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32818"
|
||||
},
|
||||
{
|
||||
"name": "32373",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32373"
|
||||
},
|
||||
{
|
||||
"name": "[debian-devel] 20080813 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages",
|
||||
"refsource": "MLIST",
|
||||
@ -62,16 +72,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://uvw.ru/report.sid.txt"
|
||||
},
|
||||
{
|
||||
"name" : "32373",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/32373"
|
||||
},
|
||||
{
|
||||
"name" : "32818",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32818"
|
||||
},
|
||||
{
|
||||
"name": "p3nfs-bluetooth-symlink(46707)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,20 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7052",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7052"
|
||||
},
|
||||
{
|
||||
"name": "32201",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32201"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-3076",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/3076"
|
||||
"name": "4833",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4833"
|
||||
},
|
||||
{
|
||||
"name": "32637",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://secunia.com/advisories/32637"
|
||||
},
|
||||
{
|
||||
"name" : "4833",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4833"
|
||||
"name": "7052",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7052"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-3076",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3076"
|
||||
},
|
||||
{
|
||||
"name": "domainsellerpro-index-sql-injection(46475)",
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "4881",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4881"
|
||||
},
|
||||
{
|
||||
"name": "7515",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7515"
|
||||
},
|
||||
{
|
||||
"name" : "32915",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/32915"
|
||||
},
|
||||
{
|
||||
"name": "33211",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33211"
|
||||
},
|
||||
{
|
||||
"name" : "4881",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4881"
|
||||
"name": "32915",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32915"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7302",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7302"
|
||||
"name": "32894",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32894"
|
||||
},
|
||||
{
|
||||
"name": "32551",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3294"
|
||||
},
|
||||
{
|
||||
"name" : "32894",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32894"
|
||||
"name": "7302",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7302"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2011-2275",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
|
||||
},
|
||||
{
|
||||
"name": "TA11-201A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-2508",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,45 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20110707 phpMyAdmin 3.x Multiple Remote Code Executions",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/518804/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110628 CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/06/28/2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110628 Re: CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/06/28/6"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110628 Re: [Phpmyadmin-security] CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/06/28/8"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110629 Re: CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/06/29/11"
|
||||
},
|
||||
{
|
||||
"name" : "http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.xxor.se/advisories/phpMyAdmin_3.x_Multiple_Remote_Code_Executions.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.xxor.se/advisories/phpMyAdmin_3.x_Multiple_Remote_Code_Executions.txt"
|
||||
},
|
||||
{
|
||||
"name" : "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=b434320eff8ca9c2fc1b043c1804f868341af9a7",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=b434320eff8ca9c2fc1b043c1804f868341af9a7"
|
||||
"name": "[oss-security] 20110628 CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/06/28/2"
|
||||
},
|
||||
{
|
||||
"name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2011-008/",
|
||||
@ -103,34 +73,64 @@
|
||||
"url": "http://www.phpmyadmin.net/home_page/security/PMASA-2011-8.php"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2286",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2011/dsa-2286"
|
||||
"name": "45292",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/45292"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2011-9144",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062719.html"
|
||||
"name": "[oss-security] 20110628 Re: CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/06/28/6"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2011:124",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:124"
|
||||
"name": "[oss-security] 20110628 Re: [Phpmyadmin-security] CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/06/28/8"
|
||||
},
|
||||
{
|
||||
"name": "73614",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/73614"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2011:124",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:124"
|
||||
},
|
||||
{
|
||||
"name": "8306",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/8306"
|
||||
},
|
||||
{
|
||||
"name": "45139",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/45139"
|
||||
},
|
||||
{
|
||||
"name" : "45292",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/45292"
|
||||
"name": "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=b434320eff8ca9c2fc1b043c1804f868341af9a7",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin;a=commit;h=b434320eff8ca9c2fc1b043c1804f868341af9a7"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2286",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2011/dsa-2286"
|
||||
},
|
||||
{
|
||||
"name": "20110707 phpMyAdmin 3.x Multiple Remote Code Executions",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/518804/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110629 Re: CVE Request: phpMyAdmin 3.4 Multiple Vulnerabilities",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/06/29/11"
|
||||
},
|
||||
{
|
||||
"name": "http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html"
|
||||
},
|
||||
{
|
||||
"name": "45315",
|
||||
@ -138,9 +138,9 @@
|
||||
"url": "http://secunia.com/advisories/45315"
|
||||
},
|
||||
{
|
||||
"name" : "8306",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/8306"
|
||||
"name": "FEDORA-2011-9144",
|
||||
"refsource": "FEDORA",
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062719.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=720694",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=720694"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2291",
|
||||
"refsource": "DEBIAN",
|
||||
@ -72,6 +62,16 @@
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:123"
|
||||
},
|
||||
{
|
||||
"name": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=720694",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720694"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2012:0103",
|
||||
"refsource": "REDHAT",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2011-2903",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20110809 Re: CVE request: heap overflow in tcptrack < 1.4.2",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2011/q3/293"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=729096",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=729096"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20110831 Re: CVE request: heap overflow in tcptrack < 1.4.2",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2011/08/31/1"
|
||||
"name": "tcptrack-commandline-bo(69467)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69467"
|
||||
},
|
||||
{
|
||||
"name": "http://www.rhythm.cx/~steve/devel/tcptrack/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.rhythm.cx/~steve/devel/tcptrack/"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugs.gentoo.org/show_bug.cgi?id=377917",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugs.gentoo.org/show_bug.cgi?id=377917"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=729096",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=729096"
|
||||
},
|
||||
{
|
||||
"name": "49352",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/49352"
|
||||
},
|
||||
{
|
||||
"name" : "tcptrack-commandline-bo(69467)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69467"
|
||||
"name": "https://bugs.gentoo.org/show_bug.cgi?id=377917",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.gentoo.org/show_bug.cgi?id=377917"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110831 Re: CVE request: heap overflow in tcptrack < 1.4.2",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2011/08/31/1"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20110809 Re: CVE request: heap overflow in tcptrack < 1.4.2",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2011/q3/293"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-0017",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2013-0123",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-0413",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:150",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:19409",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19409"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:150",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2013-0633",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -62,16 +62,16 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0243.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0288",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0279",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00004.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0288",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0284",
|
||||
"refsource": "SUSE",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"ID": "CVE-2013-0707",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.justsystems.com/jp/info/js13001.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.justsystems.com/jp/info/js13001.html"
|
||||
"name": "JVNDB-2013-000015",
|
||||
"refsource": "JVNDB",
|
||||
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000015"
|
||||
},
|
||||
{
|
||||
"name": "JVN#16817324",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://jvn.jp/en/jp/JVN16817324/index.html"
|
||||
},
|
||||
{
|
||||
"name" : "JVNDB-2013-000015",
|
||||
"refsource" : "JVNDB",
|
||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000015"
|
||||
"name": "http://www.justsystems.com/jp/info/js13001.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.justsystems.com/jp/info/js13001.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2013-0726",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "product-security@apple.com",
|
||||
"ID": "CVE-2013-1017",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT5770",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.apple.com/kb/HT5770"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2013-05-22-1",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2013/May/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.apple.com/kb/HT5770",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.apple.com/kb/HT5770"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16606",
|
||||
"refsource": "OVAL",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-3116",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "MS13-047",
|
||||
"refsource" : "MS",
|
||||
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-047"
|
||||
},
|
||||
{
|
||||
"name": "TA13-168A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-168A"
|
||||
},
|
||||
{
|
||||
"name": "MS13-047",
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-047"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16914",
|
||||
"refsource": "OVAL",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2013-3329",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,31 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.adobe.com/support/security/bulletins/apsb13-14.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.adobe.com/support/security/bulletins/apsb13-14.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0825",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0825.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0798",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0892",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0954",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16913",
|
||||
"refsource": "OVAL",
|
||||
@ -86,6 +66,26 @@
|
||||
"name": "53442",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/53442"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0798",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0954",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb13-14.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb13-14.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0825",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0825.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2013-3575",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"ID": "CVE-2013-3856",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -57,15 +57,15 @@
|
||||
"refsource": "MS",
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-072"
|
||||
},
|
||||
{
|
||||
"name" : "TA13-253A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-253A"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:18797",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18797"
|
||||
},
|
||||
{
|
||||
"name": "TA13-253A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-4283",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,20 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "RHSA-2013:1182",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1182.html"
|
||||
},
|
||||
{
|
||||
"name": "http://directory.fedoraproject.org/wiki/Releases/1.3.0.8",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://directory.fedoraproject.org/wiki/Releases/1.3.0.8"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=999634",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=999634"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1182",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1182.html"
|
||||
"name": "54650",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/54650"
|
||||
},
|
||||
{
|
||||
"name": "54586",
|
||||
@ -73,9 +73,9 @@
|
||||
"url": "http://secunia.com/advisories/54586"
|
||||
},
|
||||
{
|
||||
"name" : "54650",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/54650"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=999634",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=999634"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-4404",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -53,29 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf",
|
||||
"name": "http://www.kb.cert.org/vuls/id/AAMN-98MUK2",
|
||||
"refsource": "CONFIRM",
|
||||
"url" : "http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf"
|
||||
"url": "http://www.kb.cert.org/vuls/id/AAMN-98MUK2"
|
||||
},
|
||||
{
|
||||
"name": "VU#662676",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/662676"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kb.cert.org/vuls/id/AAMN-98MU7H",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kb.cert.org/vuls/id/AAMN-98MU7H"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kb.cert.org/vuls/id/AAMN-98MUK2",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/AAMN-98MUK2"
|
||||
},
|
||||
{
|
||||
"name": "http://www.monroe-electronics.com/MONROE_ELECTRONICS_PDF/130604-Monroe-Security-PR.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.monroe-electronics.com/MONROE_ELECTRONICS_PDF/130604-Monroe-Security-PR.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "VU#662676",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/662676"
|
||||
"name": "http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -54,9 +54,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
|
||||
"name": "1039152",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039152"
|
||||
},
|
||||
{
|
||||
"name": "100367",
|
||||
@ -64,9 +64,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/100367"
|
||||
},
|
||||
{
|
||||
"name" : "1039152",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039152"
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-4408",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,70 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2019/01/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2019/02/msg00024.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2019-01/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2019-01/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2019-02/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2019-02/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.mozilla.org/security/advisories/mfsa2019-03/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.mozilla.org/security/advisories/mfsa2019-03/"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4376",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2019/dsa-4376"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4392",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2019/dsa-4392"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201903-04",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201903-04"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2019:0218",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2019:0218"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2019:0219",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:0219"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2019:0269",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2019:0269"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2019:0270",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2019:0270"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3874-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3874-1/"
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2019-01/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2019-01/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3897-1",
|
||||
@ -126,6 +71,61 @@
|
||||
"name": "106781",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106781"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201903-04",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201903-04"
|
||||
},
|
||||
{
|
||||
"name": "USN-3874-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3874-1/"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2019:0269",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:0269"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2019:0218",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:0218"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2019-02/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2019-02/"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4376",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4376"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00024.html"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.mozilla.org/security/advisories/mfsa2019-03/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2019-03/"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4392",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4392"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2019:0270",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:0270"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20181023 [SYSS-2018-027] missing X.509 validation with Polycom VVX Phones (Skype for Business, on-premise) - CVE-2018-18568",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "https://seclists.org/bugtraq/2018/Oct/36"
|
||||
},
|
||||
{
|
||||
"name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-027.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-027.txt"
|
||||
},
|
||||
{
|
||||
"name": "20181023 [SYSS-2018-027] missing X.509 validation with Polycom VVX Phones (Skype for Business, on-premise) - CVE-2018-18568",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "https://seclists.org/bugtraq/2018/Oct/36"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html"
|
||||
},
|
||||
{
|
||||
"name": "45782",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "20181102 Multiple Privilege Escalation Vulnerabilities in LiquidVPN for MacOS (CVE-2018-18856, CVE-2018-18857, CVE-2018-18858, CVE-2018-18859)",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2018/Nov/1"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -65,16 +65,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "44920",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/44920/"
|
||||
},
|
||||
{
|
||||
"name": "20180522 DSA-2018-095: Dell EMC RecoverPoint Multiple Vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2018/May/61"
|
||||
},
|
||||
{
|
||||
"name": "44920",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/44920/"
|
||||
},
|
||||
{
|
||||
"name": "104246",
|
||||
"refsource": "BID",
|
||||
|
@ -57,24 +57,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[www-announce] 20180408 [SECURITY] CVE-2018-1308: XXE attack through Apache Solr's DIH's dataConfig request parameter",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://mail-archives.apache.org/mod_mbox/www-announce/201804.mbox/%3C000001d3cf68%245ac69af0%241053d0d0%24%40apache.org%3E"
|
||||
"name": "DSA-4194",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4194"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180424 [SECURITY] [DLA 1360-1] lucene-solr security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00025.html"
|
||||
},
|
||||
{
|
||||
"name": "[www-announce] 20180408 [SECURITY] CVE-2018-1308: XXE attack through Apache Solr's DIH's dataConfig request parameter",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://mail-archives.apache.org/mod_mbox/www-announce/201804.mbox/%3C000001d3cf68%245ac69af0%241053d0d0%24%40apache.org%3E"
|
||||
},
|
||||
{
|
||||
"name": "https://issues.apache.org/jira/browse/SOLR-11971",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.apache.org/jira/browse/SOLR-11971"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4194",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4194"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -73,6 +73,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "ibm-netezza-cve20181460-priv-escalation(140211)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/140211"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/research/tra-2018-13",
|
||||
"refsource": "MISC",
|
||||
@ -87,11 +92,6 @@
|
||||
"name": "104486",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104486"
|
||||
},
|
||||
{
|
||||
"name" : "ibm-netezza-cve20181460-priv-escalation(140211)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/140211"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user