"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:50:58 +00:00
parent 97b41b7c5f
commit 567fec6275
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
56 changed files with 4578 additions and 4578 deletions

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20010109 Oracle XSQL servlet and xml-stylesheet allow executing java on the web server",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=97906670012796&w=2"
"name": "oracle-xsql-execute-code(5905)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5905"
},
{
"name": "20010123 Patch for Potential Vulnerability in Oracle XSQL Servlet",
@ -63,9 +63,9 @@
"url": "http://marc.info/?l=bugtraq&m=98027700625521&w=2"
},
{
"name" : "oracle-xsql-execute-code(5905)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5905"
"name": "20010109 Oracle XSQL servlet and xml-stylesheet allow executing java on the web server",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=97906670012796&w=2"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20010115 Stack Overflow in MSHTML.DLL",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=97958685100219&w=2"
},
{
"name": "2202",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2202"
},
{
"name": "20010115 Stack Overflow in MSHTML.DLL",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=97958685100219&w=2"
},
{
"name": "ie-mshtml-dos(5938)",
"refsource": "XF",

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "3781",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/3781"
},
{
"name": "analogx-simpleserver-aux-dos(6395)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6395"
},
{
"name": "20010417 Advisory for SimpleServer:WWW (analogX)",
"refsource": "BUGTRAQ",
@ -61,16 +71,6 @@
"name": "2608",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2608"
},
{
"name" : "analogx-simpleserver-aux-dos(6395)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6395"
},
{
"name" : "3781",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/3781"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2001-0655",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20011114 Multiple Vulnerabilities in Access Control List Implementation for Cisco 12000 Series Internet Router",
"refsource" : "CISCO",
"url" : "http://www.cisco.com/warp/public/707/GSR-ACL-pub.shtml"
},
{
"name": "M-018",
"refsource": "CIAC",
"url": "http://www.ciac.org/ciac/bulletins/m-018.shtml"
},
{
"name": "20011114 Multiple Vulnerabilities in Access Control List Implementation for Cisco 12000 Series Internet Router",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/GSR-ACL-pub.shtml"
},
{
"name": "cisco-input-acl-configured(7554)",
"refsource": "XF",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "FreeBSD-SA-02:14",
"refsource" : "FREEBSD",
"url" : "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:14.pam-pgsql.asc"
},
{
"name": "3319",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3319"
},
{
"name": "FreeBSD-SA-02:14",
"refsource": "FREEBSD",
"url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:14.pam-pgsql.asc"
},
{
"name": "postgresql-pam-authentication-module(7110)",
"refsource": "XF",

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20060428 WinISO/UltraISO/MagicISO/PowerISO Directory Traversal Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/432359/100/0/threaded"
},
{
"name" : "http://secway.org/advisory/AD20060428.txt",
"refsource" : "MISC",
"url" : "http://secway.org/advisory/AD20060428.txt"
},
{
"name" : "17725",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17725"
},
{
"name": "ADV-2006-1568",
"refsource": "VUPEN",
@ -77,20 +62,35 @@
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016007"
},
{
"name": "iso-dotdot-directory-traversal(26140)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26140"
},
{
"name": "19864",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19864"
},
{
"name": "17725",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17725"
},
{
"name": "815",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/815"
},
{
"name" : "iso-dotdot-directory-traversal(26140)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26140"
"name": "http://secway.org/advisory/AD20060428.txt",
"refsource": "MISC",
"url": "http://secway.org/advisory/AD20060428.txt"
},
{
"name": "20060428 WinISO/UltraISO/MagicISO/PowerISO Directory Traversal Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432359/100/0/threaded"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name": "2005commentsscript-kommentar-xss(26318)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26318"
},
{
"name": "http://d4igoro.blogspot.com/2006/05/c2005-comments-script-xss.html",
"refsource": "MISC",
"url": "http://d4igoro.blogspot.com/2006/05/c2005-comments-script-xss.html"
},
{
"name" : "17895",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17895"
},
{
"name" : "ADV-2006-1706",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1706"
},
{
"name": "19996",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19996"
},
{
"name" : "2005commentsscript-kommentar-xss(26318)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26318"
"name": "ADV-2006-1706",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1706"
},
{
"name": "17895",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17895"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20080610 Multiple Vendor FreeType2 Multiple Heap Overflow Vulnerabilities",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717"
"name": "1020240",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1020240"
},
{
"name": "20080814 rPSA-2008-0255-1 freetype",
@ -63,174 +63,24 @@
"url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded"
},
{
"name" : "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
},
{
"name" : "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"refsource" : "FULLDISC",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
},
{
"name" : "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780",
"refsource" : "MISC",
"url" : "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"
},
{
"name" : "http://www.vmware.com/support/player/doc/releasenotes_player.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/player/doc/releasenotes_player.html"
},
{
"name" : "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
},
{
"name" : "http://www.vmware.com/support/server/doc/releasenotes_server.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/server/doc/releasenotes_server.html"
},
{
"name" : "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
},
{
"name" : "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
"name": "GLSA-201209-25",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
},
{
"name" : "http://support.apple.com/kb/HT3129",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3129"
},
{
"name" : "http://support.apple.com/kb/HT3026",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3026"
},
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"
},
{
"name" : "https://issues.rpath.com/browse/RPL-2608",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-2608"
},
{
"name" : "http://support.apple.com/kb/HT3438",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3438"
},
{
"name" : "APPLE-SA-2008-09-09",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
},
{
"name" : "APPLE-SA-2008-09-12",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
},
{
"name" : "APPLE-SA-2009-02-12",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name" : "FEDORA-2008-5425",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"
},
{
"name": "FEDORA-2008-5430",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"
},
{
"name" : "GLSA-200806-10",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200806-10.xml"
},
{
"name" : "GLSA-201209-25",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201209-25.xml"
},
{
"name" : "MDVSA-2008:121",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"
},
{
"name" : "RHSA-2008:0556",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0556.html"
},
{
"name" : "RHSA-2008:0558",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0558.html"
},
{
"name" : "RHSA-2009:0329",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0329.html"
},
{
"name" : "239006",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"
},
{
"name" : "SUSE-SR:2008:014",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"
},
{
"name" : "USN-643-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-643-1"
},
{
"name" : "29637",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29637"
},
{
"name" : "29639",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29639"
},
{
"name" : "oval:org.mitre.oval:def:11188",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188"
},
{
"name" : "35204",
"name": "33937",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/35204"
},
{
"name" : "ADV-2008-1794",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1794"
"url": "http://secunia.com/advisories/33937"
},
{
"name": "ADV-2008-1876",
@ -238,19 +88,14 @@
"url": "http://www.vupen.com/english/advisories/2008/1876/references"
},
{
"name" : "ADV-2008-2423",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2423"
"name": "30721",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30721"
},
{
"name" : "ADV-2008-2466",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2466"
},
{
"name" : "ADV-2008-2558",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2558"
"name": "MDVSA-2008:121",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"
},
{
"name": "ADV-2008-2525",
@ -258,49 +103,9 @@
"url": "http://www.vupen.com/english/advisories/2008/2525"
},
{
"name" : "1020240",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1020240"
},
{
"name" : "30600",
"name": "31712",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/30600"
},
{
"name" : "30740",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30740"
},
{
"name" : "30766",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30766"
},
{
"name" : "30721",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30721"
},
{
"name" : "30821",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30821"
},
{
"name" : "30819",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30819"
},
{
"name" : "30967",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30967"
},
{
"name" : "31707",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31707"
"url": "http://secunia.com/advisories/31712"
},
{
"name": "31709",
@ -308,34 +113,34 @@
"url": "http://secunia.com/advisories/31709"
},
{
"name" : "31711",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31711"
"name": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780",
"refsource": "MISC",
"url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"
},
{
"name" : "31712",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31712"
"name": "http://www.vmware.com/support/server/doc/releasenotes_server.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/server/doc/releasenotes_server.html"
},
{
"name" : "31856",
"name": "30740",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/31856"
"url": "http://secunia.com/advisories/30740"
},
{
"name" : "31900",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31900"
"name": "http://support.apple.com/kb/HT3438",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3438"
},
{
"name" : "31823",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31823"
"name": "GLSA-200806-10",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200806-10.xml"
},
{
"name" : "31577",
"name": "30766",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/31577"
"url": "http://secunia.com/advisories/30766"
},
{
"name": "31479",
@ -343,9 +148,204 @@
"url": "http://secunia.com/advisories/31479"
},
{
"name" : "33937",
"name": "APPLE-SA-2009-02-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
},
{
"name": "ADV-2008-2423",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2423"
},
{
"name": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
},
{
"name": "30967",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/33937"
"url": "http://secunia.com/advisories/30967"
},
{
"name": "239006",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"
},
{
"name": "https://issues.rpath.com/browse/RPL-2608",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2608"
},
{
"name": "30821",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30821"
},
{
"name": "http://support.apple.com/kb/HT3026",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3026"
},
{
"name": "http://support.apple.com/kb/HT3129",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3129"
},
{
"name": "http://www.vmware.com/support/player/doc/releasenotes_player.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/player/doc/releasenotes_player.html"
},
{
"name": "FEDORA-2008-5425",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"
},
{
"name": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
},
{
"name": "oval:org.mitre.oval:def:11188",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188"
},
{
"name": "20080610 Multiple Vendor FreeType2 Multiple Heap Overflow Vulnerabilities",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717"
},
{
"name": "31856",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31856"
},
{
"name": "29639",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29639"
},
{
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
},
{
"name": "31711",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31711"
},
{
"name": "RHSA-2008:0556",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html"
},
{
"name": "SUSE-SR:2008:014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"
},
{
"name": "APPLE-SA-2008-09-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
},
{
"name": "20080830 VMSA-2008-0014 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Server, VMware ESX address information disclosure, privilege escalation and other security issues.",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
},
{
"name": "ADV-2008-1794",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1794"
},
{
"name": "31823",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31823"
},
{
"name": "ADV-2008-2558",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2558"
},
{
"name": "30600",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30600"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"
},
{
"name": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
},
{
"name": "31900",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31900"
},
{
"name": "30819",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30819"
},
{
"name": "31707",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31707"
},
{
"name": "APPLE-SA-2008-09-09",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
},
{
"name": "RHSA-2009:0329",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html"
},
{
"name": "USN-643-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-643-1"
},
{
"name": "35204",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35204"
},
{
"name": "RHSA-2008:0558",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html"
},
{
"name": "31577",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31577"
},
{
"name": "ADV-2008-2466",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2466"
},
{
"name": "29637",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29637"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-5110",
"STATE": "PUBLIC"
},
@ -53,19 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505791",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505791"
},
{
"name" : "[oss-security] 20081117 CVE Request (syslog-ng)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/11/17/3"
},
{
"name" : "GLSA-200907-10",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200907-10.xml"
"name": "SSRT100018",
"refsource": "HP",
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
},
{
"name": "HPSBMA02554",
@ -73,9 +63,9 @@
"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
},
{
"name" : "SSRT100018",
"refsource" : "HP",
"url" : "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
"name": "GLSA-200907-10",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200907-10.xml"
},
{
"name": "35748",
@ -91,6 +81,16 @@
"name": "ADV-2010-1796",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1796"
},
{
"name": "[oss-security] 20081117 CVE Request (syslog-ng)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/11/17/3"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505791",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505791"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5942"
},
{
"name": "kroax-kroax-sql-injection(43462)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43462"
},
{
"name": "29976",
"refsource": "BID",
@ -66,11 +71,6 @@
"name": "4639",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4639"
},
{
"name" : "kroax-kroax-sql-injection(43462)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43462"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "CONFIRM",
"url": "http://www.opera.com/docs/changelogs/linux/963/"
},
{
"name": "34294",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34294"
},
{
"name": "http://www.opera.com/support/kb/view/923/",
"refsource": "CONFIRM",
@ -71,11 +76,6 @@
"name": "1021461",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021461"
},
{
"name" : "34294",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34294"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/496727/100/0/threaded"
},
{
"name": "32009",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32009"
},
{
"name": "http://drupal.org/node/312968",
"refsource": "CONFIRM",
@ -67,11 +72,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31384"
},
{
"name" : "32009",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32009"
},
{
"name": "ajaxchecklist-save-sql-injection(45410)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-2003",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "MS11-077",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-077"
},
{
"name" : "oval:org.mitre.oval:def:13103",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13103"
},
{
"name": "1026165",
"refsource": "SECTRACK",
@ -71,6 +61,16 @@
"name": "8473",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8473"
},
{
"name": "MS11-077",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-077"
},
{
"name": "oval:org.mitre.oval:def:13103",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13103"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2125",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "73015",
"refsource": "OSVDB",
"url": "http://osvdb.org/73015"
},
{
"name": "48308",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48308"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html",
"refsource": "CONFIRM",
@ -62,16 +72,6 @@
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
},
{
"name" : "48308",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/48308"
},
{
"name" : "73015",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/73015"
},
{
"name": "shockwave-player-dirapix-bo(68049)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2130",
"STATE": "PUBLIC"
},
@ -52,30 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
"refsource" : "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
},
{
"name" : "RHSA-2011:1144",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-1144.html"
},
{
"name": "SUSE-SA:2011:033",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html"
},
{
"name" : "SUSE-SU-2011:0894",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html"
},
{
"name" : "openSUSE-SU-2011:0897",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html"
"name": "48308",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48308"
},
{
"name": "TA11-222A",
@ -87,15 +72,30 @@
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14194"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
},
{
"name": "SUSE-SU-2011:0894",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html"
},
{
"name": "RHSA-2011:1144",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1144.html"
},
{
"name": "oval:org.mitre.oval:def:16210",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16210"
},
{
"name" : "48308",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48308"
"name": "openSUSE-SU-2011:0897",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2698",
"STATE": "PUBLIC"
},
@ -52,25 +52,45 @@
},
"references": {
"reference_data": [
{
"name": "http://www.wireshark.org/security/wnpa-sec-2011-10.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2011-10.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=723215",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=723215"
},
{
"name": "[oss-security] 20110719 CVE Request -- Wireshark: Infinite loop in the ANSI A Interface (IS-634/IOS) dissector",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/19/5"
},
{
"name" : "[oss-security] 20110720 Re: CVE Request -- Wireshark: Infinite loop in the ANSI A Interface (IS-634/IOS) dissector",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/07/20/2"
"name": "RHSA-2013:0125",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0125.html"
},
{
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=37930",
"refsource" : "CONFIRM",
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=37930"
"name": "45574",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45574"
},
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2011-10.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2011-10.html"
"name": "49071",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49071"
},
{
"name": "48947",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48947"
},
{
"name": "FEDORA-2011-9638",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063586.html"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2011-11.html",
@ -83,14 +103,9 @@
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6044"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=723215",
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=37930",
"refsource": "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=723215"
},
{
"name" : "FEDORA-2011-9638",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063586.html"
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=37930"
},
{
"name": "FEDORA-2011-9640",
@ -98,19 +113,14 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063591.html"
},
{
"name" : "RHSA-2013:0125",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0125.html"
"name": "[oss-security] 20110720 Re: CVE Request -- Wireshark: Infinite loop in the ANSI A Interface (IS-634/IOS) dissector",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/2"
},
{
"name" : "49071",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/49071"
},
{
"name" : "oval:org.mitre.oval:def:14610",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14610"
"name": "wireshark-ansiamap-dos(69074)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69074"
},
{
"name": "45086",
@ -118,19 +128,9 @@
"url": "http://secunia.com/advisories/45086"
},
{
"name" : "45574",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/45574"
},
{
"name" : "48947",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48947"
},
{
"name" : "wireshark-ansiamap-dos(69074)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69074"
"name": "oval:org.mitre.oval:def:14610",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14610"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.tibco.com/multimedia/spotfire_advisory_20110831_tcm8-14230.txt",
"refsource" : "CONFIRM",
"url" : "http://www.tibco.com/multimedia/spotfire_advisory_20110831_tcm8-14230.txt"
},
{
"name": "http://www.tibco.com/services/support/advisories/default.jsp",
"refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "45864",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45864"
},
{
"name": "http://www.tibco.com/multimedia/spotfire_advisory_20110831_tcm8-14230.txt",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/multimedia/spotfire_advisory_20110831_tcm8-14230.txt"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0209",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130121 Re: CVE request for Movable Type",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2013/01/22/3"
},
{
"name": "http://www.sec-1.com/blog/?p=402",
"refsource": "MISC",
"url": "http://www.sec-1.com/blog/?p=402"
},
{
"name": "http://www.movabletype.org/2013/01/movable_type_438_patch.html",
"refsource": "CONFIRM",
"url": "http://www.movabletype.org/2013/01/movable_type_438_patch.html"
},
{
"name": "http://www.sec-1.com/blog/wp-content/uploads/2013/01/movabletype_upgrade_exec.rb_.txt",
"refsource": "MISC",
"url": "http://www.sec-1.com/blog/wp-content/uploads/2013/01/movabletype_upgrade_exec.rb_.txt"
},
{
"name" : "http://www.movabletype.org/2013/01/movable_type_438_patch.html",
"refsource" : "CONFIRM",
"url" : "http://www.movabletype.org/2013/01/movable_type_438_patch.html"
"name": "[oss-security] 20130121 Re: CVE request for Movable Type",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2013/01/22/3"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0255",
"STATE": "PUBLIC"
},
@ -53,44 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.postgresql.org/docs/8.3/static/release-8-3-23.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/8.3/static/release-8-3-23.html"
},
{
"name" : "http://www.postgresql.org/docs/8.4/static/release-8-4-16.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/8.4/static/release-8-4-16.html"
},
{
"name" : "http://www.postgresql.org/docs/9.0/static/release-9-0-12.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/9.0/static/release-9-0-12.html"
},
{
"name" : "http://www.postgresql.org/docs/9.1/static/release-9-1-8.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/9.1/static/release-9-1-8.html"
},
{
"name" : "http://www.postgresql.org/docs/9.2/static/release-9-2-3.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/9.2/static/release-9-2-3.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=907892",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=907892"
},
{
"name" : "https://blogs.oracle.com/sunsecurity/entry/cve_2013_0255_array_index",
"refsource" : "CONFIRM",
"url" : "https://blogs.oracle.com/sunsecurity/entry/cve_2013_0255_array_index"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
"name": "FEDORA-2013-2123",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098586.html"
},
{
"name": "DSA-2630",
@ -98,19 +63,9 @@
"url": "http://www.debian.org/security/2013/dsa-2630"
},
{
"name" : "FEDORA-2013-2123",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098586.html"
},
{
"name" : "MDVSA-2013:142",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142"
},
{
"name" : "RHSA-2013:1475",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1475.html"
"name": "openSUSE-SU-2013:0319",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00060.html"
},
{
"name": "openSUSE-SU-2013:0318",
@ -118,44 +73,89 @@
"url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00059.html"
},
{
"name" : "openSUSE-SU-2013:0319",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-02/msg00060.html"
"name": "http://www.postgresql.org/docs/8.4/static/release-8-4-16.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-16.html"
},
{
"name" : "USN-1717-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-1717-1"
"name": "MDVSA-2013:142",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142"
},
{
"name" : "57844",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/57844"
"name": "postgresql-enumrecv-dos(81917)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81917"
},
{
"name" : "89935",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/89935"
},
{
"name" : "1028092",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1028092"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=907892",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907892"
},
{
"name": "51923",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/51923"
},
{
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-8.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-8.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "57844",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/57844"
},
{
"name": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_0255_array_index",
"refsource": "CONFIRM",
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_0255_array_index"
},
{
"name": "USN-1717-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1717-1"
},
{
"name": "1028092",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1028092"
},
{
"name": "http://www.postgresql.org/docs/8.3/static/release-8-3-23.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/8.3/static/release-8-3-23.html"
},
{
"name": "89935",
"refsource": "OSVDB",
"url": "http://osvdb.org/89935"
},
{
"name": "RHSA-2013:1475",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1475.html"
},
{
"name": "http://www.postgresql.org/docs/9.2/static/release-9-2-3.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/9.2/static/release-9-2-3.html"
},
{
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-12.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-12.html"
},
{
"name": "52819",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52819"
},
{
"name" : "postgresql-enumrecv-dos(81917)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/81917"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-0558",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21640830"
},
{
"name": "IC90483",
"refsource": "AIXAPAR",
@ -66,6 +61,11 @@
"name": "sterling-b2b-cve20130558-infodisc(83006)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83006"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21640830",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21640830"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-1231",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1251",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016"
},
{
"name" : "TA13-043B",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
},
{
"name": "oval:org.mitre.oval:def:16408",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16408"
},
{
"name": "TA13-043B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA13-043B.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1291",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "MS13-036",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-036"
},
{
"name": "oval:org.mitre.oval:def:16504",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16504"
},
{
"name": "MS13-036",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-036"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-1296",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "MS13-029",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-029"
},
{
"name": "TA13-100A",
"refsource": "CERT",
@ -66,6 +61,11 @@
"name": "oval:org.mitre.oval:def:16598",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16598"
},
{
"name": "MS13-029",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-029"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1901",
"STATE": "PUBLIC"
},
@ -52,70 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.postgresql.org/about/news/1456/",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/about/news/1456/"
},
{
"name" : "http://www.postgresql.org/docs/current/static/release-9-1-9.html",
"refsource" : "CONFIRM",
"url" : "http://www.postgresql.org/docs/current/static/release-9-1-9.html"
},
{
"name": "http://www.postgresql.org/docs/current/static/release-9-2-4.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/current/static/release-9-2-4.html"
},
{
"name" : "http://support.apple.com/kb/HT5880",
"name": "http://www.postgresql.org/about/news/1456/",
"refsource": "CONFIRM",
"url" : "http://support.apple.com/kb/HT5880"
},
{
"name" : "http://support.apple.com/kb/HT5892",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5892"
},
{
"name" : "APPLE-SA-2013-09-12-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
},
{
"name" : "APPLE-SA-2013-09-17-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html"
},
{
"name" : "DSA-2658",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2658"
},
{
"name" : "FEDORA-2013-5000",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html"
},
{
"name" : "FEDORA-2013-6148",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html"
},
{
"name" : "MDVSA-2013:142",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142"
},
{
"name" : "SUSE-SU-2013:0633",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html"
},
{
"name" : "openSUSE-SU-2013:0627",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html"
"url": "http://www.postgresql.org/about/news/1456/"
},
{
"name": "openSUSE-SU-2013:0628",
@ -127,10 +72,65 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html"
},
{
"name": "MDVSA-2013:142",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:142"
},
{
"name": "http://support.apple.com/kb/HT5892",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5892"
},
{
"name": "USN-1789-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1789-1"
},
{
"name": "APPLE-SA-2013-09-12-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
},
{
"name": "FEDORA-2013-6148",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102806.html"
},
{
"name": "APPLE-SA-2013-09-17-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00004.html"
},
{
"name": "http://www.postgresql.org/docs/current/static/release-9-1-9.html",
"refsource": "CONFIRM",
"url": "http://www.postgresql.org/docs/current/static/release-9-1-9.html"
},
{
"name": "SUSE-SU-2013:0633",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html"
},
{
"name": "DSA-2658",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2658"
},
{
"name": "openSUSE-SU-2013:0627",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html"
},
{
"name": "FEDORA-2013-5000",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101519.html"
},
{
"name": "http://support.apple.com/kb/HT5880",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5880"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4425",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "99518",
"refsource": "OSVDB",
"url": "http://osvdb.org/99518"
},
{
"name": "20131106 CVE-2013-4425: Private key disclosure, Osirix (lite, 64bit and FDA cleader version) (Medical Application)",
"refsource": "BUGTRAQ",
@ -62,11 +67,6 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63566"
},
{
"name" : "99518",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/99518"
},
{
"name": "osirix-cve20134425-info-disc(88606)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4564",
"STATE": "PUBLIC"
},
@ -52,11 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "56276",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56276"
},
{
"name": "[Swan-announce] 20131211 Libreswan 3.7 released",
"refsource": "MLIST",
"url": "https://lists.libreswan.org/pipermail/swan-announce/2013/000007.html"
},
{
"name": "FEDORA-2013-23315",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124928.html"
},
{
"name": "https://libreswan.org/security/CVE-2013-4564/CVE-2013-4564.txt.asc",
"refsource": "CONFIRM",
@ -71,16 +81,6 @@
"name": "FEDORA-2013-23299",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124911.html"
},
{
"name" : "FEDORA-2013-23315",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124928.html"
},
{
"name" : "56276",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56276"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-007/",
"refsource" : "MISC",
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-007/"
"name": "typo3-metafeedit-unspecified-sql-injection(84661)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84661"
},
{
"name": "93806",
@ -63,9 +63,9 @@
"url": "http://osvdb.org/93806"
},
{
"name" : "typo3-metafeedit-unspecified-sql-injection(84661)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/84661"
"name": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-007/",
"refsource": "MISC",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-007/"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-5411",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "ibm-sterling-cve20135411-link-inj(87360)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87360"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "IC96059",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC96059"
},
{
"name" : "ibm-sterling-cve20135411-link-inj(87360)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/87360"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-5505",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31008",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31008"
"name": "54626",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54626"
},
{
"name": "20130927 Cisco Identity Services Engine Administration Interface Cross-Site Scripting Vulnerability",
@ -63,9 +63,9 @@
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5505"
},
{
"name" : "62693",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/62693"
"name": "cisco-ise-cve20135505-xss(87530)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87530"
},
{
"name": "97875",
@ -78,14 +78,14 @@
"url": "http://www.securitytracker.com/id/1029111"
},
{
"name" : "54626",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54626"
"name": "62693",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/62693"
},
{
"name" : "cisco-ise-cve20135505-xss(87530)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/87530"
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31008",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31008"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.455673",
"ID": "CVE-2017-1000226",
"REQUESTER": "tom@dxw.com",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Stop User Enumeration",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "1.3.8"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Fullworks"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Incorrect Access Control"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-11-22",
"ID": "CVE-2017-1000405",
"REQUESTER": "contact@bindecy.com",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Linux Kernel",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.6.38 through 4.14"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Linux Kernel"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "memory overwrite"
"value": "n/a"
}
]
}
@ -55,9 +55,14 @@
"references": {
"reference_data": [
{
"name" : "43199",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/43199/"
"name": "102032",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102032"
},
{
"name": "RHSA-2018:0180",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0180"
},
{
"name": "https://medium.com/bindecy/huge-dirty-cow-cve-2017-1000405-110eca132de0",
@ -69,20 +74,15 @@
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/pixel/2018-02-01"
},
{
"name" : "RHSA-2018:0180",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0180"
},
{
"name" : "102032",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102032"
},
{
"name": "1040020",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040020"
},
{
"name": "43199",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43199/"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-278-01",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-17-278-01"
},
{
"name": "101174",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101174"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-17-278-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-278-01"
}
]
}

View File

@ -56,14 +56,44 @@
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html"
"name": "1039581",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039581"
},
{
"name" : "https://www.krackattacks.com/",
"refsource" : "MISC",
"url" : "https://www.krackattacks.com/"
"name": "101274",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101274"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name": "SUSE-SU-2017:2745",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html"
},
{
"name": "DSA-3999",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3999"
},
{
"name": "1039578",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039578"
},
{
"name": "https://access.redhat.com/security/vulnerabilities/kracks",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/security/vulnerabilities/kracks"
},
{
"name": "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa"
},
{
"name": "https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt",
@ -76,9 +106,19 @@
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt"
},
{
"name" : "https://access.redhat.com/security/vulnerabilities/kracks",
"name": "1039577",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039577"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us",
"refsource": "CONFIRM",
"url" : "https://access.redhat.com/security/vulnerabilities/kracks"
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us"
},
{
"name": "openSUSE-SU-2017:2755",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html"
},
{
"name": "https://source.android.com/security/bulletin/2017-11-01",
@ -86,14 +126,49 @@
"url": "https://source.android.com/security/bulletin/2017-11-01"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "GLSA-201711-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201711-03"
},
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us"
"name": "FreeBSD-SA-17:07",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc"
},
{
"name": "https://www.krackattacks.com/",
"refsource": "MISC",
"url": "https://www.krackattacks.com/"
},
{
"name": "1039573",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039573"
},
{
"name": "SUSE-SU-2017:2752",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html"
},
{
"name": "1039576",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039576"
},
{
"name": "1039585",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039585"
},
{
"name": "VU#228519",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/228519"
},
{
"name": "[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf",
@ -105,85 +180,10 @@
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2017-005"
},
{
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
"refsource" : "CISCO",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa"
},
{
"name" : "DSA-3999",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2017/dsa-3999"
},
{
"name" : "FreeBSD-SA-17:07",
"refsource" : "FREEBSD",
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc"
},
{
"name" : "GLSA-201711-03",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201711-03"
},
{
"name" : "SUSE-SU-2017:2745",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html"
},
{
"name" : "SUSE-SU-2017:2752",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html"
},
{
"name" : "openSUSE-SU-2017:2755",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html"
},
{
"name": "USN-3455-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3455-1"
},
{
"name" : "VU#228519",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/228519"
},
{
"name" : "101274",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101274"
},
{
"name" : "1039573",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039573"
},
{
"name" : "1039576",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039576"
},
{
"name" : "1039577",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039577"
},
{
"name" : "1039578",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039578"
},
{
"name" : "1039581",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039581"
},
{
"name" : "1039585",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039585"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205",
"refsource" : "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205"
},
{
"name": "https://github.com/torvalds/linux/commit/bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bc3aae2bbac46dd894c89db5d5e98f7f0ef9e205"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@microfocus.com",
"ASSIGNER": "security@suse.com",
"ID": "CVE-2017-13985",
"STATE": "PUBLIC"
},

View File

@ -62,15 +62,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10204",
"refsource" : "CONFIRM",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10204"
},
{
"name": "99559",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99559"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10204",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10204"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4512",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4603",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.vmware.com/security/advisories/VMSA-2017-0013.html",
"refsource" : "CONFIRM",
"url" : "https://www.vmware.com/security/advisories/VMSA-2017-0013.html"
},
{
"name": "100012",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100012"
},
{
"name": "https://www.vmware.com/security/advisories/VMSA-2017-0013.html",
"refsource": "CONFIRM",
"url": "https://www.vmware.com/security/advisories/VMSA-2017-0013.html"
},
{
"name": "1039013",
"refsource": "SECTRACK",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/rakjong/vuln/blob/master/wordpress_wp-live-chat-support_XSS.pdf",
"refsource" : "MISC",
"url" : "https://github.com/rakjong/vuln/blob/master/wordpress_wp-live-chat-support_XSS.pdf"
},
{
"name": "https://wordpress.org/plugins/wp-live-chat-support/#developers",
"refsource": "MISC",
"url": "https://wordpress.org/plugins/wp-live-chat-support/#developers"
},
{
"name": "https://github.com/rakjong/vuln/blob/master/wordpress_wp-live-chat-support_XSS.pdf",
"refsource": "MISC",
"url": "https://github.com/rakjong/vuln/blob/master/wordpress_wp-live-chat-support_XSS.pdf"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@microfocus.com",
"ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2018-11-07T14:30:00.000Z",
"ID": "CVE-2018-18590",
"STATE": "PUBLIC",

View File

@ -53,24 +53,9 @@
"references": {
"reference_data": [
{
"name" : "45886",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45886/"
},
{
"name" : "45915",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45915/"
},
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd",
"name": "https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd",
"refsource": "MISC",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd"
},
{
"name" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1712",
"refsource" : "MISC",
"url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1712"
"url": "https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd"
},
{
"name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.19",
@ -78,40 +63,55 @@
"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.19"
},
{
"name" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.2",
"refsource" : "MISC",
"url" : "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.2"
},
{
"name" : "https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd",
"refsource" : "MISC",
"url" : "https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd"
},
{
"name" : "USN-3832-1",
"name": "USN-3836-2",
"refsource": "UBUNTU",
"url" : "https://usn.ubuntu.com/3832-1/"
},
{
"name" : "USN-3833-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3833-1/"
"url": "https://usn.ubuntu.com/3836-2/"
},
{
"name": "USN-3835-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3835-1/"
},
{
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1712",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1712"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd",
"refsource": "MISC",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd"
},
{
"name": "USN-3833-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3833-1/"
},
{
"name": "USN-3832-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3832-1/"
},
{
"name": "45915",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45915/"
},
{
"name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.2",
"refsource": "MISC",
"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.2"
},
{
"name": "45886",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45886/"
},
{
"name": "USN-3836-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3836-1/"
},
{
"name" : "USN-3836-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3836-2/"
},
{
"name": "105941",
"refsource": "BID",

View File

@ -59,15 +59,15 @@
},
"references": {
"reference_data": [
{
"name" : "[dev] 20180711 CVE-2018-1334 Apache Spark local privilege escalation vulnerability",
"refsource" : "MLIST",
"url" : "https://lists.apache.org/thread.html/4d6d210e319a501b740293daaeeeadb51927111fb8261a3e4cd60060@%3Cdev.spark.apache.org%3E"
},
{
"name": "https://spark.apache.org/security.html#CVE-2018-1334",
"refsource": "CONFIRM",
"url": "https://spark.apache.org/security.html#CVE-2018-1334"
},
{
"name": "[dev] 20180711 CVE-2018-1334 Apache Spark local privilege escalation vulnerability",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/4d6d210e319a501b740293daaeeeadb51927111fb8261a3e4cd60060@%3Cdev.spark.apache.org%3E"
}
]
}