"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:08:57 +00:00
parent 84a136c8c8
commit 65a2223f19
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
57 changed files with 3833 additions and 3833 deletions

View File

@ -53,30 +53,30 @@
"references": {
"reference_data": [
{
"name" : "DSA-458",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2004/dsa-458"
},
{
"name" : "GLSA-200409-03",
"refsource" : "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200409-03.xml"
"name": "9836",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9836"
},
{
"name": "MDKSA-2004:019",
"refsource": "MANDRAKE",
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:019"
},
{
"name" : "9836",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/9836"
},
{
"name": "4172",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4172"
},
{
"name": "GLSA-200409-03",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200409-03.xml"
},
{
"name": "DSA-458",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-458"
},
{
"name": "python-getaddrinfo-bo(15409)",
"refsource": "XF",

View File

@ -57,6 +57,11 @@
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=5767"
},
{
"name": "courier-codeset-converter-bo(15434)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15434"
},
{
"name": "11087",
"refsource": "SECUNIA",
@ -66,11 +71,6 @@
"name": "9845",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9845"
},
{
"name" : "courier-codeset-converter-bo(15434)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15434"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20040212 Symlink vulnerabilities in mailmgr",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107665013714517&w=2"
"name": "9654",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/9654"
},
{
"name": "mailmgr-insecure-temp-directory(15203)",
@ -63,9 +63,9 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15203"
},
{
"name" : "9654",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/9654"
"name": "20040212 Symlink vulnerabilities in mailmgr",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107665013714517&w=2"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "http://rpmfind.net/linux/RPM/suse/9.3/i386/suse/i586/gnome-vfs-1.0.5-816.2.i586.html",
"refsource" : "CONFIRM",
"url" : "http://rpmfind.net/linux/RPM/suse/9.3/i386/suse/i586/gnome-vfs-1.0.5-816.2.i586.html"
},
{
"name": "FLSA:1944",
"refsource": "FEDORA",
"url": "https://bugzilla.fedora.us/show_bug.cgi?id=1944"
},
{
"name" : "RHSA-2004:373",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-373.html"
},
{
"name": "oval:org.mitre.oval:def:9854",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9854"
},
{
"name": "RHSA-2004:373",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-373.html"
},
{
"name": "gnome-vfs-extfs-gain-access(16897)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16897"
},
{
"name": "http://rpmfind.net/linux/RPM/suse/9.3/i386/suse/i586/gnome-vfs-1.0.5-816.2.i586.html",
"refsource": "CONFIRM",
"url": "http://rpmfind.net/linux/RPM/suse/9.3/i386/suse/i586/gnome-vfs-1.0.5-816.2.i586.html"
}
]
}

View File

@ -52,6 +52,51 @@
},
"references": {
"reference_data": [
{
"name": "SUSE-SA:2004:032",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2004_32_apache2.html"
},
{
"name": "RHSA-2004:463",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-463.html"
},
{
"name": "apache-env-configuration-bo(17384)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17384"
},
{
"name": "ADV-2009-1233",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1233"
},
{
"name": "12540",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/12540"
},
{
"name": "oval:org.mitre.oval:def:11561",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11561"
},
{
"name": "34920",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34920"
},
{
"name": "2004-0047",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2004/0047/"
},
{
"name": "MDKSA-2004:096",
"refsource": "MANDRAKE",
"url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096"
},
{
"name": "http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147",
"refsource": "MISC",
@ -62,60 +107,15 @@
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml"
},
{
"name" : "MDKSA-2004:096",
"refsource" : "MANDRAKE",
"url" : "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096"
},
{
"name" : "RHSA-2004:463",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2004-463.html"
},
{
"name" : "SUSE-SA:2004:032",
"refsource" : "SUSE",
"url" : "http://www.novell.com/linux/security/advisories/2004_32_apache2.html"
},
{
"name" : "2004-0047",
"refsource" : "TRUSTIX",
"url" : "http://www.trustix.org/errata/2004/0047/"
},
{
"name": "VU#481998",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/481998"
},
{
"name" : "oval:org.mitre.oval:def:11561",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11561"
},
{
"name": "1011303",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1011303"
},
{
"name" : "12540",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/12540"
},
{
"name" : "34920",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34920"
},
{
"name" : "ADV-2009-1233",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/1233"
},
{
"name" : "apache-env-configuration-bo(17384)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17384"
}
]
}

View File

@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/12147"
},
{
"name" : "1012756",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1012756"
"name": "htmlheadline-symlink(18737)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18737"
},
{
"name": "13715",
@ -73,9 +73,9 @@
"url": "http://secunia.com/advisories/13715"
},
{
"name" : "htmlheadline-symlink(18737)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18737"
"name": "1012756",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1012756"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110295433323795&w=2"
},
{
"name" : "http://www.gulftech.org/?node=research&article_id=00053-120104",
"refsource" : "MISC",
"url" : "http://www.gulftech.org/?node=research&article_id=00053-120104"
},
{
"name": "11740",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "sugarcrm-record-sql-injection(18325)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18325"
},
{
"name": "http://www.gulftech.org/?node=research&article_id=00053-120104",
"refsource": "MISC",
"url": "http://www.gulftech.org/?node=research&article_id=00053-120104"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://tigger.uic.edu/~jlongs2/holes/jcabc2ps.txt",
"refsource" : "MISC",
"url" : "http://tigger.uic.edu/~jlongs2/holes/jcabc2ps.txt"
},
{
"name": "jcabc2ps-switchvoice-bo(18563)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18563"
},
{
"name": "http://tigger.uic.edu/~jlongs2/holes/jcabc2ps.txt",
"refsource": "MISC",
"url": "http://tigger.uic.edu/~jlongs2/holes/jcabc2ps.txt"
}
]
}

View File

@ -53,9 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20041223 Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=110382854111833&w=2"
"name": "oval:org.mitre.oval:def:712",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712"
},
{
"name": "oval:org.mitre.oval:def:2580",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580"
},
{
"name": "VU#697136",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/697136"
},
{
"name": "MS05-002",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002"
},
{
"name": "http://www.xfocus.net/flashsky/icoExp/",
@ -63,9 +78,19 @@
"url": "http://www.xfocus.net/flashsky/icoExp/"
},
{
"name" : "MS05-002",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002"
"name": "oval:org.mitre.oval:def:3216",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216"
},
{
"name": "20041223 Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=110382854111833&w=2"
},
{
"name": "win-ani-ratenumber-dos(18667)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667"
},
{
"name": "TA05-012A",
@ -77,40 +102,15 @@
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/177584"
},
{
"name" : "VU#697136",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/697136"
},
{
"name": "oval:org.mitre.oval:def:1304",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1304"
},
{
"name" : "oval:org.mitre.oval:def:2580",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2580"
},
{
"name" : "oval:org.mitre.oval:def:3216",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3216"
},
{
"name": "oval:org.mitre.oval:def:3957",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3957"
},
{
"name" : "oval:org.mitre.oval:def:712",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A712"
},
{
"name" : "win-ani-ratenumber-dos(18667)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18667"
}
]
}

View File

@ -52,35 +52,35 @@
},
"references": {
"reference_data": [
{
"name": "1019993",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019993"
},
{
"name": "236944",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236944-1"
},
{
"name": "sunray-kiosk-privilege-escalation(42262)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42262"
},
{
"name": "29092",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29092"
},
{
"name" : "ADV-2008-1454",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1454/references"
},
{
"name" : "1019993",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019993"
},
{
"name": "30130",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30130"
},
{
"name" : "sunray-kiosk-privilege-escalation(42262)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42262"
"name": "ADV-2008-1454",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1454/references"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-2367",
"STATE": "PUBLIC"
},
@ -57,6 +57,26 @@
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451998"
},
{
"name": "33540",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33540"
},
{
"name": "ADV-2009-0145",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0145"
},
{
"name": "33288",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33288"
},
{
"name": "1021608",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021608"
},
{
"name": "RHSA-2009:0006",
"refsource": "REDHAT",
@ -67,26 +87,6 @@
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-0007.html"
},
{
"name" : "33288",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/33288"
},
{
"name" : "ADV-2009-0145",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0145"
},
{
"name" : "1021608",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1021608"
},
{
"name" : "33540",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33540"
},
{
"name": "redhat-cs-configfile-info-disclosure(48021)",
"refsource": "XF",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2008-2429",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://secunia.com/secunia_research/2008-28/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2008-28/advisory/"
},
{
"name": "30710",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30710"
},
{
"name": "http://secunia.com/secunia_research/2008-28/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2008-28/advisory/"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=599894",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=599894"
},
{
"name": "ADV-2008-1685",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1685/references"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=599894",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=599894"
},
{
"name": "30292",
"refsource": "SECUNIA",

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "5848",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5848"
},
{
"name": "29790",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29790"
},
{
"name": "5848",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5848"
},
{
"name": "traindepot-module-file-include(43159)",
"refsource": "XF",

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "5996",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5996"
"name": "phportal-gunaysoft-file-include(43569)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43569"
},
{
"name": "30064",
@ -68,9 +68,9 @@
"url": "http://securityreason.com/securityalert/3972"
},
{
"name" : "phportal-gunaysoft-file-include(43569)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43569"
"name": "5996",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5996"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html"
},
{
"name": "zypper-zypprefreshpatches-dos(43922)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43922"
},
{
"name": "30293",
"refsource": "BID",
@ -66,11 +71,6 @@
"name": "31167",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31167"
},
{
"name" : "zypper-zypprefreshpatches-dos(43922)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43922"
}
]
}

View File

@ -53,15 +53,20 @@
"references": {
"reference_data": [
{
"name" : "6098",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6098"
"name": "aproxcmsengine-index-sql-injection(43905)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43905"
},
{
"name": "http://www.aprox.de/index.php?id=001",
"refsource": "MISC",
"url": "http://www.aprox.de/index.php?id=001"
},
{
"name": "6098",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6098"
},
{
"name": "30295",
"refsource": "BID",
@ -71,11 +76,6 @@
"name": "4032",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4032"
},
{
"name" : "aproxcmsengine-index-sql-injection(43905)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43905"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.phpfreechat.net/changelog/1.2",
"refsource" : "CONFIRM",
"url" : "http://www.phpfreechat.net/changelog/1.2"
},
{
"name" : "30462",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30462"
},
{
"name": "31283",
"refsource": "SECUNIA",
@ -71,6 +61,16 @@
"name": "phpfreechat-nickid-weak-security(44116)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44116"
},
{
"name": "30462",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30462"
},
{
"name": "http://www.phpfreechat.net/changelog/1.2",
"refsource": "CONFIRM",
"url": "http://www.phpfreechat.net/changelog/1.2"
}
]
}

View File

@ -52,16 +52,21 @@
},
"references": {
"reference_data": [
{
"name" : "6277",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6277"
},
{
"name": "30757",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30757"
},
{
"name": "apb-viewgroup-sql-injection(44548)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44548"
},
{
"name": "6277",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6277"
},
{
"name": "31544",
"refsource": "SECUNIA",
@ -71,11 +76,6 @@
"name": "4174",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4174"
},
{
"name" : "apb-viewgroup-sql-injection(44548)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44548"
}
]
}

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "6795",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6795"
},
{
"name": "31834",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31834"
},
{
"name" : "32347",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32347"
"name": "makale-xoops-makale-sql-injection(45991)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45991"
},
{
"name": "6795",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6795"
},
{
"name": "4459",
@ -73,9 +73,9 @@
"url": "http://securityreason.com/securityalert/4459"
},
{
"name" : "makale-xoops-makale-sql-injection(45991)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45991"
"name": "32347",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32347"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "6702",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6702"
},
{
"name": "31646",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31646"
},
{
"name": "6702",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6702"
},
{
"name": "32160",
"refsource": "SECUNIA",

View File

@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "13201",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/13201"
},
{
"name": "7159",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7159"
},
{
"name" : "32360",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32360"
},
{
"name" : "13201",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/13201"
"name": "pms-multiple-file-include(46718)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46718"
},
{
"name": "ADV-2008-3214",
@ -73,9 +73,9 @@
"url": "http://www.vupen.com/english/advisories/2008/3214"
},
{
"name" : "pms-multiple-file-include(46718)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46718"
"name": "32360",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32360"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "7160",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7160"
},
{
"name" : "32362",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32362"
},
{
"name": "32788",
"refsource": "SECUNIA",
@ -72,10 +62,20 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3215"
},
{
"name": "32362",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32362"
},
{
"name": "mytopix-index-sql-injection(46741)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46741"
},
{
"name": "7160",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7160"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2059",
"STATE": "PUBLIC"
},
@ -52,60 +52,60 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130509 RE: [Openstack] [OSSA 2013-011] Keystone tokens not immediately invalidated when user is deleted (CVE-2013-2059)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/05/09/4"
},
{
"name" : "[oss-security] 20130509 [OSSA 2013-011] Keystone tokens not immediately invalidated when user is deleted (CVE-2013-2059)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/05/09/3"
},
{
"name" : "https://bugs.launchpad.net/keystone/+bug/1166670",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/keystone/+bug/1166670"
},
{
"name" : "FEDORA-2013-8023",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106220.html"
},
{
"name" : "FEDORA-2013-8048",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105916.html"
},
{
"name": "openSUSE-SU-2013:0949",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00085.html"
},
{
"name" : "59787",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/59787"
},
{
"name": "93134",
"refsource": "OSVDB",
"url": "http://osvdb.org/93134"
},
{
"name": "FEDORA-2013-8048",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105916.html"
},
{
"name": "53326",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53326"
},
{
"name": "[oss-security] 20130509 [OSSA 2013-011] Keystone tokens not immediately invalidated when user is deleted (CVE-2013-2059)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/05/09/3"
},
{
"name": "keystone-cve20132059-security-bypass(84135)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84135"
},
{
"name": "FEDORA-2013-8023",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106220.html"
},
{
"name": "https://bugs.launchpad.net/keystone/+bug/1166670",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/keystone/+bug/1166670"
},
{
"name": "53339",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53339"
},
{
"name" : "keystone-cve20132059-security-bypass(84135)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/84135"
"name": "59787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59787"
},
{
"name": "[oss-security] 20130509 RE: [Openstack] [OSSA 2013-011] Keystone tokens not immediately invalidated when user is deleted (CVE-2013-2059)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/05/09/4"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-2469",
"STATE": "PUBLIC"
},
@ -53,164 +53,164 @@
"references": {
"reference_data": [
{
"name" : "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/64055b403176",
"refsource" : "MISC",
"url" : "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/64055b403176"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
},
{
"name" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=975120",
"refsource" : "CONFIRM",
"url" : "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=975120"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
},
{
"name" : "http://advisories.mageia.org/MGASA-2013-0185.html",
"refsource" : "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2013-0185.html"
},
{
"name" : "GLSA-201406-32",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name" : "HPSBUX02922",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "SSRT101305",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name" : "HPSBUX02907",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
"name": "RHSA-2013:1060",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
},
{
"name": "HPSBUX02908",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137545592101387&w=2"
},
{
"name" : "MDVSA-2013:183",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:183"
},
{
"name" : "RHSA-2013:0963",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
},
{
"name" : "RHSA-2013:1081",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
},
{
"name" : "RHSA-2013:1060",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
},
{
"name" : "RHSA-2013:1455",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name" : "RHSA-2013:1456",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name" : "RHSA-2013:1059",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
},
{
"name": "RHSA-2014:0414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2014:0414"
},
{
"name" : "SUSE-SU-2013:1305",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
},
{
"name" : "SUSE-SU-2013:1293",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
},
{
"name" : "SUSE-SU-2013:1255",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
},
{
"name" : "SUSE-SU-2013:1256",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
},
{
"name" : "SUSE-SU-2013:1257",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
},
{
"name" : "SUSE-SU-2013:1263",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
},
{
"name" : "SUSE-SU-2013:1264",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"
},
{
"name" : "TA13-169A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-169A"
},
{
"name" : "60658",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/60658"
},
{
"name" : "oval:org.mitre.oval:def:17042",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17042"
},
{
"name" : "oval:org.mitre.oval:def:19314",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19314"
},
{
"name" : "oval:org.mitre.oval:def:19552",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19552"
"name": "GLSA-201406-32",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
},
{
"name": "oval:org.mitre.oval:def:19713",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19713"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html"
},
{
"name": "SUSE-SU-2013:1264",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html"
},
{
"name": "SUSE-SU-2013:1257",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
},
{
"name": "HPSBUX02907",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137545505800971&w=2"
},
{
"name": "SUSE-SU-2013:1256",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
},
{
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=975120",
"refsource": "CONFIRM",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=975120"
},
{
"name": "54154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54154"
},
{
"name": "RHSA-2013:1455",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html"
},
{
"name": "SSRT101305",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "HPSBUX02922",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880"
},
{
"name": "60658",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/60658"
},
{
"name": "SUSE-SU-2013:1263",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
},
{
"name": "RHSA-2013:1059",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
},
{
"name": "oval:org.mitre.oval:def:19552",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19552"
},
{
"name": "oval:org.mitre.oval:def:19314",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19314"
},
{
"name": "SUSE-SU-2013:1293",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
},
{
"name": "RHSA-2013:1081",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
},
{
"name": "TA13-169A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-169A"
},
{
"name": "http://advisories.mageia.org/MGASA-2013-0185.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2013-0185.html"
},
{
"name": "RHSA-2013:0963",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0963.html"
},
{
"name": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/64055b403176",
"refsource": "MISC",
"url": "http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/64055b403176"
},
{
"name": "SUSE-SU-2013:1255",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
},
{
"name": "RHSA-2013:1456",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html"
},
{
"name": "MDVSA-2013:183",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:183"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21642336"
},
{
"name": "SUSE-SU-2013:1305",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
},
{
"name": "oval:org.mitre.oval:def:17042",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17042"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20130418 CVE-2013-2504 : Matrix42 Service Desk XSS",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-04/0196.html"
},
{
"name": "20130418 Fwd: CVE-2013-2504 : Matrix42 Service Desk XSS",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Apr/153"
},
{
"name": "20130418 CVE-2013-2504 : Matrix42 Service Desk XSS",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0196.html"
}
]
}

View File

@ -53,25 +53,25 @@
},
"references": {
"reference_data": [
{
"name": "1039990",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039990"
},
{
"name": "43713",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43713/"
},
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11914",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11914"
},
{
"name": "102088",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102088"
},
{
"name" : "1039990",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039990"
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11914",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11914"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-14659",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -54,9 +54,9 @@
"references": {
"reference_data": [
{
"name" : "[dovecot-news] 20180228 v2.2.34 released",
"refsource" : "MLIST",
"url" : "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
"name": "USN-3587-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3587-1/"
},
{
"name": "[oss-security] 20180301 Dovecot Security Advisory: CVE-2017-15130 TLS SNI config lookups are inefficient and can be used for DoS",
@ -68,25 +68,25 @@
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00036.html"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1532356",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1532356"
},
{
"name": "DSA-4130",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4130"
},
{
"name" : "USN-3587-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3587-1/"
},
{
"name": "USN-3587-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3587-2/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1532356",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532356"
},
{
"name": "[dovecot-news] 20180228 v2.2.34 released",
"refsource": "MLIST",
"url": "https://www.dovecot.org/list/dovecot-news/2018-February/000370.html"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/10/20/4"
},
{
"name" : "DSA-4049",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2017/dsa-4049"
},
{
"name": "101518",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101518"
},
{
"name": "DSA-4049",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4049"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-15563",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/541655/100/0/threaded"
},
{
"name": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt",
"refsource": "MISC",
"url": "https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt"
},
{
"name": "20180110 Multiple vulnerabilities in TP-Link products(CVE-2017-15613 to CVE-2017-15637)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/541655/100/0/threaded"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://seclists.org/fulldisclosure/2017/Mar/23",
"refsource" : "MISC",
"url" : "http://seclists.org/fulldisclosure/2017/Mar/23"
},
{
"name": "https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead",
"refsource": "MISC",
"url": "https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#pre-auth-info-leak-goahead"
},
{
"name": "http://seclists.org/fulldisclosure/2017/Mar/23",
"refsource": "MISC",
"url": "http://seclists.org/fulldisclosure/2017/Mar/23"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@microfocus.com",
"ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2017-09-20T00:00:00",
"ID": "CVE-2017-9282",
"STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-12-19T20:52:45.258149",
"DATE_REQUESTED": "2018-11-12T15:52:55",
"ID": "CVE-2018-1000872",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "PyKMIP",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "All versions before 0.8.0"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "OpenKMIP"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE 399: Resource Management Errors (similar issue to CVE-2015-5262)"
"value": "n/a"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "MISC",
"url": "https://github.com/pkp/pkp-lib/issues/3785"
},
{
"name": "https://forum.pkp.sfu.ca/t/xss-vulnerability-alert/45938",
"refsource": "CONFIRM",
"url": "https://forum.pkp.sfu.ca/t/xss-vulnerability-alert/45938"
},
{
"name": "https://metamorfosec.com/Files/Advisories/METS-2018-001-A_XSS_Vulnerability_in_OJS_3.0.0_to_3.1.1-1.txt",
"refsource": "MISC",
@ -66,11 +71,6 @@
"name": "https://forum.pkp.sfu.ca/t/ojs-3-1-1-2-and-omp-3-1-1-3-released/45937",
"refsource": "CONFIRM",
"url": "https://forum.pkp.sfu.ca/t/ojs-3-1-1-2-and-omp-3-1-1-3-released/45937"
},
{
"name" : "https://forum.pkp.sfu.ca/t/xss-vulnerability-alert/45938",
"refsource" : "CONFIRM",
"url" : "https://forum.pkp.sfu.ca/t/xss-vulnerability-alert/45938"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/radare/radare2/commit/90b71c017a7fa9732fe45fd21b245ee051b1f548",
"refsource" : "MISC",
"url" : "https://github.com/radare/radare2/commit/90b71c017a7fa9732fe45fd21b245ee051b1f548"
},
{
"name": "https://github.com/radare/radare2/issues/10293",
"refsource": "MISC",
"url": "https://github.com/radare/radare2/issues/10293"
},
{
"name": "https://github.com/radare/radare2/commit/90b71c017a7fa9732fe45fd21b245ee051b1f548",
"refsource": "MISC",
"url": "https://github.com/radare/radare2/commit/90b71c017a7fa9732fe45fd21b245ee051b1f548"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20181003 [SECURITY] [DLA 1530-1] imagemagick security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/10/msg00002.html"
},
{
"name": "https://github.com/ImageMagick/ImageMagick/commit/cc4ac341f29fa368da6ef01c207deaf8c61f6a2e",
"refsource": "MISC",
@ -67,6 +62,11 @@
"refsource": "MISC",
"url": "https://github.com/ImageMagick/ImageMagick/issues/1162"
},
{
"name": "[debian-lts-announce] 20181003 [SECURITY] [DLA 1530-1] imagemagick security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00002.html"
},
{
"name": "DSA-4316",
"refsource": "DEBIAN",