"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 21:33:47 +00:00
parent 0eca4d5196
commit 474a4e1ce2
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 3860 additions and 3860 deletions

View File

@ -62,15 +62,15 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/12132" "url": "http://www.securityfocus.com/bid/12132"
}, },
{
"name" : "13700",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/13700"
},
{ {
"name": "korweblog-install-file-include(18717)", "name": "korweblog-install-file-include(18717)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18717" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18717"
},
{
"name": "13700",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13700"
} }
] ]
} }

View File

@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20040126 Secunia Research: IBM Net.Data Macro Name Cross-Site Scripting Vulnerability",
"refsource" : "VULNWATCH",
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0019.html"
},
{
"name" : "http://secunia.com/secunia_research/2004-1/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2004-1/advisory/"
},
{
"name" : "VU#197318",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/197318"
},
{ {
"name": "http://www.kb.cert.org/vuls/id/DMOA-5VNPEL", "name": "http://www.kb.cert.org/vuls/id/DMOA-5VNPEL",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/DMOA-5VNPEL" "url": "http://www.kb.cert.org/vuls/id/DMOA-5VNPEL"
}, },
{
"name" : "9488",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/9488"
},
{
"name" : "3712",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/3712"
},
{ {
"name": "1008845", "name": "1008845",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1008845" "url": "http://www.securitytracker.com/id?1008845"
}, },
{
"name": "VU#197318",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/197318"
},
{ {
"name": "10709", "name": "10709",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/10709/" "url": "http://secunia.com/advisories/10709/"
}, },
{
"name": "9488",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9488"
},
{ {
"name": "ibm-netdata-db2wwwcomponent-xss(14925)", "name": "ibm-netdata-db2wwwcomponent-xss(14925)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14925" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14925"
},
{
"name": "http://secunia.com/secunia_research/2004-1/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2004-1/advisory/"
},
{
"name": "20040126 Secunia Research: IBM Net.Data Macro Name Cross-Site Scripting Vulnerability",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0019.html"
},
{
"name": "3712",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/3712"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080107 RE: [HSC] Snitz Forums Multiple Vulnerabilities", "name": "http://hackerscenter.com/archive/view.asp?id=28145",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://www.securityfocus.com/archive/1/485894/100/200/threaded" "url": "http://hackerscenter.com/archive/view.asp?id=28145"
}, },
{ {
"name": "20080107 [HSC] Snitz Forums Multiple Vulnerabilities", "name": "20080107 [HSC] Snitz Forums Multiple Vulnerabilities",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/archive/1/485836/100/200/threaded" "url": "http://www.securityfocus.com/archive/1/485836/100/200/threaded"
}, },
{ {
"name" : "http://hackerscenter.com/archive/view.asp?id=28145", "name": "20080107 RE: [HSC] Snitz Forums Multiple Vulnerabilities",
"refsource" : "MISC", "refsource": "BUGTRAQ",
"url" : "http://hackerscenter.com/archive/view.asp?id=28145" "url": "http://www.securityfocus.com/archive/1/485894/100/200/threaded"
}, },
{ {
"name": "http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt", "name": "http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt",

View File

@ -58,39 +58,39 @@
"url": "http://www.securityfocus.com/archive/1/486585/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/486585/100/0/threaded"
}, },
{ {
"name" : "http://support.citrix.com/article/CTX114487", "name": "28508",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://support.citrix.com/article/CTX114487" "url": "http://secunia.com/advisories/28508"
},
{
"name" : "http://zerodayinitiative.com/advisories/ZDI-08-002.html",
"refsource" : "MISC",
"url" : "http://zerodayinitiative.com/advisories/ZDI-08-002.html"
},
{
"name" : "VU#412228",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/412228"
},
{
"name" : "27329",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27329"
}, },
{ {
"name": "ADV-2008-0172", "name": "ADV-2008-0172",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0172" "url": "http://www.vupen.com/english/advisories/2008/0172"
}, },
{
"name": "VU#412228",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/412228"
},
{ {
"name": "1019231", "name": "1019231",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019231" "url": "http://www.securitytracker.com/id?1019231"
}, },
{ {
"name" : "28508", "name": "27329",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/28508" "url": "http://www.securityfocus.com/bid/27329"
},
{
"name": "http://zerodayinitiative.com/advisories/ZDI-08-002.html",
"refsource": "MISC",
"url": "http://zerodayinitiative.com/advisories/ZDI-08-002.html"
},
{
"name": "http://support.citrix.com/article/CTX114487",
"refsource": "CONFIRM",
"url": "http://support.citrix.com/article/CTX114487"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080118 SocksCap Stack Overflow (<= 2.40-051231)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/486632/100/0/threaded"
},
{
"name" : "27357",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27357"
},
{ {
"name": "3560", "name": "3560",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3560" "url": "http://securityreason.com/securityalert/3560"
}, },
{
"name": "20080118 SocksCap Stack Overflow (<= 2.40-051231)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/486632/100/0/threaded"
},
{ {
"name": "sockscap-hostname-bo(39781)", "name": "sockscap-hostname-bo(39781)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39781" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39781"
},
{
"name": "27357",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27357"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://drupal.org/node/277877",
"refsource" : "CONFIRM",
"url" : "http://drupal.org/node/277877"
},
{ {
"name": "30067", "name": "30067",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/30067" "url": "http://www.securityfocus.com/bid/30067"
}, },
{
"name": "taxonomy-autotagger-unspecified-xss(43570)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43570"
},
{ {
"name": "30933", "name": "30933",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30933" "url": "http://secunia.com/advisories/30933"
}, },
{ {
"name" : "taxonomy-autotagger-unspecified-xss(43570)", "name": "http://drupal.org/node/277877",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43570" "url": "http://drupal.org/node/277877"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-041/", "name": "1020431",
"refsource" : "MISC", "refsource": "SECTRACK",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-041/" "url": "http://securitytracker.com/id?1020431"
},
{
"name" : "http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858",
"refsource" : "CONFIRM",
"url" : "http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858"
}, },
{ {
"name": "30085", "name": "30085",
@ -68,24 +63,29 @@
"url": "http://www.securityfocus.com/bid/30085" "url": "http://www.securityfocus.com/bid/30085"
}, },
{ {
"name" : "ADV-2008-1999", "name": "http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2008/1999" "url": "http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858"
},
{
"name" : "1020431",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1020431"
},
{
"name" : "30938",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30938"
}, },
{ {
"name": "novell-edirectory-dsdlm-bo(43589)", "name": "novell-edirectory-dsdlm-bo(43589)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43589" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43589"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-041/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-041/"
},
{
"name": "ADV-2008-1999",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1999"
},
{
"name": "30938",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30938"
} }
] ]
} }

View File

@ -57,25 +57,25 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494049/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/494049/100/0/threaded"
}, },
{
"name" : "http://www.vbulletin.com/forum/showthread.php?t=277945",
"refsource" : "CONFIRM",
"url" : "http://www.vbulletin.com/forum/showthread.php?t=277945"
},
{
"name" : "30134",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30134"
},
{ {
"name": "30991", "name": "30991",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30991" "url": "http://secunia.com/advisories/30991"
}, },
{
"name": "http://www.vbulletin.com/forum/showthread.php?t=277945",
"refsource": "CONFIRM",
"url": "http://www.vbulletin.com/forum/showthread.php?t=277945"
},
{ {
"name": "4000", "name": "4000",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4000" "url": "http://securityreason.com/securityalert/4000"
},
{
"name": "30134",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30134"
} }
] ]
} }

View File

@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "31356",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31356"
},
{ {
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-355.htm", "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-355.htm",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-355.htm" "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-355.htm"
}, },
{
"name": "oval:org.mitre.oval:def:5609",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5609"
},
{ {
"name": "237986", "name": "237986",
"refsource": "SUNALERT", "refsource": "SUNALERT",
@ -68,34 +78,24 @@
"url": "http://www.securityfocus.com/bid/30513" "url": "http://www.securityfocus.com/bid/30513"
}, },
{ {
"name" : "oval:org.mitre.oval:def:5609", "name": "31536",
"refsource" : "OVAL", "refsource": "SECUNIA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5609" "url": "http://secunia.com/advisories/31536"
}, },
{ {
"name": "ADV-2008-2290", "name": "ADV-2008-2290",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2290" "url": "http://www.vupen.com/english/advisories/2008/2290"
}, },
{
"name" : "1020616",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1020616"
},
{
"name" : "31356",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31356"
},
{
"name" : "31536",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31536"
},
{ {
"name": "solaris-namefs-code-execution(44158)", "name": "solaris-namefs-code-execution(44158)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44158" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44158"
},
{
"name": "1020616",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1020616"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-3832", "ID": "CVE-2008-3832",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "31536",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31536"
},
{ {
"name": "[oss-security] 20081002 CVE-2008-3832 kernel: null pointer dereference in utrace_control", "name": "[oss-security] 20081002 CVE-2008-3832 kernel: null pointer dereference in utrace_control",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/10/02/1" "url": "http://www.openwall.com/lists/oss-security/2008/10/02/1"
}, },
{
"name": "fedora-utracecontrol-dos(45644)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45644"
},
{ {
"name": "http://kerneloops.org/oops.php?number=56705", "name": "http://kerneloops.org/oops.php?number=56705",
"refsource": "MISC", "refsource": "MISC",
@ -66,16 +76,6 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=464883", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=464883",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=464883" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464883"
},
{
"name" : "31536",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31536"
},
{
"name" : "fedora-utracecontrol-dos(45644)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45644"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.org/0809-exploits/carsvehicle-sql.txt", "name": "carsvehicle-page-sql-injection(45210)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://packetstormsecurity.org/0809-exploits/carsvehicle-sql.txt" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45210"
}, },
{ {
"name": "31214", "name": "31214",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/31214" "url": "http://www.securityfocus.com/bid/31214"
}, },
{ {
"name" : "carsvehicle-page-sql-injection(45210)", "name": "http://packetstormsecurity.org/0809-exploits/carsvehicle-sql.txt",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45210" "url": "http://packetstormsecurity.org/0809-exploits/carsvehicle-sql.txt"
} }
] ]
} }

View File

@ -53,79 +53,79 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080926 multiple vendor ftpd - Cross-site request forgery", "name": "1021112",
"refsource" : "SREASONRES", "refsource": "SECTRACK",
"url" : "http://securityreason.com/achievement_securityalert/56" "url": "http://www.securitytracker.com/id?1021112"
},
{
"name" : "http://bugs.proftpd.org/show_bug.cgi?id=3115",
"refsource" : "MISC",
"url" : "http://bugs.proftpd.org/show_bug.cgi?id=3115"
},
{
"name" : "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y",
"refsource" : "CONFIRM",
"url" : "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y"
}, },
{ {
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y.diff?r1=1.51&r2=1.52&f=h", "name": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y.diff?r1=1.51&r2=1.52&f=h",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y.diff?r1=1.51&r2=1.52&f=h" "url": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y.diff?r1=1.51&r2=1.52&f=h"
}, },
{
"name" : "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c",
"refsource" : "CONFIRM",
"url" : "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c"
},
{
"name" : "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c.diff?r1=1.183&r2=1.184&f=h",
"refsource" : "CONFIRM",
"url" : "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c.diff?r1=1.183&r2=1.184&f=h"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
},
{
"name" : "FreeBSD-SA-08:12",
"refsource" : "FREEBSD",
"url" : "http://security.FreeBSD.org/advisories/FreeBSD-SA-08:12.ftpd.asc"
},
{
"name" : "NetBSD-SA2008-014",
"refsource" : "NETBSD",
"url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-014.txt.asc"
},
{ {
"name": "1020946", "name": "1020946",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020946" "url": "http://www.securitytracker.com/id?1020946"
}, },
{ {
"name" : "1021112", "name": "20080926 multiple vendor ftpd - Cross-site request forgery",
"refsource" : "SECTRACK", "refsource": "SREASONRES",
"url" : "http://www.securitytracker.com/id?1021112" "url": "http://securityreason.com/achievement_securityalert/56"
},
{
"name" : "32068",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32068"
},
{
"name" : "32070",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32070"
}, },
{ {
"name": "33341", "name": "33341",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33341" "url": "http://secunia.com/advisories/33341"
}, },
{
"name": "http://bugs.proftpd.org/show_bug.cgi?id=3115",
"refsource": "MISC",
"url": "http://bugs.proftpd.org/show_bug.cgi?id=3115"
},
{
"name": "NetBSD-SA2008-014",
"refsource": "NETBSD",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-014.txt.asc"
},
{
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y",
"refsource": "CONFIRM",
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y"
},
{
"name": "32068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32068"
},
{
"name": "FreeBSD-SA-08:12",
"refsource": "FREEBSD",
"url": "http://security.FreeBSD.org/advisories/FreeBSD-SA-08:12.ftpd.asc"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
},
{
"name": "32070",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32070"
},
{
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c.diff?r1=1.183&r2=1.184&f=h",
"refsource": "CONFIRM",
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c.diff?r1=1.183&r2=1.184&f=h"
},
{ {
"name": "4313", "name": "4313",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4313" "url": "http://securityreason.com/securityalert/4313"
},
{
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c",
"refsource": "CONFIRM",
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c"
} }
] ]
} }

View File

@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20090204 DDIVRT-2008-19 HP JetDirect Web Administration Directory Traversal", "name": "33779",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/500657/100/0/threaded" "url": "http://secunia.com/advisories/33779"
},
{
"name" : "HPSBPI02398",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905"
},
{
"name" : "SSRT080166",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905"
}, },
{ {
"name": "33611", "name": "33611",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/33611" "url": "http://www.securityfocus.com/bid/33611"
}, },
{
"name": "20090204 DDIVRT-2008-19 HP JetDirect Web Administration Directory Traversal",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/500657/100/0/threaded"
},
{ {
"name": "1021687", "name": "1021687",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021687" "url": "http://www.securitytracker.com/id?1021687"
}, },
{
"name" : "33779",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33779"
},
{ {
"name": "ADV-2009-0341", "name": "ADV-2009-0341",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0341" "url": "http://www.vupen.com/english/advisories/2009/0341"
},
{
"name": "SSRT080166",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905"
},
{
"name": "HPSBPI02398",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "5005", "name": "4424",
"refsource" : "EXPLOIT-DB", "refsource": "SREASON",
"url" : "https://www.exploit-db.com/exploits/5005" "url": "http://securityreason.com/securityalert/4424"
}, },
{ {
"name": "27493", "name": "27493",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/27493" "url": "http://www.securityfocus.com/bid/27493"
}, },
{ {
"name" : "4424", "name": "5005",
"refsource" : "SREASON", "refsource": "EXPLOIT-DB",
"url" : "http://securityreason.com/securityalert/4424" "url": "https://www.exploit-db.com/exploits/5005"
}, },
{ {
"name": "chilkatmail-chilkatcert-file-overwrite(40041)", "name": "chilkatmail-chilkatcert-file-overwrite(40041)",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-2442", "ID": "CVE-2013-2442",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,84 +53,29 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "name": "RHSA-2013:1060",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
}, },
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336", "name": "oval:org.mitre.oval:def:16803",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16803"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21644197",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21644197"
},
{
"name" : "HPSBUX02907",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
}, },
{ {
"name": "HPSBUX02908", "name": "HPSBUX02908",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137545592101387&w=2" "url": "http://marc.info/?l=bugtraq&m=137545592101387&w=2"
}, },
{
"name" : "RHSA-2013:0963",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
},
{
"name" : "RHSA-2013:1060",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
},
{
"name" : "RHSA-2013:1455",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name" : "RHSA-2013:1456",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name" : "RHSA-2013:1059",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
},
{ {
"name": "RHSA-2014:0414", "name": "RHSA-2014:0414",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0414" "url": "https://access.redhat.com/errata/RHSA-2014:0414"
}, },
{ {
"name" : "SUSE-SU-2013:1305", "name": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
},
{
"name" : "SUSE-SU-2013:1255",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
},
{
"name" : "SUSE-SU-2013:1256",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
},
{
"name" : "SUSE-SU-2013:1257",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
},
{
"name" : "TA13-169A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-169A"
}, },
{ {
"name": "60643", "name": "60643",
@ -138,9 +83,39 @@
"url": "http://www.securityfocus.com/bid/60643" "url": "http://www.securityfocus.com/bid/60643"
}, },
{ {
"name" : "oval:org.mitre.oval:def:16803", "name": "SUSE-SU-2013:1257",
"refsource" : "OVAL", "refsource": "SUSE",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16803" "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
},
{
"name": "HPSBUX02907",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
},
{
"name": "SUSE-SU-2013:1256",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
},
{
"name": "54154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54154"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "RHSA-2013:1059",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21644197",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644197"
}, },
{ {
"name": "oval:org.mitre.oval:def:19460", "name": "oval:org.mitre.oval:def:19460",
@ -153,9 +128,34 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19569" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19569"
}, },
{ {
"name" : "54154", "name": "TA13-169A",
"refsource" : "SECUNIA", "refsource": "CERT",
"url" : "http://secunia.com/advisories/54154" "url": "http://www.us-cert.gov/ncas/alerts/TA13-169A"
},
{
"name": "RHSA-2013:0963",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
},
{
"name": "SUSE-SU-2013:1255",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
},
{
"name": "RHSA-2013:1456",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
},
{
"name": "SUSE-SU-2013:1305",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
} }
] ]
} }

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "91693",
"refsource": "OSVDB",
"url": "http://osvdb.org/91693"
},
{
"name": "http://osvdb.org/ref/91/synconnect.txt",
"refsource": "MISC",
"url": "http://osvdb.org/ref/91/synconnect.txt"
},
{
"name": "58711",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/58711"
},
{ {
"name": "20130325 SynConnect PMS SQL Injection Vulnerability", "name": "20130325 SynConnect PMS SQL Injection Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -63,29 +78,14 @@
"url": "http://www.exploit-db.com/exploits/24898" "url": "http://www.exploit-db.com/exploits/24898"
}, },
{ {
"name" : "http://osvdb.org/ref/91/synconnect.txt", "name": "synconnect-index-sql-injection(83040)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://osvdb.org/ref/91/synconnect.txt" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83040"
}, },
{ {
"name": "http://packetstormsecurity.com/files/120958/SynConnect-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/120958/SynConnect-SQL-Injection.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/120958/SynConnect-SQL-Injection.html" "url": "http://packetstormsecurity.com/files/120958/SynConnect-SQL-Injection.html"
},
{
"name" : "58711",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/58711"
},
{
"name" : "91693",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/91693"
},
{
"name" : "synconnect-index-sql-injection(83040)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/83040"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2013-2728", "ID": "CVE-2013-2728",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,6 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "openSUSE-SU-2013:0892",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html"
},
{
"name": "53442",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53442"
},
{
"name": "oval:org.mitre.oval:def:16932",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16932"
},
{
"name": "SUSE-SU-2013:0798",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html"
},
{
"name": "openSUSE-SU-2013:0954",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html"
},
{ {
"name": "http://www.adobe.com/support/security/bulletins/apsb13-14.html", "name": "http://www.adobe.com/support/security/bulletins/apsb13-14.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,31 +86,6 @@
"name": "RHSA-2013:0825", "name": "RHSA-2013:0825",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0825.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-0825.html"
},
{
"name" : "SUSE-SU-2013:0798",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html"
},
{
"name" : "openSUSE-SU-2013:0892",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html"
},
{
"name" : "openSUSE-SU-2013:0954",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html"
},
{
"name" : "oval:org.mitre.oval:def:16932",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16932"
},
{
"name" : "53442",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/53442"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6125", "ID": "CVE-2013-6125",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-6702", "ID": "CVE-2013-6702",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31999",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31999"
},
{ {
"name": "20131203 Cisco ONS 15454 Controller Card Denial of Service Vulnerability", "name": "20131203 Cisco ONS 15454 Controller Card Denial of Service Vulnerability",
"refsource": "CISCO", "refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6702" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6702"
}, },
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31999",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31999"
},
{ {
"name": "1029421", "name": "1029421",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-6730", "ID": "CVE-2013-6730",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21665915",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21665915"
},
{ {
"name": "PI07185", "name": "PI07185",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
@ -66,6 +61,11 @@
"name": "ibm-websphere-portal-cve20136730-search(89363)", "name": "ibm-websphere-portal-cve20136730-search(89363)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89363" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89363"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21665915",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21665915"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6753", "ID": "CVE-2013-6753",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -57,11 +57,6 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q4/379" "url": "http://seclists.org/oss-sec/2013/q4/379"
}, },
{
"name" : "[oss-security] 20131129 Re: CVE request: UnrealIRCd remote DoS",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2013/q4/383"
},
{ {
"name": "http://forums.unrealircd.com/viewtopic.php?f=2&t=8221", "name": "http://forums.unrealircd.com/viewtopic.php?f=2&t=8221",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt", "name": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt" "url": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt"
},
{
"name": "[oss-security] 20131129 Re: CVE request: UnrealIRCd remote DoS",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q4/383"
} }
] ]
} }

View File

@ -62,6 +62,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/uclouvain/openjpeg/commit/e5285319229a5d77bf316bb0d3a6cbd3cb8666d9" "url": "https://github.com/uclouvain/openjpeg/commit/e5285319229a5d77bf316bb0d3a6cbd3cb8666d9"
}, },
{
"name": "100555",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100555"
},
{ {
"name": "https://github.com/uclouvain/openjpeg/issues/997", "name": "https://github.com/uclouvain/openjpeg/issues/997",
"refsource": "MISC", "refsource": "MISC",
@ -71,11 +76,6 @@
"name": "DSA-4013", "name": "DSA-4013",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-4013" "url": "http://www.debian.org/security/2017/dsa-4013"
},
{
"name" : "100555",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/100555"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html"
},
{ {
"name": "https://github.com/erikd/libsndfile/issues/317", "name": "https://github.com/erikd/libsndfile/issues/317",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/erikd/libsndfile/issues/317" "url": "https://github.com/erikd/libsndfile/issues/317"
},
{
"name": "[debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://blogs.sap.com/2017/09/12/sap-security-patch-day-september-2017/",
"refsource" : "MISC",
"url" : "https://blogs.sap.com/2017/09/12/sap-security-patch-day-september-2017/"
},
{ {
"name": "https://erpscan.io/advisories/erpscan-17-032-sap-pos-missing-authentication-xpressserver/", "name": "https://erpscan.io/advisories/erpscan-17-032-sap-pos-missing-authentication-xpressserver/",
"refsource": "MISC", "refsource": "MISC",
"url": "https://erpscan.io/advisories/erpscan-17-032-sap-pos-missing-authentication-xpressserver/" "url": "https://erpscan.io/advisories/erpscan-17-032-sap-pos-missing-authentication-xpressserver/"
}, },
{
"name": "100713",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100713"
},
{ {
"name": "https://erpscan.io/research/hacking-sap-pos/", "name": "https://erpscan.io/research/hacking-sap-pos/",
"refsource": "MISC", "refsource": "MISC",
"url": "https://erpscan.io/research/hacking-sap-pos/" "url": "https://erpscan.io/research/hacking-sap-pos/"
}, },
{ {
"name" : "100713", "name": "https://blogs.sap.com/2017/09/12/sap-security-patch-day-september-2017/",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/100713" "url": "https://blogs.sap.com/2017/09/12/sap-security-patch-day-september-2017/"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/541655/100/0/threaded"
},
{ {
"name": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt", "name": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt" "url": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt"
},
{
"name": "20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/541655/100/0/threaded"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "42118",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/42118/"
},
{ {
"name": "http://packetstormsecurity.com/files/142794/Subsonic-6.1.1-Server-Side-Request-Forgery.html", "name": "http://packetstormsecurity.com/files/142794/Subsonic-6.1.1-Server-Side-Request-Forgery.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/142794/Subsonic-6.1.1-Server-Side-Request-Forgery.html" "url": "http://packetstormsecurity.com/files/142794/Subsonic-6.1.1-Server-Side-Request-Forgery.html"
},
{
"name": "42118",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42118/"
} }
] ]
} }

View File

@ -52,35 +52,35 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{ {
"name": "[oss-security] 20170608 CVE-2017-9503 Qemu: scsi: null pointer dereference while processing megasas command", "name": "[oss-security] 20170608 CVE-2017-9503 Qemu: scsi: null pointer dereference while processing megasas command",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/06/08/1" "url": "http://www.openwall.com/lists/oss-security/2017/06/08/1"
}, },
{ {
"name" : "[qemu-devel] 20170606 [PATCH 4/7] megasas: do not read DCMD opcode more than once", "name": "99010",
"refsource" : "MLIST", "refsource": "BID",
"url" : "https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01309.html" "url": "http://www.securityfocus.com/bid/99010"
}, },
{ {
"name": "[qemu-devel] 20170606 [PATCH 7/7] megasas: always store SCSIRequest* into Megasas", "name": "[qemu-devel] 20170606 [PATCH 7/7] megasas: always store SCSIRequest* into Megasas",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01313.html" "url": "https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01313.html"
}, },
{
"name" : "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1459477", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1459477",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459477" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459477"
}, },
{ {
"name" : "99010", "name": "[qemu-devel] 20170606 [PATCH 4/7] megasas: do not read DCMD opcode more than once",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/99010" "url": "https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01309.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-06-05T13:57:43.659756", "DATE_ASSIGNED": "2018-06-05T13:57:43.659756",
"DATE_REQUESTED": "2018-05-09T00:00:00", "DATE_REQUESTED": "2018-05-09T00:00:00",
"ID": "CVE-2018-1000202", "ID": "CVE-2018-1000202",
@ -14,18 +14,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Jenkins Groovy Postbuild Plugin", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "2.3.1 and older" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Jenkins project" "vendor_name": "n/a"
} }
] ]
} }
@ -47,7 +47,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-79" "value": "n/a"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://jvn.jp/en/vu/JVNVU91640357/index.html",
"refsource" : "MISC",
"url" : "https://jvn.jp/en/vu/JVNVU91640357/index.html"
},
{ {
"name": "https://play.google.com/store/apps/details?id=jp.co.mizuhobank.banking", "name": "https://play.google.com/store/apps/details?id=jp.co.mizuhobank.banking",
"refsource": "MISC", "refsource": "MISC",
"url": "https://play.google.com/store/apps/details?id=jp.co.mizuhobank.banking" "url": "https://play.google.com/store/apps/details?id=jp.co.mizuhobank.banking"
},
{
"name": "https://jvn.jp/en/vu/JVNVU91640357/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU91640357/index.html"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://support.apple.com/HT208465",
"refsource" : "MISC",
"url" : "https://support.apple.com/HT208465"
},
{ {
"name": "https://support.apple.com/HT208473", "name": "https://support.apple.com/HT208473",
"refsource": "MISC", "refsource": "MISC",
@ -72,6 +67,11 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://support.apple.com/HT208475" "url": "https://support.apple.com/HT208475"
}, },
{
"name": "https://support.apple.com/HT208465",
"refsource": "MISC",
"url": "https://support.apple.com/HT208465"
},
{ {
"name": "https://support.apple.com/HT208463", "name": "https://support.apple.com/HT208463",
"refsource": "CONFIRM", "refsource": "CONFIRM",

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{ {
"name": "102996", "name": "102996",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102996" "url": "http://www.securityfocus.com/bid/102996"
}, },
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{ {
"name": "1040364", "name": "1040364",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html",
"refsource" : "MISC",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
},
{ {
"name": "104169", "name": "104169",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/104169" "url": "http://www.securityfocus.com/bid/104169"
}, },
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html",
"refsource": "MISC",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
},
{ {
"name": "1040920", "name": "1040920",
"refsource": "SECTRACK", "refsource": "SECTRACK",