"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:29:38 +00:00
parent 05be0a5dd0
commit 5f3e2b15ff
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
55 changed files with 3681 additions and 3681 deletions

View File

@ -57,16 +57,16 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110244662102167&w=2" "url": "http://marc.info/?l=bugtraq&m=110244662102167&w=2"
}, },
{
"name" : "11838",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/11838"
},
{ {
"name": "battlefieldvietnam-numplayers-dos(18402)", "name": "battlefieldvietnam-numplayers-dos(18402)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18402" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18402"
}, },
{
"name": "11838",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/11838"
},
{ {
"name": "battlefield-numplayers-dos(18400)", "name": "battlefield-numplayers-dos(18400)",
"refsource": "XF", "refsource": "XF",

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20040829 [vulnwatch] WS_FTP Server Denial of Service Vulnerability", "name": "12406",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://marc.info/?l=bugtraq&m=109389890712888&w=2" "url": "http://secunia.com/advisories/12406"
}, },
{ {
"name": "11065", "name": "11065",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/11065" "url": "http://www.securityfocus.com/bid/11065"
}, },
{
"name" : "12406",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/12406"
},
{ {
"name": "wsftp-file-parsing-dos(17155)", "name": "wsftp-file-parsing-dos(17155)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17155" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17155"
},
{
"name": "20040829 [vulnwatch] WS_FTP Server Denial of Service Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=109389890712888&w=2"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20040312 Cpanel 9.1.0 have a problem ?",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107911581732035&w=2"
},
{ {
"name": "VU#831534", "name": "VU#831534",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/831534" "url": "http://www.kb.cert.org/vuls/id/831534"
}, },
{
"name": "20040312 Cpanel 9.1.0 have a problem ?",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107911581732035&w=2"
},
{ {
"name": "9855", "name": "9855",
"refsource": "BID", "refsource": "BID",

View File

@ -57,15 +57,15 @@
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=108180024428804&w=2" "url": "http://marc.info/?l=bugtraq&m=108180024428804&w=2"
}, },
{
"name" : "10102",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/10102"
},
{ {
"name": "citadel-database-insecure-permissions(15850)", "name": "citadel-database-insecure-permissions(15850)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15850" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15850"
},
{
"name": "10102",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10102"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-0411", "ID": "CVE-2008-0411",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,64 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080228 Ghostscript buffer overflow", "name": "29103",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/488946/100/0/threaded" "url": "http://secunia.com/advisories/29103"
},
{
"name" : "20080228 rPSA-2008-0082-1 espgs",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488932/100/0/threaded"
},
{
"name" : "http://scary.beasts.org/security/CESA-2008-001.html",
"refsource" : "MISC",
"url" : "http://scary.beasts.org/security/CESA-2008-001.html"
},
{
"name" : "https://issues.rpath.com/browse/RPL-2217",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-2217"
},
{
"name" : "http://wiki.rpath.com/Advisories:rPSA-2008-0082",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/Advisories:rPSA-2008-0082"
},
{
"name" : "DSA-1510",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1510"
},
{
"name" : "FEDORA-2008-1998",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html"
},
{
"name" : "GLSA-200803-14",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml"
},
{
"name" : "MDVSA-2008:055",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:055"
},
{
"name" : "RHSA-2008:0155",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0155.html"
},
{
"name" : "SSA:2008-062-01",
"refsource" : "SLACKWARE",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.370633"
},
{
"name" : "SUSE-SA:2008:010",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html"
}, },
{ {
"name": "USN-599-1", "name": "USN-599-1",
@ -118,74 +63,129 @@
"url": "http://www.ubuntu.com/usn/usn-599-1" "url": "http://www.ubuntu.com/usn/usn-599-1"
}, },
{ {
"name" : "28017", "name": "GLSA-200803-14",
"refsource" : "BID", "refsource": "GENTOO",
"url" : "http://www.securityfocus.com/bid/28017" "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-14.xml"
},
{
"name" : "oval:org.mitre.oval:def:9557",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557"
},
{
"name" : "ADV-2008-0693",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0693/references"
},
{
"name" : "1019511",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019511"
},
{
"name" : "29101",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29101"
},
{
"name" : "29147",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29147"
},
{
"name" : "29169",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29169"
},
{
"name" : "29103",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29103"
},
{
"name" : "29112",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29112"
},
{
"name" : "29135",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29135"
},
{
"name" : "29196",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29196"
}, },
{ {
"name": "29154", "name": "29154",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29154" "url": "http://secunia.com/advisories/29154"
}, },
{
"name": "29196",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29196"
},
{
"name": "20080228 Ghostscript buffer overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488946/100/0/threaded"
},
{
"name": "ADV-2008-0693",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0693/references"
},
{ {
"name": "29314", "name": "29314",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29314" "url": "http://secunia.com/advisories/29314"
}, },
{
"name": "20080228 rPSA-2008-0082-1 espgs",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488932/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:9557",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9557"
},
{
"name": "29101",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29101"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2008-0082",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0082"
},
{
"name": "29112",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29112"
},
{
"name": "SUSE-SA:2008:010",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00009.html"
},
{
"name": "29147",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29147"
},
{
"name": "MDVSA-2008:055",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:055"
},
{
"name": "https://issues.rpath.com/browse/RPL-2217",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2217"
},
{ {
"name": "29768", "name": "29768",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29768" "url": "http://secunia.com/advisories/29768"
},
{
"name": "1019511",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019511"
},
{
"name": "DSA-1510",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1510"
},
{
"name": "RHSA-2008:0155",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0155.html"
},
{
"name": "28017",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28017"
},
{
"name": "http://scary.beasts.org/security/CESA-2008-001.html",
"refsource": "MISC",
"url": "http://scary.beasts.org/security/CESA-2008-001.html"
},
{
"name": "FEDORA-2008-1998",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00085.html"
},
{
"name": "29135",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29135"
},
{
"name": "29169",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29169"
},
{
"name": "SSA:2008-062-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.370633"
} }
] ]
} }

View File

@ -53,29 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[MediaWiki-announce] 20080124 MediaWiki 1.11.1, 1.10.3, 1.9.5 released", "name": "mediawiki-api-xss(39901)",
"refsource" : "MLIST", "refsource": "XF",
"url" : "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-January/000068.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39901"
},
{
"name" : "FEDORA-2008-2245",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00147.html"
}, },
{ {
"name": "FEDORA-2008-2288", "name": "FEDORA-2008-2288",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00189.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00189.html"
}, },
{
"name": "ADV-2008-0280",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0280"
},
{
"name": "FEDORA-2008-2245",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00147.html"
},
{ {
"name": "28137", "name": "28137",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/28137" "url": "http://www.securityfocus.com/bid/28137"
}, },
{ {
"name" : "ADV-2008-0280", "name": "[MediaWiki-announce] 20080124 MediaWiki 1.11.1, 1.10.3, 1.9.5 released",
"refsource" : "VUPEN", "refsource": "MLIST",
"url" : "http://www.vupen.com/english/advisories/2008/0280" "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-January/000068.html"
}, },
{ {
"name": "28629", "name": "28629",
@ -86,11 +91,6 @@
"name": "29266", "name": "29266",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29266" "url": "http://secunia.com/advisories/29266"
},
{
"name" : "mediawiki-api-xss(39901)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39901"
} }
] ]
} }

View File

@ -53,15 +53,25 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080727 Multiple Cross-Site Scripting Vulnerabilities in Web Wiz Rich Text Editor version 4.02", "name": "31272",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/494822/100/0/threaded" "url": "http://secunia.com/advisories/31272"
}, },
{ {
"name": "http://depo2.nm.ru/WebWiz_Rich_Text_Editor_v4.02_XSS.txt", "name": "http://depo2.nm.ru/WebWiz_Rich_Text_Editor_v4.02_XSS.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "http://depo2.nm.ru/WebWiz_Rich_Text_Editor_v4.02_XSS.txt" "url": "http://depo2.nm.ru/WebWiz_Rich_Text_Editor_v4.02_XSS.txt"
}, },
{
"name": "20080727 Multiple Cross-Site Scripting Vulnerabilities in Web Wiz Rich Text Editor version 4.02",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/494822/100/0/threaded"
},
{
"name": "4055",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4055"
},
{ {
"name": "30408", "name": "30408",
"refsource": "BID", "refsource": "BID",
@ -71,16 +81,6 @@
"name": "ADV-2008-2210", "name": "ADV-2008-2210",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2210/references" "url": "http://www.vupen.com/english/advisories/2008/2210/references"
},
{
"name" : "31272",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31272"
},
{
"name" : "4055",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4055"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-3827", "ID": "CVE-2008-3827",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,30 +52,20 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080929 [oCERT-2008-013] MPlayer Real demuxer heap overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/496806/100/0/threaded"
},
{ {
"name": "http://www.ocert.org/advisories/ocert-2008-013.html", "name": "http://www.ocert.org/advisories/ocert-2008-013.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.ocert.org/advisories/ocert-2008-013.html" "url": "http://www.ocert.org/advisories/ocert-2008-013.html"
}, },
{ {
"name" : "http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675", "name": "4326",
"refsource" : "CONFIRM", "refsource": "SREASON",
"url" : "http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675" "url": "http://securityreason.com/securityalert/4326"
}, },
{ {
"name" : "DSA-1644", "name": "32045",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2008/dsa-1644" "url": "http://secunia.com/advisories/32045"
},
{
"name" : "MDVSA-2008:219",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:219"
}, },
{ {
"name": "31473", "name": "31473",
@ -88,9 +78,24 @@
"url": "http://www.vupen.com/english/advisories/2008/2703" "url": "http://www.vupen.com/english/advisories/2008/2703"
}, },
{ {
"name" : "1020952", "name": "20080929 [oCERT-2008-013] MPlayer Real demuxer heap overflow",
"refsource" : "SECTRACK", "refsource": "BUGTRAQ",
"url" : "http://www.securitytracker.com/id?1020952" "url": "http://www.securityfocus.com/archive/1/496806/100/0/threaded"
},
{
"name": "http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675",
"refsource": "CONFIRM",
"url": "http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675"
},
{
"name": "MDVSA-2008:219",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:219"
},
{
"name": "DSA-1644",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1644"
}, },
{ {
"name": "32153", "name": "32153",
@ -98,14 +103,9 @@
"url": "http://secunia.com/advisories/32153" "url": "http://secunia.com/advisories/32153"
}, },
{ {
"name" : "32045", "name": "1020952",
"refsource" : "SECUNIA", "refsource": "SECTRACK",
"url" : "http://secunia.com/advisories/32045" "url": "http://www.securitytracker.com/id?1020952"
},
{
"name" : "4326",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4326"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2008-3991", "ID": "CVE-2008-3991",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "oracle-database-olap-dos2(45894)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45894"
},
{ {
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2008-100299.html"
}, },
{
"name" : "ADV-2008-2825",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2825"
},
{
"name" : "1021050",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021050"
},
{ {
"name": "32291", "name": "32291",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32291" "url": "http://secunia.com/advisories/32291"
}, },
{ {
"name" : "oracle-database-olap-dos2(45894)", "name": "1021050",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45894" "url": "http://www.securitytracker.com/id?1021050"
},
{
"name": "ADV-2008-2825",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2825"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-4256", "ID": "CVE-2008-4256",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-473.htm", "name": "ADV-2008-3382",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-473.htm" "url": "http://www.vupen.com/english/advisories/2008/3382"
},
{
"name" : "MS08-070",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070"
},
{
"name" : "TA08-344A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-344A.html"
}, },
{ {
"name": "32614", "name": "32614",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32614" "url": "http://www.securityfocus.com/bid/32614"
}, },
{
"name": "1021369",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021369"
},
{
"name": "MS08-070",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-070"
},
{ {
"name": "oval:org.mitre.oval:def:5651", "name": "oval:org.mitre.oval:def:5651",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5651" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5651"
}, },
{ {
"name" : "ADV-2008-3382", "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-473.htm",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2008/3382" "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-473.htm"
}, },
{ {
"name" : "1021369", "name": "TA08-344A",
"refsource" : "SECTRACK", "refsource": "CERT",
"url" : "http://www.securitytracker.com/id?1021369" "url": "http://www.us-cert.gov/cas/techalerts/TA08-344A.html"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "5426",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5426"
},
{
"name" : "28735",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28735"
},
{ {
"name": "4547", "name": "4547",
"refsource": "SREASON", "refsource": "SREASON",
@ -71,6 +61,16 @@
"name": "rsmaxsoft-popupimg-sql-injection(41798)", "name": "rsmaxsoft-popupimg-sql-injection(41798)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41798" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41798"
},
{
"name": "28735",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28735"
},
{
"name": "5426",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5426"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://e-rdc.org/v1/news.php?readmore=102",
"refsource": "MISC",
"url": "http://e-rdc.org/v1/news.php?readmore=102"
},
{ {
"name": "20080716 [ECHO_ADV_100$2008] Comdev Web Blogger <= 4.1.3 (arcmonth) Sql Injection Vulnerability", "name": "20080716 [ECHO_ADV_100$2008] Comdev Web Blogger <= 4.1.3 (arcmonth) Sql Injection Vulnerability",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -62,16 +67,6 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6079" "url": "https://www.exploit-db.com/exploits/6079"
}, },
{
"name" : "http://e-rdc.org/v1/news.php?readmore=102",
"refsource" : "MISC",
"url" : "http://e-rdc.org/v1/news.php?readmore=102"
},
{
"name" : "30237",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30237"
},
{ {
"name": "31100", "name": "31100",
"refsource": "SECUNIA", "refsource": "SECUNIA",
@ -81,6 +76,11 @@
"name": "comdevwebblogger-arcmonth-sql-injection(43776)", "name": "comdevwebblogger-arcmonth-sql-injection(43776)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43776" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43776"
},
{
"name": "30237",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30237"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "7402", "name": "easymail-activex-bo(47207)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/7402" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47207"
}, },
{ {
"name": "32722", "name": "32722",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/32722" "url": "http://www.securityfocus.com/bid/32722"
}, },
{ {
"name" : "easymail-activex-bo(47207)", "name": "7402",
"refsource" : "XF", "refsource": "EXPLOIT-DB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47207" "url": "https://www.exploit-db.com/exploits/7402"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2054", "ID": "CVE-2013-2054",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html" "url": "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html"
}, },
{
"name" : "http://download.strongswan.org/security/CVE-2013-2054/CVE-2013-2054.txt",
"refsource" : "CONFIRM",
"url" : "http://download.strongswan.org/security/CVE-2013-2054/CVE-2013-2054.txt"
},
{ {
"name": "59837", "name": "59837",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/59837" "url": "http://www.securityfocus.com/bid/59837"
},
{
"name": "http://download.strongswan.org/security/CVE-2013-2054/CVE-2013-2054.txt",
"refsource": "CONFIRM",
"url": "http://download.strongswan.org/security/CVE-2013-2054/CVE-2013-2054.txt"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2207", "ID": "CVE-2013-2207",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,41 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=15755",
"refsource": "CONFIRM",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=15755"
},
{
"name": "55113",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55113"
},
{
"name": "SUSE-SU-2015:1424",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html"
},
{ {
"name": "[libc-alpha] 20130812 The GNU C Library version 2.18 is now available", "name": "[libc-alpha] 20130812 The GNU C Library version 2.18 is now available",
"refsource": "MLIST", "refsource": "MLIST",
"url": "https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html" "url": "https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html"
}, },
{
"name": "SUSE-SU-2016:0470",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"
},
{
"name": "USN-2985-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2985-2"
},
{ {
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=976408", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=976408",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=976408" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=976408"
}, },
{
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=15755",
"refsource" : "CONFIRM",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=15755"
},
{ {
"name": "GLSA-201503-04", "name": "GLSA-201503-04",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -77,30 +97,10 @@
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:283" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"
}, },
{
"name" : "SUSE-SU-2015:1424",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html"
},
{
"name" : "SUSE-SU-2016:0470",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"
},
{ {
"name": "USN-2985-1", "name": "USN-2985-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2985-1" "url": "http://www.ubuntu.com/usn/USN-2985-1"
},
{
"name" : "USN-2985-2",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2985-2"
},
{
"name" : "55113",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/55113"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-2955", "ID": "CVE-2013-2955",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2013-6222", "ID": "CVE-2013-6222",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBMU03079", "name": "hp-service-manager-cve20136222-xss(95447)",
"refsource" : "HP", "refsource": "XF",
"url" : "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95447"
},
{
"name" : "SSRT101654",
"refsource" : "HP",
"url" : "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
},
{
"name" : "69380",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/69380"
}, },
{ {
"name": "1030756", "name": "1030756",
@ -77,15 +67,25 @@
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60028" "url": "http://secunia.com/advisories/60028"
}, },
{
"name": "69380",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69380"
},
{ {
"name": "60714", "name": "60714",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60714" "url": "http://secunia.com/advisories/60714"
}, },
{ {
"name" : "hp-service-manager-cve20136222-xss(95447)", "name": "SSRT101654",
"refsource" : "XF", "refsource": "HP",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/95447" "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
},
{
"name": "HPSBMU03079",
"refsource": "HP",
"url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04388127"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.com/files/123699/WordPress-dhtmlxspreadsheet-Cross-Site-Scripting.html", "name": "55396",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://packetstormsecurity.com/files/123699/WordPress-dhtmlxspreadsheet-Cross-Site-Scripting.html" "url": "http://secunia.com/advisories/55396"
}, },
{ {
"name": "98831", "name": "98831",
@ -63,9 +63,9 @@
"url": "http://osvdb.org/98831" "url": "http://osvdb.org/98831"
}, },
{ {
"name" : "55396", "name": "http://packetstormsecurity.com/files/123699/WordPress-dhtmlxspreadsheet-Cross-Site-Scripting.html",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/55396" "url": "http://packetstormsecurity.com/files/123699/WordPress-dhtmlxspreadsheet-Cross-Site-Scripting.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6422", "ID": "CVE-2013-6422",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -62,16 +62,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
}, },
{
"name" : "DSA-2824",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2824"
},
{ {
"name": "HPSBMU03112", "name": "HPSBMU03112",
"refsource": "HP", "refsource": "HP",
"url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322" "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322"
}, },
{
"name": "DSA-2824",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2824"
},
{ {
"name": "USN-2058-1", "name": "USN-2058-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6515", "ID": "CVE-2013-6515",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -77,11 +77,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{ {
"name": "99658", "name": "99658",
"refsource": "BID", "refsource": "BID",
@ -91,6 +86,11 @@
"name": "1038926", "name": "1038926",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038926" "url": "http://www.securitytracker.com/id/1038926"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
} }
] ]
} }

View File

@ -61,21 +61,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20180629 [SECURITY] [DLA 1407-1] mariadb-10.0 security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20171019-0002/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{ {
"name": "DSA-4002", "name": "DSA-4002",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -86,31 +71,16 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4341" "url": "https://www.debian.org/security/2018/dsa-4341"
}, },
{
"name": "https://security.netapp.com/advisory/ntap-20171019-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{ {
"name": "RHSA-2017:3265", "name": "RHSA-2017:3265",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3265" "url": "https://access.redhat.com/errata/RHSA-2017:3265"
}, },
{
"name" : "RHSA-2017:3442",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"name" : "RHSA-2018:0279",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0279"
},
{
"name" : "RHSA-2018:0574",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0574"
},
{
"name" : "RHSA-2018:2439",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2439"
},
{ {
"name": "RHSA-2018:2729", "name": "RHSA-2018:2729",
"refsource": "REDHAT", "refsource": "REDHAT",
@ -121,10 +91,40 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/101375" "url": "http://www.securityfocus.com/bid/101375"
}, },
{
"name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1407-1] mariadb-10.0 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html"
},
{
"name": "RHSA-2018:0574",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0574"
},
{ {
"name": "1039597", "name": "1039597",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039597" "url": "http://www.securitytracker.com/id/1039597"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "RHSA-2018:0279",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0279"
},
{
"name": "RHSA-2018:2439",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2439"
},
{
"name": "RHSA-2017:3442",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3442"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://core.trac.wordpress.org/changeset/41448", "name": "DSA-3997",
"refsource" : "MISC", "refsource": "DEBIAN",
"url" : "https://core.trac.wordpress.org/changeset/41448" "url": "https://www.debian.org/security/2017/dsa-3997"
},
{
"name" : "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/",
"refsource" : "MISC",
"url" : "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/"
}, },
{ {
"name": "https://wpvulndb.com/vulnerabilities/8913", "name": "https://wpvulndb.com/vulnerabilities/8913",
@ -68,9 +63,9 @@
"url": "https://wpvulndb.com/vulnerabilities/8913" "url": "https://wpvulndb.com/vulnerabilities/8913"
}, },
{ {
"name" : "DSA-3997", "name": "https://core.trac.wordpress.org/changeset/41448",
"refsource" : "DEBIAN", "refsource": "MISC",
"url" : "https://www.debian.org/security/2017/dsa-3997" "url": "https://core.trac.wordpress.org/changeset/41448"
}, },
{ {
"name": "100912", "name": "100912",
@ -81,6 +76,11 @@
"name": "1039553", "name": "1039553",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039553" "url": "http://www.securitytracker.com/id/1039553"
},
{
"name": "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/",
"refsource": "MISC",
"url": "https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/"
} }
] ]
} }

View File

@ -52,20 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html",
"refsource" : "MISC",
"url" : "https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html"
},
{ {
"name": "https://crbug.com/770148", "name": "https://crbug.com/770148",
"refsource": "MISC", "refsource": "MISC",
"url": "https://crbug.com/770148" "url": "https://crbug.com/770148"
}, },
{ {
"name" : "DSA-4064", "name": "RHSA-2017:3401",
"refsource" : "DEBIAN", "refsource": "REDHAT",
"url" : "https://www.debian.org/security/2017/dsa-4064" "url": "https://access.redhat.com/errata/RHSA-2017:3401"
}, },
{ {
"name": "GLSA-201801-03", "name": "GLSA-201801-03",
@ -73,9 +68,14 @@
"url": "https://security.gentoo.org/glsa/201801-03" "url": "https://security.gentoo.org/glsa/201801-03"
}, },
{ {
"name" : "RHSA-2017:3401", "name": "https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html",
"refsource" : "REDHAT", "refsource": "MISC",
"url" : "https://access.redhat.com/errata/RHSA-2017:3401" "url": "https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html"
},
{
"name": "DSA-4064",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4064"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/541655/100/0/threaded"
},
{ {
"name": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt", "name": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt" "url": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt"
},
{
"name": "20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/541655/100/0/threaded"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9533",
"refsource" : "MISC",
"url" : "https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9533"
},
{ {
"name": "http://www.irfanview.com/plugins.htm", "name": "http://www.irfanview.com/plugins.htm",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.irfanview.com/plugins.htm" "url": "http://www.irfanview.com/plugins.htm"
},
{
"name": "https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9533",
"refsource": "MISC",
"url": "https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9533"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.hyuki.com/yukiwiki/",
"refsource" : "MISC",
"url" : "http://www.hyuki.com/yukiwiki/"
},
{ {
"name": "JVN#36343375", "name": "JVN#36343375",
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN36343375/index.html" "url": "http://jvn.jp/en/jp/JVN36343375/index.html"
},
{
"name": "http://www.hyuki.com/yukiwiki/",
"refsource": "MISC",
"url": "http://www.hyuki.com/yukiwiki/"
} }
] ]
} }

View File

@ -58,15 +58,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0910" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0910"
}, },
{
"name" : "103280",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/103280"
},
{ {
"name": "1040513", "name": "1040513",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040513" "url": "http://www.securitytracker.com/id/1040513"
},
{
"name": "103280",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103280"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-09-14T14:17:47.506460", "DATE_ASSIGNED": "2018-09-14T14:17:47.506460",
"DATE_REQUESTED": "2018-08-30T11:34:18", "DATE_REQUESTED": "2018-08-30T11:34:18",
"ID": "CVE-2018-1000802", "ID": "CVE-2018-1000802",
@ -14,18 +14,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Python (CPython)", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "2.7" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Python Software Foundation" "vendor_name": "n/a"
} }
] ]
} }
@ -47,7 +47,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')" "value": "n/a"
} }
] ]
} }
@ -56,9 +56,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[debian-lts-announce] 20180925 [SECURITY] [DLA 1519-1] python2.7 security update", "name": "DSA-4306",
"refsource" : "MLIST", "refsource": "DEBIAN",
"url" : "https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html" "url": "https://www.debian.org/security/2018/dsa-4306"
}, },
{ {
"name": "[debian-lts-announce] 20180926 [SECURITY] [DLA 1520-1] python3.4 security update", "name": "[debian-lts-announce] 20180926 [SECURITY] [DLA 1520-1] python3.4 security update",
@ -66,19 +66,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html" "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html"
}, },
{ {
"name" : "https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig", "name": "USN-3817-2",
"refsource" : "MISC", "refsource": "UBUNTU",
"url" : "https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig" "url": "https://usn.ubuntu.com/3817-2/"
},
{
"name" : "https://bugs.python.org/issue34540",
"refsource" : "CONFIRM",
"url" : "https://bugs.python.org/issue34540"
},
{
"name" : "https://github.com/python/cpython/pull/8985",
"refsource" : "CONFIRM",
"url" : "https://github.com/python/cpython/pull/8985"
}, },
{ {
"name": "https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace", "name": "https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace",
@ -86,9 +76,14 @@
"url": "https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace" "url": "https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace"
}, },
{ {
"name" : "DSA-4306", "name": "https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig",
"refsource" : "DEBIAN", "refsource": "MISC",
"url" : "https://www.debian.org/security/2018/dsa-4306" "url": "https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig"
},
{
"name": "https://github.com/python/cpython/pull/8985",
"refsource": "CONFIRM",
"url": "https://github.com/python/cpython/pull/8985"
}, },
{ {
"name": "USN-3817-1", "name": "USN-3817-1",
@ -96,9 +91,14 @@
"url": "https://usn.ubuntu.com/3817-1/" "url": "https://usn.ubuntu.com/3817-1/"
}, },
{ {
"name" : "USN-3817-2", "name": "https://bugs.python.org/issue34540",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "https://usn.ubuntu.com/3817-2/" "url": "https://bugs.python.org/issue34540"
},
{
"name": "[debian-lts-announce] 20180925 [SECURITY] [DLA 1519-1] python2.7 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html"
} }
] ]
} }

View File

@ -52,26 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20181003 [SECURITY] [DLA 1530-1] imagemagick security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/10/msg00002.html"
},
{ {
"name": "https://github.com/ImageMagick/ImageMagick/commit/16916c8979c32765c542e216b31cee2671b7afe7", "name": "https://github.com/ImageMagick/ImageMagick/commit/16916c8979c32765c542e216b31cee2671b7afe7",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/ImageMagick/ImageMagick/commit/16916c8979c32765c542e216b31cee2671b7afe7" "url": "https://github.com/ImageMagick/ImageMagick/commit/16916c8979c32765c542e216b31cee2671b7afe7"
}, },
{
"name": "[debian-lts-announce] 20181003 [SECURITY] [DLA 1530-1] imagemagick security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00002.html"
},
{ {
"name": "https://github.com/ImageMagick/ImageMagick/commit/afa878a689870c28b6994ecf3bb8dbfb2b76d135", "name": "https://github.com/ImageMagick/ImageMagick/commit/afa878a689870c28b6994ecf3bb8dbfb2b76d135",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/ImageMagick/ImageMagick/commit/afa878a689870c28b6994ecf3bb8dbfb2b76d135" "url": "https://github.com/ImageMagick/ImageMagick/commit/afa878a689870c28b6994ecf3bb8dbfb2b76d135"
}, },
{
"name" : "https://github.com/ImageMagick/ImageMagick/issues/1269",
"refsource" : "MISC",
"url" : "https://github.com/ImageMagick/ImageMagick/issues/1269"
},
{ {
"name": "DSA-4316", "name": "DSA-4316",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -81,6 +76,11 @@
"name": "USN-3785-1", "name": "USN-3785-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3785-1/" "url": "https://usn.ubuntu.com/3785-1/"
},
{
"name": "https://github.com/ImageMagick/ImageMagick/issues/1269",
"refsource": "MISC",
"url": "https://github.com/ImageMagick/ImageMagick/issues/1269"
} }
] ]
} }