"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:53:17 +00:00
parent 84cf86f99b
commit 6ab07d9892
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 4137 additions and 4137 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID": "CVE-2008-0072",
"STATE": "PUBLIC"
},
@ -53,99 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20080528 rPSA-2008-0105-1 evolution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/492684/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2008-8/advisory/",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2008-8/advisory/"
},
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0105",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0105"
},
{
"name" : "https://issues.rpath.com/browse/RPL-2310",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-2310"
},
{
"name" : "DSA-1512",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1512"
},
{
"name" : "FEDORA-2008-2290",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00190.html"
},
{
"name" : "FEDORA-2008-2292",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00195.html"
},
{
"name" : "GLSA-200803-12",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200803-12.xml"
},
{
"name" : "MDVSA-2008:063",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:063"
},
{
"name" : "RHSA-2008:0177",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0177.html"
},
{
"name" : "RHSA-2008:0178",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0178.html"
},
{
"name" : "SUSE-SA:2008:014",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00003.html"
},
{
"name" : "USN-583-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-583-1"
},
{
"name" : "VU#512491",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/512491"
},
{
"name" : "28102",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28102"
},
{
"name" : "oval:org.mitre.oval:def:10701",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10701"
},
{
"name" : "ADV-2008-0768",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0768/references"
},
{
"name" : "1019540",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019540"
},
{
"name" : "29057",
"name": "29258",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/29057"
"url": "http://secunia.com/advisories/29258"
},
{
"name": "29163",
@ -153,44 +63,134 @@
"url": "http://secunia.com/advisories/29163"
},
{
"name" : "29210",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29210"
"name": "DSA-1512",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1512"
},
{
"name" : "29244",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29244"
"name": "RHSA-2008:0178",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0178.html"
},
{
"name" : "29258",
"name": "29057",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/29258"
"url": "http://secunia.com/advisories/29057"
},
{
"name" : "29264",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29264"
"name": "VU#512491",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/512491"
},
{
"name" : "29317",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29317"
"name": "USN-583-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-583-1"
},
{
"name" : "30437",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30437"
"name": "SUSE-SA:2008:014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00003.html"
},
{
"name": "20080528 rPSA-2008-0105-1 evolution",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/492684/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:10701",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10701"
},
{
"name": "http://secunia.com/secunia_research/2008-8/advisory/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2008-8/advisory/"
},
{
"name": "30491",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30491"
},
{
"name": "29210",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29210"
},
{
"name": "30437",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30437"
},
{
"name": "FEDORA-2008-2290",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00190.html"
},
{
"name": "ADV-2008-0768",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0768/references"
},
{
"name": "GLSA-200803-12",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200803-12.xml"
},
{
"name": "29317",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29317"
},
{
"name": "29264",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29264"
},
{
"name": "MDVSA-2008:063",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:063"
},
{
"name": "29244",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29244"
},
{
"name": "RHSA-2008:0177",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0177.html"
},
{
"name": "https://issues.rpath.com/browse/RPL-2310",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2310"
},
{
"name": "evolution-emfmultipart-format-string(41011)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41011"
},
{
"name": "FEDORA-2008-2292",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00195.html"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0105",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0105"
},
{
"name": "28102",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28102"
},
{
"name": "1019540",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019540"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "28782",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28782"
},
{
"name": "http://deluge-torrent.org/Changelog.php",
"refsource": "CONFIRM",
@ -63,59 +68,54 @@
"url": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?r1=956&r2=1968&pathrev=1968"
},
{
"name" : "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?view=log&pathrev=1968#rev1968",
"name": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/trunk/include/libtorrent/bencode.hpp?view=log&pathrev=1968",
"refsource": "CONFIRM",
"url" : "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?view=log&pathrev=1968#rev1968"
"url": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/trunk/include/libtorrent/bencode.hpp?view=log&pathrev=1968"
},
{
"name": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_13/include/libtorrent/bencode.hpp?view=log&pathrev=1968",
"refsource": "CONFIRM",
"url": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_13/include/libtorrent/bencode.hpp?view=log&pathrev=1968"
},
{
"name" : "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/trunk/include/libtorrent/bencode.hpp?view=log&pathrev=1968",
"refsource" : "CONFIRM",
"url" : "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/trunk/include/libtorrent/bencode.hpp?view=log&pathrev=1968"
},
{
"name": "FEDORA-2008-1198",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00001.html"
},
{
"name" : "27597",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27597"
},
{
"name" : "ADV-2008-0384",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0384"
},
{
"name" : "ADV-2008-0383",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0383"
},
{
"name" : "28699",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28699"
},
{
"name": "28781",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28781"
},
{
"name" : "28782",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28782"
},
{
"name": "28700",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28700"
},
{
"name": "ADV-2008-0384",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0384"
},
{
"name": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?view=log&pathrev=1968#rev1968",
"refsource": "CONFIRM",
"url": "http://libtorrent.svn.sourceforge.net/viewvc/libtorrent/branches/RC_0_12/include/libtorrent/bencode.hpp?view=log&pathrev=1968#rev1968"
},
{
"name": "28699",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28699"
},
{
"name": "27597",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27597"
},
{
"name": "ADV-2008-0383",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0383"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20080218 Crafty Syntax Xss Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488286/100/0/threaded"
"name": "http://sourceforge.net/project/shownotes.php?release_id=580994",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=580994"
},
{
"name": "20080302 Re: Crafty Syntax Xss Vulnerability",
@ -63,29 +63,29 @@
"url": "http://www.securityfocus.com/archive/1/489016/100/0/threaded"
},
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=580994",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?release_id=580994"
"name": "3688",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3688"
},
{
"name" : "27859",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27859"
"name": "20080218 Crafty Syntax Xss Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488286/100/0/threaded"
},
{
"name": "29201",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29201"
},
{
"name" : "3688",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3688"
},
{
"name": "cslh-lostsheep-xss(40636)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40636"
},
{
"name": "27859",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27859"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-1232",
"STATE": "PUBLIC"
},
@ -53,149 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20080801 [CVE-2008-1232] Apache Tomcat XSS vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495021/100/0/threaded"
},
{
"name" : "20090616 CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/504351/100/0/threaded"
},
{
"name" : "20090806 CA20090806-02: Security Notice for Unicenter Asset Portfolio Management, Unicenter Desktop and Server Management, Unicenter Patch Management",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/505556/100/0/threaded"
},
{
"name" : "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name" : "http://tomcat.apache.org/security-4.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-4.html"
},
{
"name" : "http://tomcat.apache.org/security-5.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-5.html"
},
{
"name" : "http://tomcat.apache.org/security-6.html",
"refsource" : "CONFIRM",
"url" : "http://tomcat.apache.org/security-6.html"
},
{
"name" : "http://support.apple.com/kb/HT3216",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3216"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2009-0002.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2009-0002.html"
},
{
"name" : "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx",
"refsource" : "CONFIRM",
"url" : "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx"
},
{
"name" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500",
"refsource" : "CONFIRM",
"url" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500"
},
{
"name" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095",
"refsource" : "CONFIRM",
"url" : "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource" : "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name" : "APPLE-SA-2008-10-09",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
},
{
"name" : "FEDORA-2008-8113",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html"
},
{
"name" : "FEDORA-2008-8130",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html"
},
{
"name" : "FEDORA-2008-7977",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html"
},
{
"name" : "HPSBUX02401",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=123376588623823&w=2"
},
{
"name" : "SSRT090005",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=123376588623823&w=2"
},
{
"name" : "HPSBST02955",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
},
{
"name" : "MDVSA-2008:188",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
},
{
"name" : "RHSA-2008:0648",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0648.html"
},
{
"name" : "RHSA-2008:0862",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
},
{
"name" : "RHSA-2008:0864",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0864.html"
},
{
"name" : "SUSE-SR:2008:018",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
},
{
"name" : "SUSE-SR:2009:004",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name" : "30496",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30496"
},
{
"name" : "31681",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31681"
"name": "1020622",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020622"
},
{
"name": "oval:org.mitre.oval:def:5985",
@ -203,124 +63,14 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5985"
},
{
"name" : "oval:org.mitre.oval:def:11181",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11181"
"name": "http://tomcat.apache.org/security-4.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-4.html"
},
{
"name" : "33999",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33999"
},
{
"name" : "34013",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34013"
},
{
"name" : "35474",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35474"
},
{
"name" : "36108",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36108"
},
{
"name" : "37460",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37460"
},
{
"name" : "57126",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/57126"
},
{
"name" : "ADV-2008-2305",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2305"
},
{
"name" : "ADV-2008-2823",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2823"
},
{
"name" : "ADV-2008-2780",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2780"
},
{
"name" : "ADV-2009-0320",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0320"
},
{
"name" : "1020622",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020622"
},
{
"name" : "31379",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31379"
},
{
"name" : "31381",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31381"
},
{
"name" : "31639",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31639"
},
{
"name" : "31891",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31891"
},
{
"name" : "31865",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31865"
},
{
"name" : "32222",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32222"
},
{
"name" : "31982",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31982"
},
{
"name" : "33797",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33797"
},
{
"name" : "32120",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32120"
},
{
"name" : "32266",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32266"
},
{
"name" : "4098",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4098"
},
{
"name" : "ADV-2009-0503",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/0503"
"name": "RHSA-2008:0862",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0862.html"
},
{
"name": "ADV-2009-1609",
@ -332,15 +82,265 @@
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2194"
},
{
"name": "34013",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34013"
},
{
"name": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx",
"refsource": "CONFIRM",
"url": "http://community.ca.com/blogs/casecurityresponseblog/archive/2009/06/15/ca20090615-02-ca-service-desk-tomcat-cross-site-scripting-vulnerability.aspx"
},
{
"name": "ADV-2008-2823",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2823"
},
{
"name": "37460",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37460"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0002.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0002.html"
},
{
"name": "31982",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31982"
},
{
"name": "31681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31681"
},
{
"name": "32120",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32120"
},
{
"name": "oval:org.mitre.oval:def:11181",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11181"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
},
{
"name": "33999",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33999"
},
{
"name": "30496",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30496"
},
{
"name": "31865",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31865"
},
{
"name": "4098",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4098"
},
{
"name": "FEDORA-2008-8130",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html"
},
{
"name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095",
"refsource": "CONFIRM",
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214095"
},
{
"name": "31639",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31639"
},
{
"name": "SUSE-SR:2008:018",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html"
},
{
"name": "36108",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36108"
},
{
"name": "MDVSA-2008:188",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:188"
},
{
"name": "31379",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31379"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm"
},
{
"name": "ADV-2009-0320",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0320"
},
{
"name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
},
{
"name": "RHSA-2008:0864",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0864.html"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name": "57126",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/57126"
},
{
"name": "32222",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32222"
},
{
"name": "31891",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31891"
},
{
"name": "33797",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33797"
},
{
"name": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500",
"refsource": "CONFIRM",
"url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=209500"
},
{
"name": "20090806 CA20090806-02: Security Notice for Unicenter Asset Portfolio Management, Unicenter Desktop and Server Management, Unicenter Patch Management",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/505556/100/0/threaded"
},
{
"name": "FEDORA-2008-7977",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html"
},
{
"name": "ADV-2008-2305",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2305"
},
{
"name": "FEDORA-2008-8113",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html"
},
{
"name": "20090616 CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/504351/100/0/threaded"
},
{
"name": "http://tomcat.apache.org/security-5.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-5.html"
},
{
"name": "35474",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35474"
},
{
"name": "ADV-2008-2780",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2780"
},
{
"name": "31381",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31381"
},
{
"name": "HPSBUX02401",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=123376588623823&w=2"
},
{
"name": "HPSBST02955",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2"
},
{
"name": "APPLE-SA-2008-10-09",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT3216",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3216"
},
{
"name": "ADV-2009-0503",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0503"
},
{
"name": "ADV-2009-3316",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3316"
},
{
"name": "SSRT090005",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=123376588623823&w=2"
},
{
"name": "tomcat-httpservletresponse-xss(44155)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44155"
},
{
"name": "20080801 [CVE-2008-1232] Apache Tomcat XSS vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495021/100/0/threaded"
},
{
"name": "32266",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32266"
},
{
"name": "RHSA-2008:0648",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0648.html"
}
]
}

View File

@ -58,19 +58,14 @@
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4153"
},
{
"name" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154",
"refsource" : "CONFIRM",
"url" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154"
"name": "28467",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28467"
},
{
"name" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155",
"refsource" : "CONFIRM",
"url" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155"
},
{
"name" : "IZ11820",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=isg1IZ11820"
"name": "1019606",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1019606"
},
{
"name": "IZ12794",
@ -82,15 +77,25 @@
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ16992"
},
{
"name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155",
"refsource": "CONFIRM",
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4155"
},
{
"name": "IZ17111",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ17111"
},
{
"name" : "28467",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28467"
"name": "IZ11820",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ11820"
},
{
"name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154",
"refsource": "CONFIRM",
"url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4154"
},
{
"name": "oval:org.mitre.oval:def:4595",
@ -101,11 +106,6 @@
"name": "ADV-2008-0865",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0865"
},
{
"name" : "1019606",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1019606"
}
]
}

View File

@ -57,30 +57,30 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5338"
},
{
"name" : "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1207033569.ff.php",
"refsource" : "MISC",
"url" : "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1207033569.ff.php"
},
{
"name": "28546",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28546"
},
{
"name": "chilkathttp-activex-file-overwrite(45988)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45988"
},
{
"name": "ADV-2008-1050",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1050/references"
},
{
"name": "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1207033569.ff.php",
"refsource": "MISC",
"url": "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1207033569.ff.php"
},
{
"name": "29581",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29581"
},
{
"name" : "chilkathttp-activex-file-overwrite(45988)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45988"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5433"
},
{
"name" : "28751",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28751"
},
{
"name": "29812",
"refsource": "SECUNIA",
@ -71,6 +66,11 @@
"name": "ccmail-admin-security-bypass(41797)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41797"
},
{
"name": "28751",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28751"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "6178",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6178"
},
{
"name": "4108",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4108"
},
{
"name": "6178",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6178"
}
]
}

View File

@ -62,6 +62,11 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30580"
},
{
"name": "freehostingmanager-cookie-security-bypass(44260)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44260"
},
{
"name": "31383",
"refsource": "SECUNIA",
@ -71,11 +76,6 @@
"name": "4118",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4118"
},
{
"name" : "freehostingmanager-cookie-security-bypass(44260)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44260"
}
]
}

View File

@ -57,16 +57,6 @@
"refsource": "CONFIRM",
"url": "http://high-norm.rash.jp/script_soundmaster2nd.html."
},
{
"name" : "JVN#55010230",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN55010230/index.html"
},
{
"name" : "31076",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31076"
},
{
"name": "soundmaster2nd-unspecified-xss(44977)",
"refsource": "XF",
@ -76,6 +66,16 @@
"name": "http://high-norm.rash.jp/script_soundmaster2nd.html",
"refsource": "CONFIRM",
"url": "http://high-norm.rash.jp/script_soundmaster2nd.html"
},
{
"name": "JVN#55010230",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN55010230/index.html"
},
{
"name": "31076",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31076"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "6458",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6458"
"name": "1020897",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020897"
},
{
"name": "http://shinnok.evonet.ro/vulns_html/pftp.html",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/31173"
},
{
"name" : "1020897",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020897"
"name": "personalftp-retr-dos(45129)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45129"
},
{
"name": "31852",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/31852"
},
{
"name" : "personalftp-retr-dos(45129)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45129"
"name": "6458",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6458"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "6537",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6537"
},
{
"name" : "http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS",
"refsource" : "MISC",
"url" : "http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS"
},
{
"name" : "31332",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31332"
},
{
"name": "31951",
"refsource": "SECUNIA",
@ -76,6 +61,21 @@
"name": "chilkatxml-chilkatutil-file-overwrite(45333)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45333"
},
{
"name": "6537",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6537"
},
{
"name": "31332",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31332"
},
{
"name": "http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS",
"refsource": "MISC",
"url": "http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS"
}
]
}

View File

@ -52,30 +52,30 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20081019 CVE id request: vlc",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/10/19/2"
},
{
"name": "[oss-security] 20081022 Re: CVE id request: vlc",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/10/22/6"
},
{
"name": "oval:org.mitre.oval:def:14630",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14630"
},
{
"name": "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=d859e6b9537af2d7326276f70de25a840f554dc3",
"refsource": "CONFIRM",
"url": "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=d859e6b9537af2d7326276f70de25a840f554dc3"
},
{
"name": "[oss-security] 20081019 CVE id request: vlc",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/10/19/2"
},
{
"name": "31867",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31867"
},
{
"name" : "oval:org.mitre.oval:def:14630",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14630"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Mar/87"
},
{
"name": "58335",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/58335"
},
{
"name": "[oss-secuirty] 20130325 Re: CVE request: ibutils improper use of files in /tmp",
"refsource": "MLIST",
@ -68,19 +73,9 @@
"url": "http://www.openwall.com/lists/oss-security/2013/03/26/4"
},
{
"name" : "[oss-secuirty] 20130326 Re: CVE request: ibutils improper use of files in /tmp",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/03/26/11"
},
{
"name" : "[oss-security] 20130319 Fwd: CVE requests",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/03/19/8"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=927430",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=927430"
"name": "RHSA-2013:1661",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1661.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
@ -88,14 +83,19 @@
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name" : "RHSA-2013:1661",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1661.html"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=927430",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=927430"
},
{
"name" : "58335",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/58335"
"name": "[oss-security] 20130319 Fwd: CVE requests",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/19/8"
},
{
"name": "[oss-secuirty] 20130326 Re: CVE request: ibutils improper use of files in /tmp",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/26/11"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-2815",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-2973",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3203",
"STATE": "PUBLIC"
},
@ -57,15 +57,15 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-069"
},
{
"name" : "TA13-253A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-253A"
},
{
"name": "oval:org.mitre.oval:def:18916",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18916"
},
{
"name": "TA13-253A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-253A"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-3401",
"STATE": "PUBLIC"
},

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10594",
"refsource" : "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10594"
},
{
"name": "62962",
"refsource": "BID",
@ -72,15 +67,20 @@
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029175"
},
{
"name" : "55109",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/55109"
},
{
"name": "juniper-junos-cve20136013-bo(87847)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87847"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10594",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10594"
},
{
"name": "55109",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/55109"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6149",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6399",
"STATE": "PUBLIC"
},
@ -52,15 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "RHSA-2014:0743",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0743.html"
},
{
"name": "[Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html"
},
{
"name" : "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1",
"refsource" : "CONFIRM",
"url" : "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1"
"name": "RHSA-2014:0744",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0744.html"
},
{
"name": "FEDORA-2014-6288",
@ -68,14 +73,9 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html"
},
{
"name" : "RHSA-2014:0743",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0743.html"
},
{
"name" : "RHSA-2014:0744",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0744.html"
"name": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1",
"refsource": "CONFIRM",
"url": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6762",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6764",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20140410 CVE-2013-7353 CVE-2013-7354 libpng integer overflows",
"refsource" : "MLIST",
"url" : "http://seclists.org/oss-sec/2014/q2/83"
},
{
"name": "http://sourceforge.net/p/libpng/bugs/199/",
"refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "67344",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67344"
},
{
"name": "[oss-security] 20140410 CVE-2013-7353 CVE-2013-7354 libpng integer overflows",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q2/83"
}
]
}

View File

@ -58,9 +58,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
"name": "1038941",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038941"
},
{
"name": "99781",
@ -68,9 +68,9 @@
"url": "http://www.securityfocus.com/bid/99781"
},
{
"name" : "1038941",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038941"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
}
]
}

View File

@ -61,21 +61,6 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20180629 [SECURITY] [DLA 1407-1] mariadb-10.0 security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20171019-0002/",
"refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{
"name": "DSA-4002",
"refsource": "DEBIAN",
@ -86,31 +71,16 @@
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4341"
},
{
"name": "https://security.netapp.com/advisory/ntap-20171019-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{
"name": "RHSA-2017:3265",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3265"
},
{
"name" : "RHSA-2017:3442",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:3442"
},
{
"name" : "RHSA-2018:0279",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0279"
},
{
"name" : "RHSA-2018:0574",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0574"
},
{
"name" : "RHSA-2018:2439",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:2439"
},
{
"name": "RHSA-2018:2729",
"refsource": "REDHAT",
@ -121,10 +91,40 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101390"
},
{
"name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1407-1] mariadb-10.0 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html"
},
{
"name": "RHSA-2018:0574",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0574"
},
{
"name": "1039597",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039597"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "RHSA-2018:0279",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0279"
},
{
"name": "RHSA-2018:2439",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2439"
},
{
"name": "RHSA-2017:3442",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3442"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-17273",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "DSA-4104",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4104"
},
{
"name": "[debian-lts-announce] 20180202 [SECURITY] [DLA 1268-1] p7zip security update",
"refsource": "MLIST",
@ -62,20 +67,15 @@
"refsource": "MISC",
"url": "https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/"
},
{
"name" : "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html",
"refsource" : "MISC",
"url" : "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html"
},
{
"name" : "DSA-4104",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4104"
},
{
"name": "1040831",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040831"
},
{
"name": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html",
"refsource": "MISC",
"url": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html",
"refsource" : "CONFIRM",
"url" : "http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html"
},
{
"name": "http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html",
"refsource": "CONFIRM",
"url": "http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html"
},
{
"name": "http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html",
"refsource": "CONFIRM",
"url": "http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/",
"refsource" : "MISC",
"url" : "https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/"
},
{
"name": "96865",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96865"
},
{
"name": "https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/",
"refsource": "MISC",
"url": "https://erpscan.io/advisories/erpscan-17-014-sap-netweaver-java-deserialization-untrusted-user-value-metadatauploader/"
}
]
}

View File

@ -60,25 +60,25 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.tenable.com/security/research/tra-2018-20",
"refsource" : "MISC",
"url" : "https://www.tenable.com/security/research/tra-2018-20"
},
{
"name": "20180828 Cisco Data Center Network Manager Path Traversal Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180828-dcnm-traversal"
},
{
"name" : "105159",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/105159"
},
{
"name": "1041585",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041585"
},
{
"name": "https://www.tenable.com/security/research/tra-2018-20",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2018-20"
},
{
"name": "105159",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105159"
}
]
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@qnapsecurity.com.tw",
"ASSIGNER": "security@qnap.com",
"DATE_PUBLIC": "2018-04-27T00:00:00",
"ID": "CVE-2018-0711",
"STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-02-26",
"ID": "CVE-2018-1000114",
"REQUESTER": "ml@beckweb.net",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Jenkins Promoted Builds Plugin",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.31.1 and older"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Jenkins project"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-285"
"value": "n/a"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "kurt@seifried.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-12-19T20:52:45.253944",
"DATE_REQUESTED": "2018-12-06T06:56:23",
"ID": "CVE-2018-1000870",
@ -14,18 +14,18 @@
"product": {
"product_data": [
{
"product_name" : "PHPipam",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "1.3.2 and earlier"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "PHPipam"
"vendor_name": "n/a"
}
]
}
@ -47,7 +47,7 @@
"description": [
{
"lang": "eng",
"value" : "CWE-79"
"value": "n/a"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/Dec/20"
},
{
"name": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/150690/VistaPortal-SE-5.1-Cross-Site-Scripting.html"
},
{
"name": "20181207 [CVE-2018-19649, CVE-2018-19765 to CVE-2018-19775, CVE-2018-19809 to CVE-2018-19822] - Multiple Cross Site Scripting in VistaPortal SE Version 5.1 (build 51029)",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Dec/20"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/sass/libsass/issues/2657",
"refsource" : "MISC",
"url" : "https://github.com/sass/libsass/issues/2657"
},
{
"name": "https://github.com/sass/libsass/pull/2767",
"refsource": "MISC",
"url": "https://github.com/sass/libsass/pull/2767"
},
{
"name": "https://github.com/sass/libsass/issues/2657",
"refsource": "MISC",
"url": "https://github.com/sass/libsass/issues/2657"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-1008",
"STATE": "PUBLIC"
},
@ -190,16 +190,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1008",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1008"
},
{
"name": "103658",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103658"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1008",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1008"
},
{
"name": "1040673",
"refsource": "SECTRACK",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-1026",
"STATE": "PUBLIC"
},
@ -70,16 +70,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1026",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1026"
},
{
"name": "103613",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103613"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1026",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-1026"
},
{
"name": "1040654",
"refsource": "SECTRACK",

View File

@ -74,9 +74,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10734059",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10734059"
"name": "1042176",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1042176"
},
{
"name": "105883",
@ -84,9 +84,9 @@
"url": "http://www.securityfocus.com/bid/105883"
},
{
"name" : "1042176",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1042176"
"name": "http://www.ibm.com/support/docview.wss?uid=ibm10734059",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10734059"
},
{
"name": "ibm-db2-cve20181857-info-disc(151155)",

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT208848",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208848"
},
{
"name": "1041031",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041031"
},
{
"name": "https://support.apple.com/HT208848",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208848"
}
]
}