mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
0eca4d5196
commit
474a4e1ce2
@ -62,15 +62,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/12132"
|
||||
},
|
||||
{
|
||||
"name" : "13700",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/13700"
|
||||
},
|
||||
{
|
||||
"name": "korweblog-install-file-include(18717)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18717"
|
||||
},
|
||||
{
|
||||
"name": "13700",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/13700"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,50 +52,50 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040126 Secunia Research: IBM Net.Data Macro Name Cross-Site Scripting Vulnerability",
|
||||
"refsource" : "VULNWATCH",
|
||||
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0019.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://secunia.com/secunia_research/2004-1/advisory/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://secunia.com/secunia_research/2004-1/advisory/"
|
||||
},
|
||||
{
|
||||
"name" : "VU#197318",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/197318"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kb.cert.org/vuls/id/DMOA-5VNPEL",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kb.cert.org/vuls/id/DMOA-5VNPEL"
|
||||
},
|
||||
{
|
||||
"name" : "9488",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/9488"
|
||||
},
|
||||
{
|
||||
"name" : "3712",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/3712"
|
||||
},
|
||||
{
|
||||
"name": "1008845",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1008845"
|
||||
},
|
||||
{
|
||||
"name": "VU#197318",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/197318"
|
||||
},
|
||||
{
|
||||
"name": "10709",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/10709/"
|
||||
},
|
||||
{
|
||||
"name": "9488",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/9488"
|
||||
},
|
||||
{
|
||||
"name": "ibm-netdata-db2wwwcomponent-xss(14925)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14925"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2004-1/advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2004-1/advisory/"
|
||||
},
|
||||
{
|
||||
"name": "20040126 Secunia Research: IBM Net.Data Macro Name Cross-Site Scripting Vulnerability",
|
||||
"refsource": "VULNWATCH",
|
||||
"url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0019.html"
|
||||
},
|
||||
{
|
||||
"name": "3712",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/3712"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080107 RE: [HSC] Snitz Forums Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/485894/100/200/threaded"
|
||||
"name": "http://hackerscenter.com/archive/view.asp?id=28145",
|
||||
"refsource": "MISC",
|
||||
"url": "http://hackerscenter.com/archive/view.asp?id=28145"
|
||||
},
|
||||
{
|
||||
"name": "20080107 [HSC] Snitz Forums Multiple Vulnerabilities",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/485836/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://hackerscenter.com/archive/view.asp?id=28145",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://hackerscenter.com/archive/view.asp?id=28145"
|
||||
"name": "20080107 RE: [HSC] Snitz Forums Multiple Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/485894/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name": "http://www.packetstormsecurity.org/0801-exploits/snitz-multi.txt",
|
||||
|
@ -58,39 +58,39 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/486585/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.citrix.com/article/CTX114487",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://support.citrix.com/article/CTX114487"
|
||||
},
|
||||
{
|
||||
"name" : "http://zerodayinitiative.com/advisories/ZDI-08-002.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://zerodayinitiative.com/advisories/ZDI-08-002.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#412228",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/412228"
|
||||
},
|
||||
{
|
||||
"name" : "27329",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27329"
|
||||
"name": "28508",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28508"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0172",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0172"
|
||||
},
|
||||
{
|
||||
"name": "VU#412228",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/412228"
|
||||
},
|
||||
{
|
||||
"name": "1019231",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1019231"
|
||||
},
|
||||
{
|
||||
"name" : "28508",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28508"
|
||||
"name": "27329",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27329"
|
||||
},
|
||||
{
|
||||
"name": "http://zerodayinitiative.com/advisories/ZDI-08-002.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://zerodayinitiative.com/advisories/ZDI-08-002.html"
|
||||
},
|
||||
{
|
||||
"name": "http://support.citrix.com/article/CTX114487",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.citrix.com/article/CTX114487"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080118 SocksCap Stack Overflow (<= 2.40-051231)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/486632/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "27357",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27357"
|
||||
},
|
||||
{
|
||||
"name": "3560",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/3560"
|
||||
},
|
||||
{
|
||||
"name": "20080118 SocksCap Stack Overflow (<= 2.40-051231)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/486632/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "sockscap-hostname-bo(39781)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39781"
|
||||
},
|
||||
{
|
||||
"name": "27357",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27357"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://drupal.org/node/277877",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://drupal.org/node/277877"
|
||||
},
|
||||
{
|
||||
"name": "30067",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30067"
|
||||
},
|
||||
{
|
||||
"name": "taxonomy-autotagger-unspecified-xss(43570)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43570"
|
||||
},
|
||||
{
|
||||
"name": "30933",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30933"
|
||||
},
|
||||
{
|
||||
"name" : "taxonomy-autotagger-unspecified-xss(43570)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43570"
|
||||
"name": "http://drupal.org/node/277877",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://drupal.org/node/277877"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-041/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-041/"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858"
|
||||
"name": "1020431",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1020431"
|
||||
},
|
||||
{
|
||||
"name": "30085",
|
||||
@ -68,24 +63,29 @@
|
||||
"url": "http://www.securityfocus.com/bid/30085"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-1999",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/1999"
|
||||
},
|
||||
{
|
||||
"name" : "1020431",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1020431"
|
||||
},
|
||||
{
|
||||
"name" : "30938",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/30938"
|
||||
"name": "http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.novell.com/support/search.do?cmd=displayKC&sliceId=SAL_Public&externalId=3694858"
|
||||
},
|
||||
{
|
||||
"name": "novell-edirectory-dsdlm-bo(43589)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43589"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-041/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-041/"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-1999",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1999"
|
||||
},
|
||||
{
|
||||
"name": "30938",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30938"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,25 +57,25 @@
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/494049/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.vbulletin.com/forum/showthread.php?t=277945",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.vbulletin.com/forum/showthread.php?t=277945"
|
||||
},
|
||||
{
|
||||
"name" : "30134",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30134"
|
||||
},
|
||||
{
|
||||
"name": "30991",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/30991"
|
||||
},
|
||||
{
|
||||
"name": "http://www.vbulletin.com/forum/showthread.php?t=277945",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.vbulletin.com/forum/showthread.php?t=277945"
|
||||
},
|
||||
{
|
||||
"name": "4000",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4000"
|
||||
},
|
||||
{
|
||||
"name": "30134",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30134"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "31356",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31356"
|
||||
},
|
||||
{
|
||||
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-355.htm",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-355.htm"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:5609",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5609"
|
||||
},
|
||||
{
|
||||
"name": "237986",
|
||||
"refsource": "SUNALERT",
|
||||
@ -68,34 +78,24 @@
|
||||
"url": "http://www.securityfocus.com/bid/30513"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:5609",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5609"
|
||||
"name": "31536",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31536"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-2290",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2290"
|
||||
},
|
||||
{
|
||||
"name" : "1020616",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1020616"
|
||||
},
|
||||
{
|
||||
"name" : "31356",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31356"
|
||||
},
|
||||
{
|
||||
"name" : "31536",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/31536"
|
||||
},
|
||||
{
|
||||
"name": "solaris-namefs-code-execution(44158)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44158"
|
||||
},
|
||||
{
|
||||
"name": "1020616",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1020616"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2008-3832",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "31536",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31536"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20081002 CVE-2008-3832 kernel: null pointer dereference in utrace_control",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/10/02/1"
|
||||
},
|
||||
{
|
||||
"name": "fedora-utracecontrol-dos(45644)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45644"
|
||||
},
|
||||
{
|
||||
"name": "http://kerneloops.org/oops.php?number=56705",
|
||||
"refsource": "MISC",
|
||||
@ -66,16 +76,6 @@
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=464883",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=464883"
|
||||
},
|
||||
{
|
||||
"name" : "31536",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31536"
|
||||
},
|
||||
{
|
||||
"name" : "fedora-utracecontrol-dos(45644)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45644"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/0809-exploits/carsvehicle-sql.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/0809-exploits/carsvehicle-sql.txt"
|
||||
"name": "carsvehicle-page-sql-injection(45210)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45210"
|
||||
},
|
||||
{
|
||||
"name": "31214",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/31214"
|
||||
},
|
||||
{
|
||||
"name" : "carsvehicle-page-sql-injection(45210)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45210"
|
||||
"name": "http://packetstormsecurity.org/0809-exploits/carsvehicle-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0809-exploits/carsvehicle-sql.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,79 +53,79 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20080926 multiple vendor ftpd - Cross-site request forgery",
|
||||
"refsource" : "SREASONRES",
|
||||
"url" : "http://securityreason.com/achievement_securityalert/56"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.proftpd.org/show_bug.cgi?id=3115",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://bugs.proftpd.org/show_bug.cgi?id=3115"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y"
|
||||
"name": "1021112",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021112"
|
||||
},
|
||||
{
|
||||
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y.diff?r1=1.51&r2=1.52&f=h",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y.diff?r1=1.51&r2=1.52&f=h"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c.diff?r1=1.183&r2=1.184&f=h",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c.diff?r1=1.183&r2=1.184&f=h"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
|
||||
},
|
||||
{
|
||||
"name" : "FreeBSD-SA-08:12",
|
||||
"refsource" : "FREEBSD",
|
||||
"url" : "http://security.FreeBSD.org/advisories/FreeBSD-SA-08:12.ftpd.asc"
|
||||
},
|
||||
{
|
||||
"name" : "NetBSD-SA2008-014",
|
||||
"refsource" : "NETBSD",
|
||||
"url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-014.txt.asc"
|
||||
},
|
||||
{
|
||||
"name": "1020946",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1020946"
|
||||
},
|
||||
{
|
||||
"name" : "1021112",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1021112"
|
||||
},
|
||||
{
|
||||
"name" : "32068",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32068"
|
||||
},
|
||||
{
|
||||
"name" : "32070",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/32070"
|
||||
"name": "20080926 multiple vendor ftpd - Cross-site request forgery",
|
||||
"refsource": "SREASONRES",
|
||||
"url": "http://securityreason.com/achievement_securityalert/56"
|
||||
},
|
||||
{
|
||||
"name": "33341",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33341"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.proftpd.org/show_bug.cgi?id=3115",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.proftpd.org/show_bug.cgi?id=3115"
|
||||
},
|
||||
{
|
||||
"name": "NetBSD-SA2008-014",
|
||||
"refsource": "NETBSD",
|
||||
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-014.txt.asc"
|
||||
},
|
||||
{
|
||||
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y"
|
||||
},
|
||||
{
|
||||
"name": "32068",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32068"
|
||||
},
|
||||
{
|
||||
"name": "FreeBSD-SA-08:12",
|
||||
"refsource": "FREEBSD",
|
||||
"url": "http://security.FreeBSD.org/advisories/FreeBSD-SA-08:12.ftpd.asc"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
|
||||
},
|
||||
{
|
||||
"name": "32070",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32070"
|
||||
},
|
||||
{
|
||||
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c.diff?r1=1.183&r2=1.184&f=h",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c.diff?r1=1.183&r2=1.184&f=h"
|
||||
},
|
||||
{
|
||||
"name": "4313",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4313"
|
||||
},
|
||||
{
|
||||
"name": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,39 +53,39 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20090204 DDIVRT-2008-19 HP JetDirect Web Administration Directory Traversal",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/500657/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBPI02398",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT080166",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905"
|
||||
"name": "33779",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33779"
|
||||
},
|
||||
{
|
||||
"name": "33611",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33611"
|
||||
},
|
||||
{
|
||||
"name": "20090204 DDIVRT-2008-19 HP JetDirect Web Administration Directory Traversal",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/500657/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "1021687",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021687"
|
||||
},
|
||||
{
|
||||
"name" : "33779",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33779"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2009-0341",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2009/0341"
|
||||
},
|
||||
{
|
||||
"name": "SSRT080166",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905"
|
||||
},
|
||||
{
|
||||
"name": "HPSBPI02398",
|
||||
"refsource": "HP",
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01623905"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "5005",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/5005"
|
||||
"name": "4424",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4424"
|
||||
},
|
||||
{
|
||||
"name": "27493",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/27493"
|
||||
},
|
||||
{
|
||||
"name" : "4424",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4424"
|
||||
"name": "5005",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/5005"
|
||||
},
|
||||
{
|
||||
"name": "chilkatmail-chilkatcert-file-overwrite(40041)",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2013-2442",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,84 +53,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
|
||||
"name": "RHSA-2013:1060",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
|
||||
},
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21644197",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21644197"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX02907",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
|
||||
"name": "oval:org.mitre.oval:def:16803",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16803"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02908",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=137545592101387&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:0963",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1060",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1455",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1456",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1059",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2014:0414",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:1305",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:1255",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:1256",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:1257",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
|
||||
},
|
||||
{
|
||||
"name" : "TA13-169A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-169A"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
|
||||
},
|
||||
{
|
||||
"name": "60643",
|
||||
@ -138,9 +83,39 @@
|
||||
"url": "http://www.securityfocus.com/bid/60643"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16803",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16803"
|
||||
"name": "SUSE-SU-2013:1257",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX02907",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:1256",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
|
||||
},
|
||||
{
|
||||
"name": "54154",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/54154"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1455",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1059",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21644197",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644197"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:19460",
|
||||
@ -153,9 +128,34 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19569"
|
||||
},
|
||||
{
|
||||
"name" : "54154",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/54154"
|
||||
"name": "TA13-169A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-169A"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:0963",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:1255",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2013:1456",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:1305",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "91693",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/91693"
|
||||
},
|
||||
{
|
||||
"name": "http://osvdb.org/ref/91/synconnect.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://osvdb.org/ref/91/synconnect.txt"
|
||||
},
|
||||
{
|
||||
"name": "58711",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/58711"
|
||||
},
|
||||
{
|
||||
"name": "20130325 SynConnect PMS SQL Injection Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -63,29 +78,14 @@
|
||||
"url": "http://www.exploit-db.com/exploits/24898"
|
||||
},
|
||||
{
|
||||
"name" : "http://osvdb.org/ref/91/synconnect.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://osvdb.org/ref/91/synconnect.txt"
|
||||
"name": "synconnect-index-sql-injection(83040)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83040"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/120958/SynConnect-SQL-Injection.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/120958/SynConnect-SQL-Injection.html"
|
||||
},
|
||||
{
|
||||
"name" : "58711",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/58711"
|
||||
},
|
||||
{
|
||||
"name" : "91693",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/91693"
|
||||
},
|
||||
{
|
||||
"name" : "synconnect-index-sql-injection(83040)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/83040"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@adobe.com",
|
||||
"ID": "CVE-2013-2728",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0892",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "53442",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/53442"
|
||||
},
|
||||
{
|
||||
"name": "oval:org.mitre.oval:def:16932",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16932"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2013:0798",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:0954",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.adobe.com/support/security/bulletins/apsb13-14.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,31 +86,6 @@
|
||||
"name": "RHSA-2013:0825",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-0825.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2013:0798",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0892",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2013:0954",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:16932",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16932"
|
||||
},
|
||||
{
|
||||
"name" : "53442",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/53442"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6125",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2013-6702",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31999",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31999"
|
||||
},
|
||||
{
|
||||
"name": "20131203 Cisco ONS 15454 Controller Card Denial of Service Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6702"
|
||||
},
|
||||
{
|
||||
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31999",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31999"
|
||||
},
|
||||
{
|
||||
"name": "1029421",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"ID": "CVE-2013-6730",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21665915",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21665915"
|
||||
},
|
||||
{
|
||||
"name": "PI07185",
|
||||
"refsource": "AIXAPAR",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "ibm-websphere-portal-cve20136730-search(89363)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89363"
|
||||
},
|
||||
{
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21665915",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21665915"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2013-6753",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2013/q4/379"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20131129 Re: CVE request: UnrealIRCd remote DoS",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://seclists.org/oss-sec/2013/q4/383"
|
||||
},
|
||||
{
|
||||
"name": "http://forums.unrealircd.com/viewtopic.php?f=2&t=8221",
|
||||
"refsource": "CONFIRM",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.unrealircd.com/txt/unreal3_2_10_2_release_notes.txt"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20131129 Re: CVE request: UnrealIRCd remote DoS",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://seclists.org/oss-sec/2013/q4/383"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,6 +62,11 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/uclouvain/openjpeg/commit/e5285319229a5d77bf316bb0d3a6cbd3cb8666d9"
|
||||
},
|
||||
{
|
||||
"name": "100555",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/100555"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/uclouvain/openjpeg/issues/997",
|
||||
"refsource": "MISC",
|
||||
@ -71,11 +76,6 @@
|
||||
"name": "DSA-4013",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-4013"
|
||||
},
|
||||
{
|
||||
"name" : "100555",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/100555"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/erikd/libsndfile/issues/317",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/erikd/libsndfile/issues/317"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://blogs.sap.com/2017/09/12/sap-security-patch-day-september-2017/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://blogs.sap.com/2017/09/12/sap-security-patch-day-september-2017/"
|
||||
},
|
||||
{
|
||||
"name": "https://erpscan.io/advisories/erpscan-17-032-sap-pos-missing-authentication-xpressserver/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://erpscan.io/advisories/erpscan-17-032-sap-pos-missing-authentication-xpressserver/"
|
||||
},
|
||||
{
|
||||
"name": "100713",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/100713"
|
||||
},
|
||||
{
|
||||
"name": "https://erpscan.io/research/hacking-sap-pos/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://erpscan.io/research/hacking-sap-pos/"
|
||||
},
|
||||
{
|
||||
"name" : "100713",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/100713"
|
||||
"name": "https://blogs.sap.com/2017/09/12/sap-security-patch-day-september-2017/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://blogs.sap.com/2017/09/12/sap-security-patch-day-september-2017/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/541655/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt"
|
||||
},
|
||||
{
|
||||
"name": "20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/541655/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "42118",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/42118/"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/142794/Subsonic-6.1.1-Server-Side-Request-Forgery.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/142794/Subsonic-6.1.1-Server-Side-Request-Forgery.html"
|
||||
},
|
||||
{
|
||||
"name": "42118",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/42118/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,35 +52,35 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20170608 CVE-2017-9503 Qemu: scsi: null pointer dereference while processing megasas command",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/06/08/1"
|
||||
},
|
||||
{
|
||||
"name" : "[qemu-devel] 20170606 [PATCH 4/7] megasas: do not read DCMD opcode more than once",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01309.html"
|
||||
"name": "99010",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99010"
|
||||
},
|
||||
{
|
||||
"name": "[qemu-devel] 20170606 [PATCH 7/7] megasas: always store SCSIRequest* into Megasas",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01313.html"
|
||||
},
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1459477",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459477"
|
||||
},
|
||||
{
|
||||
"name" : "99010",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/99010"
|
||||
"name": "[qemu-devel] 20170606 [PATCH 4/7] megasas: do not read DCMD opcode more than once",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01309.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-06-05T13:57:43.659756",
|
||||
"DATE_REQUESTED": "2018-05-09T00:00:00",
|
||||
"ID": "CVE-2018-1000202",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins Groovy Postbuild Plugin",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.3.1 and older"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins project"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-79"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://jvn.jp/en/vu/JVNVU91640357/index.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://jvn.jp/en/vu/JVNVU91640357/index.html"
|
||||
},
|
||||
{
|
||||
"name": "https://play.google.com/store/apps/details?id=jp.co.mizuhobank.banking",
|
||||
"refsource": "MISC",
|
||||
"url": "https://play.google.com/store/apps/details?id=jp.co.mizuhobank.banking"
|
||||
},
|
||||
{
|
||||
"name": "https://jvn.jp/en/vu/JVNVU91640357/index.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://jvn.jp/en/vu/JVNVU91640357/index.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT208465",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://support.apple.com/HT208465"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208473",
|
||||
"refsource": "MISC",
|
||||
@ -72,6 +67,11 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.apple.com/HT208475"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208465",
|
||||
"refsource": "MISC",
|
||||
"url": "https://support.apple.com/HT208465"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208463",
|
||||
"refsource": "CONFIRM",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
|
||||
},
|
||||
{
|
||||
"name": "102996",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102996"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
|
||||
},
|
||||
{
|
||||
"name": "1040364",
|
||||
"refsource": "SECTRACK",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
|
||||
},
|
||||
{
|
||||
"name": "104169",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/104169"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-09.html"
|
||||
},
|
||||
{
|
||||
"name": "1040920",
|
||||
"refsource": "SECTRACK",
|
||||
|
Loading…
x
Reference in New Issue
Block a user