"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 04:32:02 +00:00
parent 3719f19357
commit 6a4482076f
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
53 changed files with 3206 additions and 3164 deletions

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2004-0463", "ID": "CVE-2004-0463",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20041018 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability", "name": "antivirus-zip-protection-bypass(17761)",
"refsource" : "IDEFENSE", "refsource": "XF",
"url" : "http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761"
}, },
{ {
"name": "VU#968818", "name": "VU#968818",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/11448" "url": "http://www.securityfocus.com/bid/11448"
}, },
{ {
"name" : "antivirus-zip-protection-bypass(17761)", "name": "20041018 Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability",
"refsource" : "XF", "refsource": "IDEFENSE",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17761" "url": "http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"refsource": "FULLDISC", "refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0642.html" "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0642.html"
}, },
{
"name" : "VU#744590",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/744590"
},
{ {
"name": "10734", "name": "10734",
"refsource": "BID", "refsource": "BID",
@ -71,6 +66,11 @@
"name": "boardpower-icq-xss(16698)", "name": "boardpower-icq-xss(16698)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16698" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16698"
},
{
"name": "VU#744590",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/744590"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20040310 DoS in wMCam server 2.1.348", "name": "wmcam-multiple-connections-dos(15431)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://marc.info/?l=bugtraq&m=107894337524376&w=2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15431"
}, },
{ {
"name": "9839", "name": "9839",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/9839" "url": "http://www.securityfocus.com/bid/9839"
}, },
{ {
"name" : "wmcam-multiple-connections-dos(15431)", "name": "20040310 DoS in wMCam server 2.1.348",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15431" "url": "http://marc.info/?l=bugtraq&m=107894337524376&w=2"
} }
] ]
} }

View File

@ -52,25 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20040316 Mambo Open Source Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=107945576020593&w=2"
},
{ {
"name": "9890", "name": "9890",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/9890" "url": "http://www.securityfocus.com/bid/9890"
}, },
{ {
"name" : "4665", "name": "mambo-return-moschangetemplate-xss(15499)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://www.osvdb.org/4665" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15499"
},
{
"name" : "4308",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/4308"
}, },
{ {
"name": "11140", "name": "11140",
@ -78,9 +68,19 @@
"url": "http://secunia.com/advisories/11140" "url": "http://secunia.com/advisories/11140"
}, },
{ {
"name" : "mambo-return-moschangetemplate-xss(15499)", "name": "4308",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/15499" "url": "http://www.osvdb.org/4308"
},
{
"name": "20040316 Mambo Open Source Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=107945576020593&w=2"
},
{
"name": "4665",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4665"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "mojojobs-mojojobs-sql-injection(43933)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43933"
},
{ {
"name": "6110", "name": "6110",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6110" "url": "https://www.exploit-db.com/exploits/6110"
}, },
{
"name" : "ADV-2008-2158",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2158/references"
},
{ {
"name": "31164", "name": "31164",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31164" "url": "http://secunia.com/advisories/31164"
}, },
{
"name": "ADV-2008-2158",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2158/references"
},
{ {
"name": "4029", "name": "4029",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4029" "url": "http://securityreason.com/securityalert/4029"
},
{
"name" : "mojojobs-mojojobs-sql-injection(43933)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43933"
} }
] ]
} }

View File

@ -57,30 +57,30 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607" "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607"
}, },
{
"name": "ibm-db2-adminserver-privilege-escalation(42932)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42932"
},
{ {
"name": "IZ12735", "name": "IZ12735",
"refsource": "AIXAPAR", "refsource": "AIXAPAR",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ12735" "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ12735"
}, },
{
"name" : "29601",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29601"
},
{ {
"name": "ADV-2008-1769", "name": "ADV-2008-1769",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1769" "url": "http://www.vupen.com/english/advisories/2008/1769"
}, },
{
"name": "29601",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29601"
},
{ {
"name": "30558", "name": "30558",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30558" "url": "http://secunia.com/advisories/30558"
},
{
"name" : "ibm-db2-adminserver-privilege-escalation(42932)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/42932"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-4097", "ID": "CVE-2008-4097",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20080909 Re: CVE request: MySQL incomplete fix for CVE-2008-2079",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/09/09/20"
},
{
"name" : "[oss-security] 20080916 Re: CVE request: MySQL incomplete fix for CVE-2008-2079",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/09/16/3"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25"
},
{ {
"name": "MDVSA-2009:094", "name": "MDVSA-2009:094",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094"
}, },
{
"name" : "SUSE-SR:2008:025",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
},
{ {
"name": "USN-671-1", "name": "USN-671-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-671-1" "url": "http://www.ubuntu.com/usn/USN-671-1"
}, },
{
"name" : "32759",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32759"
},
{ {
"name": "32769", "name": "32769",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32769" "url": "http://secunia.com/advisories/32769"
}, },
{
"name": "[oss-security] 20080909 Re: CVE request: MySQL incomplete fix for CVE-2008-2079",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/09/09/20"
},
{ {
"name": "mysql-myisam-symlinks-security-bypass(45648)", "name": "mysql-myisam-symlinks-security-bypass(45648)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45648" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45648"
},
{
"name": "[oss-security] 20080916 Re: CVE request: MySQL incomplete fix for CVE-2008-2079",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/09/16/3"
},
{
"name": "32759",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32759"
},
{
"name": "SUSE-SR:2008:025",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25"
} }
] ]
} }

View File

@ -52,11 +52,31 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1021377",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1021377"
},
{
"name": "ADV-2008-3411",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3411"
},
{
"name": "4705",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4705"
},
{ {
"name": "HPSBUX02393", "name": "HPSBUX02393",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=122893704624601&w=2" "url": "http://marc.info/?l=bugtraq&m=122893704624601&w=2"
}, },
{
"name": "50679",
"refsource": "OSVDB",
"url": "http://osvdb.org/50679"
},
{ {
"name": "SSRT080057", "name": "SSRT080057",
"refsource": "HP", "refsource": "HP",
@ -66,26 +86,6 @@
"name": "32754", "name": "32754",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32754" "url": "http://www.securityfocus.com/bid/32754"
},
{
"name" : "ADV-2008-3411",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3411"
},
{
"name" : "50679",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/50679"
},
{
"name" : "1021377",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1021377"
},
{
"name" : "4705",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4705"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "4455",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4455"
},
{ {
"name": "6759", "name": "6759",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6759" "url": "https://www.exploit-db.com/exploits/6759"
}, },
{
"name" : "31772",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31772"
},
{ {
"name": "32289", "name": "32289",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32289" "url": "http://secunia.com/advisories/32289"
}, },
{ {
"name" : "4455", "name": "31772",
"refsource" : "SREASON", "refsource": "BID",
"url" : "http://securityreason.com/securityalert/4455" "url": "http://www.securityfocus.com/bid/31772"
}, },
{ {
"name": "mystats-hits-sql-injection(45917)", "name": "mystats-hits-sql-injection(45917)",

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-4848", "ID": "CVE-2008-4848",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire", "name": "http://dev.gentoo.org/~rbu/security/debiantemp/cdcontrol",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2008/10/30/2" "url": "http://dev.gentoo.org/~rbu/security/debiantemp/cdcontrol"
},
{
"name" : "http://uvw.ru/report.lenny.txt",
"refsource" : "MISC",
"url" : "http://uvw.ru/report.lenny.txt"
}, },
{ {
"name": "http://bugs.debian.org/496438", "name": "http://bugs.debian.org/496438",
@ -68,24 +63,29 @@
"url": "http://bugs.debian.org/496438" "url": "http://bugs.debian.org/496438"
}, },
{ {
"name" : "http://dev.gentoo.org/~rbu/security/debiantemp/cdcontrol", "name": "cdcontrol-writtercontrol-symlink(44839)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://dev.gentoo.org/~rbu/security/debiantemp/cdcontrol" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44839"
},
{
"name": "[oss-security] 20081030 CVE requests: tempfile issues for aview, mgetty, openoffice, crossfire",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
}, },
{ {
"name": "https://bugs.gentoo.org/show_bug.cgi?id=235770", "name": "https://bugs.gentoo.org/show_bug.cgi?id=235770",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugs.gentoo.org/show_bug.cgi?id=235770" "url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
}, },
{
"name": "http://uvw.ru/report.lenny.txt",
"refsource": "MISC",
"url": "http://uvw.ru/report.lenny.txt"
},
{ {
"name": "30892", "name": "30892",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/30892" "url": "http://www.securityfocus.com/bid/30892"
},
{
"name" : "cdcontrol-writtercontrol-symlink(44839)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44839"
} }
] ]
} }

View File

@ -58,29 +58,29 @@
"url": "http://www.voipshield.com/research-details.php?id=125" "url": "http://www.voipshield.com/research-details.php?id=125"
}, },
{ {
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-363.htm", "name": "avaya-ipsoftphone-h323-dos(45745)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-363.htm" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45745"
}, },
{ {
"name": "31635", "name": "31635",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/31635" "url": "http://www.securityfocus.com/bid/31635"
}, },
{
"name" : "32206",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32206"
},
{ {
"name": "ADV-2008-2775", "name": "ADV-2008-2775",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2775" "url": "http://www.vupen.com/english/advisories/2008/2775"
}, },
{ {
"name" : "avaya-ipsoftphone-h323-dos(45745)", "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-363.htm",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45745" "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-363.htm"
},
{
"name": "32206",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32206"
} }
] ]
} }

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "7248", "name": "familyproject-index-sql-injection(46929)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/7248" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46929"
},
{
"name": "32900",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32900"
}, },
{ {
"name": "32501", "name": "32501",
@ -68,14 +73,9 @@
"url": "http://osvdb.org/50314" "url": "http://osvdb.org/50314"
}, },
{ {
"name" : "32900", "name": "7248",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/32900" "url": "https://www.exploit-db.com/exploits/7248"
},
{
"name" : "familyproject-index-sql-injection(46929)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46929"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "7033",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7033"
},
{ {
"name": "32166", "name": "32166",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32166" "url": "http://www.securityfocus.com/bid/32166"
},
{
"name": "7033",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7033"
} }
] ]
} }

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20081230 Megacubo 5.0.7 (mega://) remote eval() injection exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/499654/100/0/threaded"
},
{
"name" : "7623",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7623"
},
{
"name" : "http://retrogod.altervista.org/9sg_megacubo.html",
"refsource" : "MISC",
"url" : "http://retrogod.altervista.org/9sg_megacubo.html"
},
{ {
"name": "33062", "name": "33062",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/33062" "url": "http://www.securityfocus.com/bid/33062"
}, },
{
"name" : "51106",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/51106"
},
{ {
"name": "33326", "name": "33326",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33326" "url": "http://secunia.com/advisories/33326"
}, },
{
"name": "http://retrogod.altervista.org/9sg_megacubo.html",
"refsource": "MISC",
"url": "http://retrogod.altervista.org/9sg_megacubo.html"
},
{
"name": "20081230 Megacubo 5.0.7 (mega://) remote eval() injection exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499654/100/0/threaded"
},
{ {
"name": "megacubo-mega-command-execution(47697)", "name": "megacubo-mega-command-execution(47697)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47697" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47697"
},
{
"name": "7623",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7623"
},
{
"name": "51106",
"refsource": "OSVDB",
"url": "http://osvdb.org/51106"
} }
] ]
} }

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "42993",
"refsource": "OSVDB",
"url": "http://osvdb.org/42993"
},
{
"name": "42992",
"refsource": "OSVDB",
"url": "http://osvdb.org/42992"
},
{ {
"name": "http://osvdb.org/ref/42/intralearn-21-multiple.txt", "name": "http://osvdb.org/ref/42/intralearn-21-multiple.txt",
"refsource": "MISC", "refsource": "MISC",
@ -61,16 +71,6 @@
"name": "42991", "name": "42991",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/42991" "url": "http://osvdb.org/42991"
},
{
"name" : "42992",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/42992"
},
{
"name" : "42993",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/42993"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/QA_2_11/phpMyAdmin/libraries/File.class.php?r1=11528&r2=11527&pathrev=11528", "name": "38211",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/QA_2_11/phpMyAdmin/libraries/File.class.php?r1=11528&r2=11527&pathrev=11528" "url": "http://secunia.com/advisories/38211"
}, },
{ {
"name": "http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin?view=rev&revision=11528", "name": "http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin?view=rev&revision=11528",
@ -63,39 +63,39 @@
"url": "http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin?view=rev&revision=11528" "url": "http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin?view=rev&revision=11528"
}, },
{ {
"name" : "http://www.phpmyadmin.net/home_page/security/PMASA-2010-2.php", "name": "39503",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.phpmyadmin.net/home_page/security/PMASA-2010-2.php" "url": "http://secunia.com/advisories/39503"
},
{
"name" : "DSA-2034",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2034"
}, },
{ {
"name": "SUSE-SR:2010:001", "name": "SUSE-SR:2010:001",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html"
}, },
{
"name" : "37826",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/37826"
},
{
"name" : "38211",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38211"
},
{
"name" : "39503",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/39503"
},
{ {
"name": "ADV-2010-0910", "name": "ADV-2010-0910",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0910" "url": "http://www.vupen.com/english/advisories/2010/0910"
},
{
"name": "http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/QA_2_11/phpMyAdmin/libraries/File.class.php?r1=11528&r2=11527&pathrev=11528",
"refsource": "CONFIRM",
"url": "http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/QA_2_11/phpMyAdmin/libraries/File.class.php?r1=11528&r2=11527&pathrev=11528"
},
{
"name": "DSA-2034",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2034"
},
{
"name": "http://www.phpmyadmin.net/home_page/security/PMASA-2010-2.php",
"refsource": "CONFIRM",
"url": "http://www.phpmyadmin.net/home_page/security/PMASA-2010-2.php"
},
{
"name": "37826",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37826"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20130722 CORE-2013-0701 - Artweaver Buffer Overflow Vulnerability", "name": "http://www.artweaver.de/en/help/81",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-07/0154.html" "url": "http://www.artweaver.de/en/help/81"
}, },
{ {
"name": "27047", "name": "27047",
@ -63,9 +63,9 @@
"url": "http://www.exploit-db.com/exploits/27047" "url": "http://www.exploit-db.com/exploits/27047"
}, },
{ {
"name" : "http://www.coresecurity.com/advisories/artweaver-buffer-overflow-vulnerability", "name": "95573",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://www.coresecurity.com/advisories/artweaver-buffer-overflow-vulnerability" "url": "http://osvdb.org/95573"
}, },
{ {
"name": "http://www.artweaver.de/en/help/80", "name": "http://www.artweaver.de/en/help/80",
@ -73,14 +73,14 @@
"url": "http://www.artweaver.de/en/help/80" "url": "http://www.artweaver.de/en/help/80"
}, },
{ {
"name" : "http://www.artweaver.de/en/help/81", "name": "http://www.coresecurity.com/advisories/artweaver-buffer-overflow-vulnerability",
"refsource" : "CONFIRM", "refsource": "MISC",
"url" : "http://www.artweaver.de/en/help/81" "url": "http://www.coresecurity.com/advisories/artweaver-buffer-overflow-vulnerability"
}, },
{ {
"name" : "95573", "name": "20130722 CORE-2013-0701 - Artweaver Buffer Overflow Vulnerability",
"refsource" : "OSVDB", "refsource": "BUGTRAQ",
"url" : "http://osvdb.org/95573" "url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0154.html"
}, },
{ {
"name": "54167", "name": "54167",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2013-2904", "ID": "CVE-2013-2904",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://crbug.com/260428", "name": "https://src.chromium.org/viewvc/blink?revision=154680&view=revision",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "http://crbug.com/260428" "url": "https://src.chromium.org/viewvc/blink?revision=154680&view=revision"
}, },
{ {
"name": "http://googlechromereleases.blogspot.com/2013/08/stable-channel-update.html", "name": "http://googlechromereleases.blogspot.com/2013/08/stable-channel-update.html",
@ -63,9 +63,9 @@
"url": "http://googlechromereleases.blogspot.com/2013/08/stable-channel-update.html" "url": "http://googlechromereleases.blogspot.com/2013/08/stable-channel-update.html"
}, },
{ {
"name" : "https://src.chromium.org/viewvc/blink?revision=154680&view=revision", "name": "oval:org.mitre.oval:def:18550",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "https://src.chromium.org/viewvc/blink?revision=154680&view=revision" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18550"
}, },
{ {
"name": "DSA-2741", "name": "DSA-2741",
@ -73,9 +73,9 @@
"url": "http://www.debian.org/security/2013/dsa-2741" "url": "http://www.debian.org/security/2013/dsa-2741"
}, },
{ {
"name" : "oval:org.mitre.oval:def:18550", "name": "http://crbug.com/260428",
"refsource" : "OVAL", "refsource": "CONFIRM",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18550" "url": "http://crbug.com/260428"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6145", "ID": "CVE-2013-6145",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-6912", "ID": "CVE-2013-6912",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,6 +57,16 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://cs.cybozu.co.jp/information/20131202up01.php" "url": "http://cs.cybozu.co.jp/information/20131202up01.php"
}, },
{
"name": "100560",
"refsource": "OSVDB",
"url": "http://osvdb.org/100560"
},
{
"name": "JVNDB-2013-000113",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000113"
},
{ {
"name": "https://support.cybozu.com/ja-jp/article/6927", "name": "https://support.cybozu.com/ja-jp/article/6927",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,16 +76,6 @@
"name": "JVN#23981867", "name": "JVN#23981867",
"refsource": "JVN", "refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN23981867/index.html" "url": "http://jvn.jp/en/jp/JVN23981867/index.html"
},
{
"name" : "JVNDB-2013-000113",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000113"
},
{
"name" : "100560",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/100560"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://hg.code.sf.net/p/graphicsmagick/code/rev/e5761e3a2012",
"refsource" : "CONFIRM",
"url" : "http://hg.code.sf.net/p/graphicsmagick/code/rev/e5761e3a2012"
},
{ {
"name": "DSA-4321", "name": "DSA-4321",
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4321" "url": "https://www.debian.org/security/2018/dsa-4321"
}, },
{
"name": "http://hg.code.sf.net/p/graphicsmagick/code/rev/e5761e3a2012",
"refsource": "CONFIRM",
"url": "http://hg.code.sf.net/p/graphicsmagick/code/rev/e5761e3a2012"
},
{ {
"name": "99356", "name": "99356",
"refsource": "BID", "refsource": "BID",

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://source.android.com/security/bulletin/2017-11-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2017-11-01"
},
{ {
"name": "101774", "name": "101774",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/101774" "url": "http://www.securityfocus.com/bid/101774"
},
{
"name": "https://source.android.com/security/bulletin/2017-11-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-11-01"
} }
] ]
} }

View File

@ -53,15 +53,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0503",
"refsource" : "MISC",
"url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0503"
},
{ {
"name": "102475", "name": "102475",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102475" "url": "http://www.securityfocus.com/bid/102475"
},
{
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0503",
"refsource": "MISC",
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0503"
} }
] ]
} }

View File

@ -52,16 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[qemu-devel] 20171010 [PATCH v1 1/7] io: monitor encoutput buffer size from websocket GSource",
"refsource" : "MLIST",
"url" : "https://lists.gnu.org/archive/html/qemu-devel/2017-10/msg02278.html"
},
{
"name" : "https://bugs.launchpad.net/qemu/+bug/1718964",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/qemu/+bug/1718964"
},
{ {
"name": "DSA-4213", "name": "DSA-4213",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -72,20 +62,30 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0816" "url": "https://access.redhat.com/errata/RHSA-2018:0816"
}, },
{
"name": "101277",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101277"
},
{ {
"name": "RHSA-2018:1104", "name": "RHSA-2018:1104",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1104" "url": "https://access.redhat.com/errata/RHSA-2018:1104"
}, },
{
"name": "https://bugs.launchpad.net/qemu/+bug/1718964",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/qemu/+bug/1718964"
},
{ {
"name": "USN-3575-1", "name": "USN-3575-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3575-1/" "url": "https://usn.ubuntu.com/3575-1/"
}, },
{ {
"name" : "101277", "name": "[qemu-devel] 20171010 [PATCH v1 1/7] io: monitor encoutput buffer size from websocket GSource",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/101277" "url": "https://lists.gnu.org/archive/html/qemu-devel/2017-10/msg02278.html"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-15461", "ID": "CVE-2017-15461",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-550x",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-550x"
},
{ {
"name": "103406", "name": "103406",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/103406" "url": "http://www.securityfocus.com/bid/103406"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-550x",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-550x"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dnac",
"refsource" : "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dnac"
},
{ {
"name": "104193", "name": "104193",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/104193" "url": "http://www.securityfocus.com/bid/104193"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dnac",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dnac"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-01-22", "DATE_ASSIGNED": "2018-01-22",
"ID": "CVE-2018-1000007", "ID": "CVE-2018-1000007",
"REQUESTER": "daniel@haxx.se", "REQUESTER": "daniel@haxx.se",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "libcurl", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "7.1 through 7.57.0" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "libcurl" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "CWE-201" "value": "n/a"
} }
] ]
} }
@ -54,31 +54,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20180129 [SECURITY] [DLA 1263-1] curl security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/01/msg00038.html"
},
{
"name" : "https://curl.haxx.se/docs/adv_2018-b3bf.html",
"refsource" : "CONFIRM",
"url" : "https://curl.haxx.se/docs/adv_2018-b3bf.html"
},
{
"name" : "DSA-4098",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4098"
},
{
"name" : "RHSA-2018:3157",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3157"
},
{
"name" : "RHSA-2018:3558",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3558"
},
{ {
"name": "USN-3554-2", "name": "USN-3554-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",
@ -89,10 +64,35 @@
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3554-1/" "url": "https://usn.ubuntu.com/3554-1/"
}, },
{
"name": "RHSA-2018:3558",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3558"
},
{
"name": "DSA-4098",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4098"
},
{
"name": "https://curl.haxx.se/docs/adv_2018-b3bf.html",
"refsource": "CONFIRM",
"url": "https://curl.haxx.se/docs/adv_2018-b3bf.html"
},
{ {
"name": "1040274", "name": "1040274",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040274" "url": "http://www.securitytracker.com/id/1040274"
},
{
"name": "RHSA-2018:3157",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3157"
},
{
"name": "[debian-lts-announce] 20180129 [SECURITY] [DLA 1263-1] curl security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00038.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "3/8/2018 0:33:22", "DATE_ASSIGNED": "3/8/2018 0:33:22",
"ID": "CVE-2018-1000127", "ID": "CVE-2018-1000127",
"REQUESTER": "dormando@gmail.com", "REQUESTER": "dormando@gmail.com",
@ -13,18 +13,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "memcached", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "prior to 1.4.37" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "memcached" "vendor_name": "n/a"
} }
] ]
} }
@ -46,7 +46,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Integer Overflow" "value": "n/a"
} }
] ]
} }
@ -54,6 +54,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "RHSA-2018:2290",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2290"
},
{ {
"name": "[debian-lts-announce] 20180329 [SECURITY] [DLA 1329-1] memcached security update", "name": "[debian-lts-announce] 20180329 [SECURITY] [DLA 1329-1] memcached security update",
"refsource": "MLIST", "refsource": "MLIST",
@ -65,14 +70,9 @@
"url": "https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00" "url": "https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00"
}, },
{ {
"name" : "https://github.com/memcached/memcached/issues/271", "name": "USN-3601-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "https://github.com/memcached/memcached/issues/271" "url": "https://usn.ubuntu.com/3601-1/"
},
{
"name" : "https://github.com/memcached/memcached/wiki/ReleaseNotes1437",
"refsource" : "CONFIRM",
"url" : "https://github.com/memcached/memcached/wiki/ReleaseNotes1437"
}, },
{ {
"name": "DSA-4218", "name": "DSA-4218",
@ -80,14 +80,14 @@
"url": "https://www.debian.org/security/2018/dsa-4218" "url": "https://www.debian.org/security/2018/dsa-4218"
}, },
{ {
"name" : "RHSA-2018:2290", "name": "https://github.com/memcached/memcached/wiki/ReleaseNotes1437",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "https://access.redhat.com/errata/RHSA-2018:2290" "url": "https://github.com/memcached/memcached/wiki/ReleaseNotes1437"
}, },
{ {
"name" : "USN-3601-1", "name": "https://github.com/memcached/memcached/issues/271",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "https://usn.ubuntu.com/3601-1/" "url": "https://github.com/memcached/memcached/issues/271"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org", "ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-11-27T13:54:33.490711", "DATE_ASSIGNED": "2018-11-27T13:54:33.490711",
"DATE_REQUESTED": "2018-11-27T14:18:02", "DATE_REQUESTED": "2018-11-27T14:18:02",
"ID": "CVE-2018-1000851", "ID": "CVE-2018-1000851",
@ -14,18 +14,18 @@
"product": { "product": {
"product_data": [ "product_data": [
{ {
"product_name" : "Copay Bitcoin Wallet", "product_name": "n/a",
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_value" : "5.01 to 5.1.0 included." "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Copay Bitcoin Wallet" "vendor_name": "n/a"
} }
] ]
} }
@ -47,7 +47,7 @@
"description": [ "description": [
{ {
"lang": "eng", "lang": "eng",
"value" : "Other/Unknown" "value": "n/a"
} }
] ]
} }
@ -55,6 +55,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://github.com/dominictarr/event-stream/issues/116",
"refsource": "MISC",
"url": "https://github.com/dominictarr/event-stream/issues/116"
},
{ {
"name": "https://arstechnica.com/information-technology/2018/11/hacker-backdoors-widely-used-open-source-software-to-steal-bitcoin/", "name": "https://arstechnica.com/information-technology/2018/11/hacker-backdoors-widely-used-open-source-software-to-steal-bitcoin/",
"refsource": "MISC", "refsource": "MISC",
@ -69,11 +74,6 @@
"name": "https://github.com/bitpay/copay/issues/9346", "name": "https://github.com/bitpay/copay/issues/9346",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/bitpay/copay/issues/9346" "url": "https://github.com/bitpay/copay/issues/9346"
},
{
"name" : "https://github.com/dominictarr/event-stream/issues/116",
"refsource" : "MISC",
"url" : "https://github.com/dominictarr/event-stream/issues/116"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://about.gitlab.com/2018/06/25/security-release-gitlab-11-dot-0-dot-1-released/",
"refsource" : "CONFIRM",
"url" : "https://about.gitlab.com/2018/06/25/security-release-gitlab-11-dot-0-dot-1-released/"
},
{ {
"name": "https://gitlab.com/gitlab-org/gitlab-ce/issues/45168", "name": "https://gitlab.com/gitlab-org/gitlab-ce/issues/45168",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://gitlab.com/gitlab-org/gitlab-ce/issues/45168" "url": "https://gitlab.com/gitlab-org/gitlab-ce/issues/45168"
},
{
"name": "https://about.gitlab.com/2018/06/25/security-release-gitlab-11-dot-0-dot-1-released/",
"refsource": "CONFIRM",
"url": "https://about.gitlab.com/2018/06/25/security-release-gitlab-11-dot-0-dot-1-released/"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{ {
"name": "102996", "name": "102996",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102996" "url": "http://www.securityfocus.com/bid/102996"
}, },
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{ {
"name": "1040364", "name": "1040364",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{ {
"name": "102996", "name": "102996",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/102996" "url": "http://www.securityfocus.com/bid/102996"
}, },
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{ {
"name": "1040364", "name": "1040364",
"refsource": "SECTRACK", "refsource": "SECTRACK",

View File

@ -1,17 +1,59 @@
{ {
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-6517",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0", "data_version": "4.0",
"description" : { "CVE_data_meta": {
"description_data" : [ "ID": "CVE-2018-6517",
"ASSIGNER": "security@puppet.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{ {
"lang" : "eng", "vendor_name": "Puppet",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "product": {
"product_data": [
{
"product_name": "Chloride",
"version": {
"version_data": [
{
"version_value": "prior to 0.3.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": {
"lang": "eng",
"value": "Improper handling of known_hosts file"
}
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://puppet.com/security/cve/CVE-2018-6517",
"url": "https://puppet.com/security/cve/CVE-2018-6517"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Prior to version 0.3.0, chloride's use of net-ssh resulted in host fingerprints for previously unknown hosts getting added to the user's known_hosts file without confirmation. In version 0.3.0 this is updated so that the user's known_hosts file is not updated by chloride."
} }
] ]
} }