"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:04:39 +00:00
parent ae60104d5f
commit 5cc70163fe
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
50 changed files with 2957 additions and 2957 deletions

View File

@ -57,6 +57,11 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-036"
},
{
"name": "2929",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2929"
},
{
"name": "L-101",
"refsource": "CIAC",
@ -66,11 +71,6 @@
"name": "win2k-ldap-change-passwords(6745)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6745"
},
{
"name" : "2929",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2929"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20010411 def-2001-20: Lotus Domino Multiple DoS ",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0174.html"
},
{
"name": "lotus-domino-device-dos(6348)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6348"
},
{
"refsource": "BUGTRAQ",
"name": "20010411 def-2001-20: Lotus Domino Multiple DoS",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0174.html"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "28609",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28609"
},
{
"name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4075",
"refsource": "CONFIRM",
@ -62,16 +67,6 @@
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ11242"
},
{
"name" : "IZ11243",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=isg1IZ11243"
},
{
"name" : "IZ11244",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=isg1IZ11244"
},
{
"name": "IZ12745",
"refsource": "AIXAPAR",
@ -82,25 +77,30 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27434"
},
{
"name" : "ADV-2008-0261",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0261"
},
{
"name": "1019265",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019265"
},
{
"name" : "28609",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28609"
"name": "IZ11244",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ11244"
},
{
"name": "ADV-2008-0261",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0261"
},
{
"name": "aix-ps-information-disclosure(39911)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39911"
},
{
"name": "IZ11243",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ11243"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "https://www.exploit-db.com/exploits/5120"
},
{
"name" : "27805",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27805"
"name": "mediaslide-index-sql-injection(40517)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40517"
},
{
"name": "28962",
@ -68,9 +68,9 @@
"url": "http://secunia.com/advisories/28962"
},
{
"name" : "mediaslide-index-sql-injection(40517)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/40517"
"name": "27805",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27805"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200804e.html",
"refsource" : "CONFIRM",
"url" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200804e.html"
},
{
"name": "27966",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "29088",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29088"
},
{
"name": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200804e.html",
"refsource": "CONFIRM",
"url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200804e.html"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "28117",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28117"
},
{
"name": "29255",
"refsource": "SECUNIA",
@ -66,6 +61,11 @@
"name": "bosdates-type-category-xss(41020)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41020"
},
{
"name": "28117",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28117"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "5360",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5360"
},
{
"name": "28623",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "sabrosus-thumbnails-file-include(41672)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41672"
},
{
"name": "5360",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5360"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-5467",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://bugs.php.net/bug.php?id=42718",
"name": "http://www.php.net/archive/2008.php#id2008-12-08-1",
"refsource": "CONFIRM",
"url" : "http://bugs.php.net/bug.php?id=42718"
},
{
"name" : "http://www.php.net/ChangeLog-5.php#5.2.8",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/ChangeLog-5.php#5.2.8"
"url": "http://www.php.net/archive/2008.php#id2008-12-08-1"
},
{
"name": "http://www.php.net/archive/2008.php#id2008-12-07-1",
@ -68,14 +63,9 @@
"url": "http://www.php.net/archive/2008.php#id2008-12-07-1"
},
{
"name" : "http://www.php.net/archive/2008.php#id2008-12-08-1",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/archive/2008.php#id2008-12-08-1"
},
{
"name" : "http://bugs.php.net/bug.php?id=46759",
"refsource" : "CONFIRM",
"url" : "http://bugs.php.net/bug.php?id=46759"
"name": "1021393",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021393"
},
{
"name": "32673",
@ -83,9 +73,19 @@
"url": "http://www.securityfocus.com/bid/32673"
},
{
"name" : "1021393",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021393"
"name": "http://www.php.net/ChangeLog-5.php#5.2.8",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php#5.2.8"
},
{
"name": "http://bugs.php.net/bug.php?id=46759",
"refsource": "CONFIRM",
"url": "http://bugs.php.net/bug.php?id=46759"
},
{
"name": "http://bugs.php.net/bug.php?id=42718",
"refsource": "CONFIRM",
"url": "http://bugs.php.net/bug.php?id=42718"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-0527",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2013-0828",
"STATE": "PUBLIC"
},
@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:16272",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16272"
},
{
"name": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "https://code.google.com/p/chromium/issues/detail?id=162153",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=162153"
},
{
"name" : "oval:org.mitre.oval:def:16272",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16272"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-3040",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3111",
"STATE": "PUBLIC"
},
@ -58,14 +58,9 @@
"url": "https://www.exploit-db.com/exploits/40907/"
},
{
"name" : "http://blog.skylined.nl/20161212001.html",
"refsource" : "MISC",
"url" : "http://blog.skylined.nl/20161212001.html"
},
{
"name" : "http://packetstormsecurity.com/files/140124/Microsoft-Internet-Explorer-9-IEFRAME-CSelectionInteractButtonBehavior-_UpdateButtonLocation-Use-After-Free.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/140124/Microsoft-Internet-Explorer-9-IEFRAME-CSelectionInteractButtonBehavior-_UpdateButtonLocation-Use-After-Free.html"
"name": "TA13-168A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-168A"
},
{
"name": "MS13-047",
@ -73,14 +68,19 @@
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-047"
},
{
"name" : "TA13-168A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-168A"
"name": "http://blog.skylined.nl/20161212001.html",
"refsource": "MISC",
"url": "http://blog.skylined.nl/20161212001.html"
},
{
"name": "oval:org.mitre.oval:def:16708",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16708"
},
{
"name": "http://packetstormsecurity.com/files/140124/Microsoft-Internet-Explorer-9-IEFRAME-CSelectionInteractButtonBehavior-_UpdateButtonLocation-Use-After-Free.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/140124/Microsoft-Internet-Explorer-9-IEFRAME-CSelectionInteractButtonBehavior-_UpdateButtonLocation-Use-After-Free.html"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "http://www.darksecurity.de/advisories/2013/SSCHADV2013-004.txt"
},
{
"name" : "http://plugins.trac.wordpress.org/changeset?old_path=%2Ffeedweb&old=689612&new_path=%2Ffeedweb&new=689612",
"refsource" : "CONFIRM",
"url" : "http://plugins.trac.wordpress.org/changeset?old_path=%2Ffeedweb&old=689612&new_path=%2Ffeedweb&new=689612"
"name": "52855",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52855"
},
{
"name": "http://wordpress.org/extend/plugins/feedweb/changelog/",
@ -68,9 +68,9 @@
"url": "http://wordpress.org/extend/plugins/feedweb/changelog/"
},
{
"name" : "52855",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/52855"
"name": "http://plugins.trac.wordpress.org/changeset?old_path=%2Ffeedweb&old=689612&new_path=%2Ffeedweb&new=689612",
"refsource": "CONFIRM",
"url": "http://plugins.trac.wordpress.org/changeset?old_path=%2Ffeedweb&old=689612&new_path=%2Ffeedweb&new=689612"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4188",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2013/q3/261"
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource": "CONFIRM",
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement"
},
{
"name": "http://plone.org/products/plone-hotfix/releases/20130618",
@ -63,9 +63,9 @@
"url": "http://plone.org/products/plone-hotfix/releases/20130618"
},
{
"name" : "http://plone.org/products/plone/security/advisories/20130618-announcement",
"refsource" : "CONFIRM",
"url" : "http://plone.org/products/plone/security/advisories/20130618-announcement"
"name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q3/261"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978449",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4190",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2013/q3/261"
},
{
"name" : "http://plone.org/products/plone-hotfix/releases/20130618",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=978451",
"refsource": "CONFIRM",
"url" : "http://plone.org/products/plone-hotfix/releases/20130618"
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=978451"
},
{
"name": "http://plone.org/products/plone/security/advisories/20130618-announcement",
@ -68,9 +63,14 @@
"url": "http://plone.org/products/plone/security/advisories/20130618-announcement"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=978451",
"name": "http://plone.org/products/plone-hotfix/releases/20130618",
"refsource": "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=978451"
"url": "http://plone.org/products/plone-hotfix/releases/20130618"
},
{
"name": "[oss-security] 20130801 Re: CVE Request -- Plone: 20130618 Hotfix (multiple vectors)",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q3/261"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4231",
"STATE": "PUBLIC"
},
@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130809 Re: CVE Request -- Four (stack-based) buffer overflows and one use-after-free in libtiff v4.0.3 reported by Pedro Ribeiro",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/08/10/2"
},
{
"name" : "[tiff] 20130801 Vulnerabilities in libtiff 4.0.3",
"refsource" : "MLIST",
"url" : "http://www.asmail.be/msg0055359936.html"
},
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2450",
"refsource": "CONFIRM",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2450"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=995965",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=995965"
},
{
"name" : "DSA-2744",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2744"
},
{
"name": "RHSA-2014:0223",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0223.html"
},
{
"name" : "61695",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/61695"
"name": "DSA-2744",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2744"
},
{
"name": "54543",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54543"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=995965",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=995965"
},
{
"name": "[tiff] 20130801 Vulnerabilities in libtiff 4.0.3",
"refsource": "MLIST",
"url": "http://www.asmail.be/msg0055359936.html"
},
{
"name": "54628",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54628"
},
{
"name": "[oss-security] 20130809 Re: CVE Request -- Four (stack-based) buffer overflows and one use-after-free in libtiff v4.0.3 reported by Pedro Ribeiro",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/08/10/2"
},
{
"name": "61695",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61695"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4457",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20131022 Recursive Interpolation Vulnerability in Cocaine rubygem (CVE-2013-4457)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/10/22/10"
},
{
"name": "https://github.com/thoughtbot/cocaine/blob/master/NEWS.md",
"refsource": "CONFIRM",
@ -67,6 +62,11 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/98835"
},
{
"name": "[oss-security] 20131022 Recursive Interpolation Vulnerability in Cocaine rubygem (CVE-2013-4457)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/10/22/10"
},
{
"name": "55365",
"refsource": "SECUNIA",

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20130722 SurgeFtp Server BufferOverflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-07/0149.html"
},
{
"name" : "61403",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/61403"
},
{
"name" : "95582",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/95582"
},
{
"name": "54188",
"refsource": "SECUNIA",
@ -76,6 +61,21 @@
"name": "surgeftp-cve20134742-vfprint-bo(85922)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85922"
},
{
"name": "95582",
"refsource": "OSVDB",
"url": "http://osvdb.org/95582"
},
{
"name": "61403",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61403"
},
{
"name": "20130722 SurgeFtp Server BufferOverflow Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0149.html"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos10",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos10"
},
{
"name": "102019",
"refsource": "BID",
@ -66,6 +61,11 @@
"name": "1039932",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039932"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos10",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos10"
}
]
}

View File

@ -54,9 +54,9 @@
"references": {
"reference_data": [
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
"name": "1039152",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039152"
},
{
"name": "100367",
@ -64,9 +64,9 @@
"url": "http://www.securityfocus.com/bid/100367"
},
{
"name" : "1039152",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039152"
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us"
}
]
}

View File

@ -53,11 +53,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2017/10/02/klcert-17-005-sentinel-ldk-rte-remote-manipulations-with-language-pack-updater-lead-to-ntlm-relay-attack-for-system-user/",
"refsource" : "MISC",
"url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2017/10/02/klcert-17-005-sentinel-ldk-rte-remote-manipulations-with-language-pack-updater-lead-to-ntlm-relay-attack-for-system-user/"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-093-01",
"refsource": "MISC",
@ -67,6 +62,11 @@
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-727467.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-727467.pdf"
},
{
"name": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2017/10/02/klcert-17-005-sentinel-ldk-rte-remote-manipulations-with-language-pack-updater-lead-to-ntlm-relay-attack-for-system-user/",
"refsource": "MISC",
"url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2017/10/02/klcert-17-005-sentinel-ldk-rte-remote-manipulations-with-language-pack-updater-lead-to-ntlm-relay-attack-for-system-user/"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "https://simplesamlphp.org/security/201703-01",
"refsource": "CONFIRM",
"url": "https://simplesamlphp.org/security/201703-01"
},
{
"name": "[debian-lts-announce] 20171212 [SECURITY] [DLA 1205-1] simplesamlphp security update",
"refsource": "MLIST",
@ -61,11 +66,6 @@
"name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1408-1] simplesamlphp security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00017.html"
},
{
"name" : "https://simplesamlphp.org/security/201703-01",
"refsource" : "CONFIRM",
"url" : "https://simplesamlphp.org/security/201703-01"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-03-05T00:00:00",
"ID": "CVE-2017-13270",
"STATE": "PUBLIC"

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16462",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -76,19 +76,9 @@
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2019/01/msg00025.html"
},
{
"name" : "[debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2019/02/msg00024.html"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1087565",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1087565"
"name": "RHSA-2019:0219",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0219"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-01/",
@ -96,24 +86,19 @@
"url": "https://www.mozilla.org/security/advisories/mfsa2019-01/"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2019-02/",
"name": "USN-3897-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3897-1/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1087565",
"refsource": "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2019-02/"
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1087565"
},
{
"name" : "https://www.mozilla.org/security/advisories/mfsa2019-03/",
"refsource" : "CONFIRM",
"url" : "https://www.mozilla.org/security/advisories/mfsa2019-03/"
},
{
"name" : "DSA-4376",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2019/dsa-4376"
},
{
"name" : "DSA-4392",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2019/dsa-4392"
"name": "106781",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106781"
},
{
"name": "GLSA-201903-04",
@ -121,39 +106,54 @@
"url": "https://security.gentoo.org/glsa/201903-04"
},
{
"name" : "RHSA-2019:0218",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2019:0218"
},
{
"name" : "RHSA-2019:0219",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2019:0219"
"name": "USN-3874-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3874-1/"
},
{
"name": "RHSA-2019:0269",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0269"
},
{
"name": "RHSA-2019:0218",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0218"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-02/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-02/"
},
{
"name": "DSA-4376",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4376"
},
{
"name": "[debian-lts-announce] 20190216 [SECURITY] [DLA 1678-1] thunderbird security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00024.html"
},
{
"name": "[debian-lts-announce] 20190130 [SECURITY] [DLA 1648-1] firefox-esr security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00025.html"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-03/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-03/"
},
{
"name": "DSA-4392",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4392"
},
{
"name": "RHSA-2019:0270",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0270"
},
{
"name" : "USN-3874-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3874-1/"
},
{
"name" : "USN-3897-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3897-1/"
},
{
"name" : "106781",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/106781"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20181221 [CORE-2017-0012] - ASUS Drivers Elevation of Privilege Vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/Dec/34"
"name": "106250",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106250"
},
{
"name": "http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html",
@ -68,9 +68,9 @@
"url": "https://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities"
},
{
"name" : "106250",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/106250"
"name": "20181221 [CORE-2017-0012] - ASUS Drivers Elevation of Privilege Vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Dec/34"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/fouzhe/security/tree/master/libiec61850#segv-in-function-controlobjectclient_setcommandterminationhandler",
"refsource" : "MISC",
"url" : "https://github.com/fouzhe/security/tree/master/libiec61850#segv-in-function-controlobjectclient_setcommandterminationhandler"
},
{
"name": "https://github.com/mz-automation/libiec61850/issues/84",
"refsource": "MISC",
"url": "https://github.com/mz-automation/libiec61850/issues/84"
},
{
"name": "https://github.com/fouzhe/security/tree/master/libiec61850#segv-in-function-controlobjectclient_setcommandterminationhandler",
"refsource": "MISC",
"url": "https://github.com/fouzhe/security/tree/master/libiec61850#segv-in-function-controlobjectclient_setcommandterminationhandler"
}
]
}