"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:43:52 +00:00
parent 791e172033
commit 77d4239c0f
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3446 additions and 3446 deletions

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20010409 talkback.cgi vulnerability may allow users to read any file",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0128.html"
},
{ {
"name": "2547", "name": "2547",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/2547" "url": "http://www.securityfocus.com/bid/2547"
},
{
"name": "20010409 talkback.cgi vulnerability may allow users to read any file",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0128.html"
} }
] ]
} }

View File

@ -53,19 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20010630 php breaks safe mode", "name": "RHSA-2003:159",
"refsource" : "BUGTRAQ",
"url" : "http://online.securityfocus.com/archive/1/194425"
},
{
"name" : "http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz",
"refsource" : "CONFIRM",
"url" : "http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz"
},
{
"name" : "RHSA-2002:102",
"refsource": "REDHAT", "refsource": "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2002-102.html" "url": "http://www.redhat.com/support/errata/RHSA-2003-159.html"
}, },
{ {
"name": "RHSA-2002:129", "name": "RHSA-2002:129",
@ -73,9 +63,9 @@
"url": "http://www.redhat.com/support/errata/RHSA-2002-129.html" "url": "http://www.redhat.com/support/errata/RHSA-2002-129.html"
}, },
{ {
"name" : "RHSA-2003:159", "name": "php-safemode-elevate-privileges(6787)",
"refsource" : "REDHAT", "refsource": "XF",
"url" : "http://www.redhat.com/support/errata/RHSA-2003-159.html" "url": "http://www.iss.net/security_center/static/6787.php"
}, },
{ {
"name": "2954", "name": "2954",
@ -83,9 +73,19 @@
"url": "http://www.securityfocus.com/bid/2954" "url": "http://www.securityfocus.com/bid/2954"
}, },
{ {
"name" : "php-safemode-elevate-privileges(6787)", "name": "20010630 php breaks safe mode",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "http://www.iss.net/security_center/static/6787.php" "url": "http://online.securityfocus.com/archive/1/194425"
},
{
"name": "RHSA-2002:102",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2002-102.html"
},
{
"name": "http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz",
"refsource": "CONFIRM",
"url": "http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz"
} }
] ]
} }

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20010405 Trustix Security Advisory #2001-0003 - kernel", "name": "RHSA-2001:047",
"refsource" : "BUGTRAQ", "refsource": "REDHAT",
"url" : "http://marc.info/?l=bugtraq&m=98653252326445&w=2" "url": "http://www.redhat.com/support/errata/RHSA-2001-047.html"
},
{
"name" : "20010409 PROGENY-SA-2001-01: execve()/ptrace() exploit in Linux kernels",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=98684172109474&w=2"
},
{
"name" : "http://www.linux.org.uk/VERSION/relnotes.2219.html",
"refsource" : "CONFIRM",
"url" : "http://www.linux.org.uk/VERSION/relnotes.2219.html"
},
{
"name" : "IMNX-2001-70-010-01",
"refsource" : "IMMUNIX",
"url" : "http://marc.info/?l=bugtraq&m=98575345009963&w=2"
}, },
{ {
"name": "CSSA-2001-012.0", "name": "CSSA-2001-012.0",
@ -78,9 +63,9 @@
"url": "http://marc.info/?l=bugtraq&m=98637996127004&w=2" "url": "http://marc.info/?l=bugtraq&m=98637996127004&w=2"
}, },
{ {
"name" : "MDKSA-2001:037", "name": "http://www.linux.org.uk/VERSION/relnotes.2219.html",
"refsource" : "MANDRAKE", "refsource": "CONFIRM",
"url" : "http://marc.info/?l=bugtraq&m=98759029811377&w=2" "url": "http://www.linux.org.uk/VERSION/relnotes.2219.html"
}, },
{ {
"name": "DSA-047", "name": "DSA-047",
@ -88,9 +73,19 @@
"url": "https://www.debian.org/security/2001/dsa-047" "url": "https://www.debian.org/security/2001/dsa-047"
}, },
{ {
"name" : "SuSE-SA:2001:018", "name": "MDKSA-2001:037",
"refsource" : "SUSE", "refsource": "MANDRAKE",
"url" : "http://marc.info/?l=bugtraq&m=99013830726309&w=2" "url": "http://marc.info/?l=bugtraq&m=98759029811377&w=2"
},
{
"name": "20010409 PROGENY-SA-2001-01: execve()/ptrace() exploit in Linux kernels",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=98684172109474&w=2"
},
{
"name": "IMNX-2001-70-010-01",
"refsource": "IMMUNIX",
"url": "http://marc.info/?l=bugtraq&m=98575345009963&w=2"
}, },
{ {
"name": "CLA-2001:394", "name": "CLA-2001:394",
@ -98,9 +93,14 @@
"url": "http://marc.info/?l=bugtraq&m=98775114228203&w=2" "url": "http://marc.info/?l=bugtraq&m=98775114228203&w=2"
}, },
{ {
"name" : "RHSA-2001:047", "name": "20010405 Trustix Security Advisory #2001-0003 - kernel",
"refsource" : "REDHAT", "refsource": "BUGTRAQ",
"url" : "http://www.redhat.com/support/errata/RHSA-2001-047.html" "url": "http://marc.info/?l=bugtraq&m=98653252326445&w=2"
},
{
"name": "SuSE-SA:2001:018",
"refsource": "SUSE",
"url": "http://marc.info/?l=bugtraq&m=99013830726309&w=2"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20011020 gm4 format strings on OSX", "name": "http://lists.apple.com/mhonarc/security-announce/msg00038.html",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://marc.info/?l=bugtraq&m=100368233714229&w=2" "url": "http://lists.apple.com/mhonarc/security-announce/msg00038.html"
}, },
{ {
"name": "VU#147587", "name": "VU#147587",
"refsource": "CERT-VN", "refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/147587" "url": "http://www.kb.cert.org/vuls/id/147587"
}, },
{
"name" : "http://lists.apple.com/mhonarc/security-announce/msg00038.html",
"refsource" : "CONFIRM",
"url" : "http://lists.apple.com/mhonarc/security-announce/msg00038.html"
},
{ {
"name": "macos-gm4-utility-bo(10174)", "name": "macos-gm4-utility-bo(10174)",
"refsource": "XF", "refsource": "XF",
"url": "http://www.iss.net/security_center/static/10174.php" "url": "http://www.iss.net/security_center/static/10174.php"
},
{
"name": "20011020 gm4 format strings on OSX",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=100368233714229&w=2"
} }
] ]
} }

View File

@ -53,20 +53,20 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://pridels0.blogspot.com/2006/06/my-photo-scrapbook-vuln.html", "name": "myphoto-display-xss(27085)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://pridels0.blogspot.com/2006/06/my-photo-scrapbook-vuln.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27085"
},
{
"name" : "18418",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/18418"
}, },
{ {
"name": "ADV-2006-2244", "name": "ADV-2006-2244",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2244" "url": "http://www.vupen.com/english/advisories/2006/2244"
}, },
{
"name": "http://pridels0.blogspot.com/2006/06/my-photo-scrapbook-vuln.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2006/06/my-photo-scrapbook-vuln.html"
},
{ {
"name": "26280", "name": "26280",
"refsource": "OSVDB", "refsource": "OSVDB",
@ -78,9 +78,9 @@
"url": "http://secunia.com/advisories/20554" "url": "http://secunia.com/advisories/20554"
}, },
{ {
"name" : "myphoto-display-xss(27085)", "name": "18418",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27085" "url": "http://www.securityfocus.com/bid/18418"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "29538",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29538"
},
{ {
"name": "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1206434746.ff.php&page=last", "name": "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1206434746.ff.php&page=last",
"refsource": "MISC", "refsource": "MISC",
@ -62,20 +67,15 @@
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.shinnai.altervista.org/xplits/TXT_lyyELAFI8pOPu2p7N6cq.html" "url": "http://www.shinnai.altervista.org/xplits/TXT_lyyELAFI8pOPu2p7N6cq.html"
}, },
{
"name" : "28442",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28442"
},
{
"name" : "29538",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29538"
},
{ {
"name": "leadtools-multimedia-file-overwrite(41467)", "name": "leadtools-multimedia-file-overwrite(41467)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41467" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41467"
},
{
"name": "28442",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28442"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "7234", "name": "4668",
"refsource" : "EXPLOIT-DB", "refsource": "SREASON",
"url" : "https://www.exploit-db.com/exploits/7234" "url": "http://securityreason.com/securityalert/4668"
},
{
"name" : "32477",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32477"
}, },
{ {
"name": "50309", "name": "50309",
@ -73,14 +68,19 @@
"url": "http://secunia.com/advisories/32808" "url": "http://secunia.com/advisories/32808"
}, },
{ {
"name" : "4668", "name": "32477",
"refsource" : "SREASON", "refsource": "BID",
"url" : "http://securityreason.com/securityalert/4668" "url": "http://www.securityfocus.com/bid/32477"
}, },
{ {
"name": "videogirls-viewsnaps-sql-injection(46872)", "name": "videogirls-viewsnaps-sql-injection(46872)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46872" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46872"
},
{
"name": "7234",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7234"
} }
] ]
} }

View File

@ -52,210 +52,210 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-484.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-484.htm"
},
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm",
"refsource" : "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm"
},
{
"name" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid=",
"refsource" : "CONFIRM",
"url" : "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid="
},
{
"name" : "http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf",
"refsource" : "CONFIRM",
"url" : "http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf"
},
{
"name" : "GLSA-200911-02",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"name" : "HPSBUX02411",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=123678756409861&w=2"
},
{
"name" : "SSRT080111",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=123678756409861&w=2"
},
{
"name" : "HPSBMA02486",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=126583436323697&w=2"
},
{ {
"name": "SSRT090049", "name": "SSRT090049",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=126583436323697&w=2" "url": "http://marc.info/?l=bugtraq&m=126583436323697&w=2"
}, },
{ {
"name" : "RHSA-2008:1018", "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-484.htm",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2008-1018.html" "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-484.htm"
},
{
"name" : "RHSA-2008:1025",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2008-1025.html"
},
{
"name" : "RHSA-2009:0015",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0015.html"
},
{
"name" : "RHSA-2009:0016",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0016.html"
},
{
"name" : "RHSA-2009:0445",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0445.html"
},
{
"name" : "RHSA-2009:0466",
"refsource" : "REDHAT",
"url" : "https://rhn.redhat.com/errata/RHSA-2009-0466.html"
},
{
"name" : "244986",
"refsource" : "SUNALERT",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-244986-1"
},
{
"name" : "SUSE-SA:2009:007",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00009.html"
},
{
"name" : "SUSE-SR:2009:006",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
}, },
{ {
"name": "SUSE-SA:2009:018", "name": "SUSE-SA:2009:018",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00004.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00004.html"
}, },
{
"name" : "SUSE-SR:2009:010",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
},
{
"name" : "TA08-340A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-340A.html"
},
{
"name" : "32608",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32608"
},
{
"name" : "oval:org.mitre.oval:def:6596",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6596"
},
{
"name" : "1021316",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021316"
},
{
"name" : "34233",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34233"
},
{ {
"name": "34259", "name": "34259",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34259" "url": "http://secunia.com/advisories/34259"
}, },
{
"name" : "34605",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34605"
},
{
"name" : "34889",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34889"
},
{
"name" : "35065",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/35065"
},
{
"name" : "34972",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/34972"
},
{
"name" : "37386",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/37386"
},
{
"name" : "38539",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/38539"
},
{
"name" : "ADV-2008-3339",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3339"
},
{
"name" : "32991",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32991"
},
{
"name" : "33015",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33015"
},
{
"name" : "33710",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33710"
},
{
"name" : "33709",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33709"
},
{
"name" : "33187",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33187"
},
{
"name" : "33528",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33528"
},
{ {
"name": "ADV-2009-0672", "name": "ADV-2009-0672",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/0672" "url": "http://www.vupen.com/english/advisories/2009/0672"
}, },
{
"name": "RHSA-2008:1018",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2008-1018.html"
},
{
"name": "33015",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33015"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm"
},
{
"name": "34889",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34889"
},
{
"name": "34233",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34233"
},
{
"name": "GLSA-200911-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200911-02.xml"
},
{
"name": "244986",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-244986-1"
},
{
"name": "http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf",
"refsource": "CONFIRM",
"url": "http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf"
},
{
"name": "SUSE-SA:2009:007",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00009.html"
},
{
"name": "SSRT080111",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=123678756409861&w=2"
},
{
"name": "38539",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38539"
},
{
"name": "oval:org.mitre.oval:def:6596",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6596"
},
{
"name": "34972",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34972"
},
{
"name": "RHSA-2009:0466",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-0466.html"
},
{
"name": "SUSE-SR:2009:006",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
},
{
"name": "35065",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35065"
},
{
"name": "33528",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33528"
},
{
"name": "1021316",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021316"
},
{
"name": "RHSA-2008:1025",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2008-1025.html"
},
{
"name": "HPSBMA02486",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=126583436323697&w=2"
},
{
"name": "ADV-2008-3339",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3339"
},
{
"name": "HPSBUX02411",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=123678756409861&w=2"
},
{ {
"name": "jre-guessable-file-unauth-access(47045)", "name": "jre-guessable-file-unauth-access(47045)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47045" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47045"
},
{
"name": "RHSA-2009:0445",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0445.html"
},
{
"name": "RHSA-2009:0016",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0016.html"
},
{
"name": "TA08-340A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-340A.html"
},
{
"name": "33709",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33709"
},
{
"name": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid=",
"refsource": "CONFIRM",
"url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid="
},
{
"name": "34605",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34605"
},
{
"name": "SUSE-SR:2009:010",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
},
{
"name": "RHSA-2009:0015",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0015.html"
},
{
"name": "33187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33187"
},
{
"name": "32991",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32991"
},
{
"name": "32608",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32608"
},
{
"name": "37386",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37386"
},
{
"name": "33710",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33710"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20081208 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass", "name": "multiple-antivirus-mzheader-code-execution(47435)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/498995/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47435"
},
{
"name" : "20081209 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass -Update-",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/499043/100/0/threaded"
}, },
{ {
"name": "4723", "name": "4723",
@ -68,9 +63,14 @@
"url": "http://securityreason.com/securityalert/4723" "url": "http://securityreason.com/securityalert/4723"
}, },
{ {
"name" : "multiple-antivirus-mzheader-code-execution(47435)", "name": "20081209 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass -Update-",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47435" "url": "http://www.securityfocus.com/archive/1/499043/100/0/threaded"
},
{
"name": "20081208 Multiple Vendor Anti-Virus Software Malicious WebPage Detection Bypass",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/498995/100/0/threaded"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-2058", "ID": "CVE-2011-2058",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2929", "ID": "CVE-2011-2929",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,6 +57,16 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/17/1" "url": "http://www.openwall.com/lists/oss-security/2011/08/17/1"
}, },
{
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/13"
},
{
"name": "FEDORA-2011-11386",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
},
{ {
"name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)", "name": "[oss-security] 20110819 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST", "refsource": "MLIST",
@ -67,26 +77,31 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/20/1" "url": "http://www.openwall.com/lists/oss-security/2011/08/20/1"
}, },
{
"name": "FEDORA-2011-11572",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
},
{
"name": "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552",
"refsource": "CONFIRM",
"url": "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552"
},
{ {
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)", "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/14" "url": "http://www.openwall.com/lists/oss-security/2011/08/22/14"
}, },
{ {
"name" : "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)", "name": "[rubyonrails-security] 20110816 Filter Skipping Vulnerability in Ruby on Rails 3.0",
"refsource": "MLIST", "refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/08/22/13" "url": "http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain"
}, },
{ {
"name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)", "name": "[oss-security] 20110822 Re: CVE request: ruby on rails flaws (4)",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/08/22/5" "url": "http://www.openwall.com/lists/oss-security/2011/08/22/5"
}, },
{
"name" : "[rubyonrails-security] 20110816 Filter Skipping Vulnerability in Ruby on Rails 3.0",
"refsource" : "MLIST",
"url" : "http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain"
},
{ {
"name": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6", "name": "http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -96,21 +111,6 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=731432", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=731432",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731432" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731432"
},
{
"name" : "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552",
"refsource" : "CONFIRM",
"url" : "https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552"
},
{
"name" : "FEDORA-2011-11386",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html"
},
{
"name" : "FEDORA-2011-11572",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-3246", "ID": "CVE-2011-3246",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,21 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT4999",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4999"
},
{
"name" : "http://support.apple.com/kb/HT5002",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5002"
},
{
"name" : "http://support.apple.com/kb/HT5052",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5052"
},
{ {
"name": "http://support.apple.com/kb/HT5130", "name": "http://support.apple.com/kb/HT5130",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -78,9 +63,9 @@
"url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html"
}, },
{ {
"name" : "APPLE-SA-2011-10-12-3", "name": "APPLE-SA-2012-02-01-1",
"refsource": "APPLE", "refsource": "APPLE",
"url" : "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
}, },
{ {
"name": "APPLE-SA-2011-11-10-1", "name": "APPLE-SA-2011-11-10-1",
@ -88,24 +73,39 @@
"url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html" "url": "http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html"
}, },
{ {
"name" : "APPLE-SA-2012-02-01-1", "name": "APPLE-SA-2011-10-12-3",
"refsource": "APPLE", "refsource": "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"
},
{
"name": "http://support.apple.com/kb/HT5052",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5052"
},
{
"name": "http://support.apple.com/kb/HT4999",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4999"
}, },
{ {
"name": "50115", "name": "50115",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/50115" "url": "http://www.securityfocus.com/bid/50115"
}, },
{
"name" : "50085",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/50085"
},
{ {
"name": "appleios-http-sec-bypass(70551)", "name": "appleios-http-sec-bypass(70551)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70551" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70551"
},
{
"name": "http://support.apple.com/kb/HT5002",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5002"
},
{
"name": "50085",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50085"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3601", "ID": "CVE-2011-3601",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-0584", "ID": "CVE-2013-0584",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2013-0847", "ID": "CVE-2013-0847",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=10416a4d56fa8a89784e4fb62099c3cab17a9952",
"refsource" : "CONFIRM",
"url" : "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=10416a4d56fa8a89784e4fb62099c3cab17a9952"
},
{ {
"name": "http://www.ffmpeg.org/security.html", "name": "http://www.ffmpeg.org/security.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.ffmpeg.org/security.html" "url": "http://www.ffmpeg.org/security.html"
},
{
"name": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=10416a4d56fa8a89784e4fb62099c3cab17a9952",
"refsource": "CONFIRM",
"url": "http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=10416a4d56fa8a89784e4fb62099c3cab17a9952"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2013-0895", "ID": "CVE-2013-0895",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2013/02/stable-channel-update_21.html" "url": "http://googlechromereleases.blogspot.com/2013/02/stable-channel-update_21.html"
}, },
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=167840",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=167840"
},
{ {
"name": "openSUSE-SU-2013:0454", "name": "openSUSE-SU-2013:0454",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00045.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00045.html"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=167840",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=167840"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID": "CVE-2013-0917", "ID": "CVE-2013-0917",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_26.html" "url": "http://googlechromereleases.blogspot.com/2013/03/stable-channel-update_26.html"
}, },
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=180909",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=180909"
},
{ {
"name": "oval:org.mitre.oval:def:15892", "name": "oval:org.mitre.oval:def:15892",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15892" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15892"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=180909",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=180909"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-1040", "ID": "CVE-2013-1040",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,26 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://support.apple.com/kb/HT5934",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5934"
},
{
"name" : "http://support.apple.com/kb/HT6001",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT6001"
},
{
"name" : "APPLE-SA-2013-09-18-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
},
{
"name" : "APPLE-SA-2013-10-22-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2013/Oct/msg00003.html"
},
{ {
"name": "APPLE-SA-2013-10-22-8", "name": "APPLE-SA-2013-10-22-8",
"refsource": "APPLE", "refsource": "APPLE",
@ -82,10 +62,30 @@
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029054" "url": "http://www.securitytracker.com/id/1029054"
}, },
{
"name": "http://support.apple.com/kb/HT6001",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6001"
},
{
"name": "APPLE-SA-2013-10-22-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00003.html"
},
{ {
"name": "54886", "name": "54886",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54886" "url": "http://secunia.com/advisories/54886"
},
{
"name": "http://support.apple.com/kb/HT5934",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5934"
},
{
"name": "APPLE-SA-2013-09-18-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@debian.org",
"ID": "CVE-2013-1423", "ID": "CVE-2013-1423",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20130225 fusionforge CVE-2013-1423 multiple privilege escalations", "name": "58143",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2013/02/25/5" "url": "http://www.securityfocus.com/bid/58143"
},
{
"name" : "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=0cc51b3aca51fa915a35195fdf729bcdb903f2af",
"refsource" : "CONFIRM",
"url" : "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=0cc51b3aca51fa915a35195fdf729bcdb903f2af"
},
{
"name" : "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=1fc730b97c797e03b89cd37823ab345d35286cf4",
"refsource" : "CONFIRM",
"url" : "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=1fc730b97c797e03b89cd37823ab345d35286cf4"
},
{
"name" : "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=9937b9d94ab60ff67fe249c1b9a6c8e3fc1778ba",
"refsource" : "CONFIRM",
"url" : "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=9937b9d94ab60ff67fe249c1b9a6c8e3fc1778ba"
}, },
{ {
"name": "DSA-2633", "name": "DSA-2633",
@ -78,14 +63,29 @@
"url": "http://www.debian.org/security/2013/dsa-2633" "url": "http://www.debian.org/security/2013/dsa-2633"
}, },
{ {
"name" : "58143", "name": "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=9937b9d94ab60ff67fe249c1b9a6c8e3fc1778ba",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/58143" "url": "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=9937b9d94ab60ff67fe249c1b9a6c8e3fc1778ba"
}, },
{ {
"name" : "90605", "name": "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=1fc730b97c797e03b89cd37823ab345d35286cf4",
"refsource" : "OSVDB", "refsource": "CONFIRM",
"url" : "http://osvdb.org/90605" "url": "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=1fc730b97c797e03b89cd37823ab345d35286cf4"
},
{
"name": "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=0cc51b3aca51fa915a35195fdf729bcdb903f2af",
"refsource": "CONFIRM",
"url": "https://fusionforge.org/plugins/scmgit/cgi-bin/gitweb.cgi?p=fusionforge/fusionforge.git;a=commitdiff;h=0cc51b3aca51fa915a35195fdf729bcdb903f2af"
},
{
"name": "[oss-security] 20130225 fusionforge CVE-2013-1423 multiple privilege escalations",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/02/25/5"
},
{
"name": "52371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52371"
}, },
{ {
"name": "52318", "name": "52318",
@ -93,9 +93,9 @@
"url": "http://secunia.com/advisories/52318" "url": "http://secunia.com/advisories/52318"
}, },
{ {
"name" : "52371", "name": "90605",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/52371" "url": "http://osvdb.org/90605"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-1558", "ID": "CVE-2013-1558",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "name": "RHSA-2013:0758",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-0758.html"
},
{
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
"refsource" : "CONFIRM",
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
}, },
{ {
"name": "APPLE-SA-2013-04-16-2", "name": "APPLE-SA-2013-04-16-2",
@ -68,15 +63,30 @@
"url": "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html" "url": "http://lists.apple.com/archives/security-announce/2013/Apr/msg00001.html"
}, },
{ {
"name" : "HPSBUX02889", "name": "TA13-107A",
"refsource" : "HP", "refsource": "CERT",
"url" : "http://marc.info/?l=bugtraq&m=137283787217316&w=2" "url": "http://www.us-cert.gov/ncas/alerts/TA13-107A"
}, },
{ {
"name": "SSRT101252", "name": "SSRT101252",
"refsource": "HP", "refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2" "url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
}, },
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0130"
},
{
"name": "RHSA-2013:0757",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
},
{
"name": "oval:org.mitre.oval:def:19158",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19158"
},
{ {
"name": "MDVSA-2013:161", "name": "MDVSA-2013:161",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
@ -87,40 +97,30 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0752.html" "url": "http://rhn.redhat.com/errata/RHSA-2013-0752.html"
}, },
{
"name" : "RHSA-2013:0757",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0757.html"
},
{
"name" : "RHSA-2013:0758",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0758.html"
},
{ {
"name": "USN-1806-1", "name": "USN-1806-1",
"refsource": "UBUNTU", "refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1806-1" "url": "http://www.ubuntu.com/usn/USN-1806-1"
}, },
{
"name" : "TA13-107A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-107A"
},
{
"name" : "59219",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/59219"
},
{ {
"name": "oval:org.mitre.oval:def:16543", "name": "oval:org.mitre.oval:def:16543",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16543" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16543"
}, },
{ {
"name" : "oval:org.mitre.oval:def:19158", "name": "59219",
"refsource" : "OVAL", "refsource": "BID",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19158" "url": "http://www.securityfocus.com/bid/59219"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html"
},
{
"name": "HPSBUX02889",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=137283787217316&w=2"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-1673", "ID": "CVE-2013-1673",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID": "CVE-2013-1708", "ID": "CVE-2013-1708",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.mozilla.org/security/announce/2013/mfsa2013-67.html",
"refsource" : "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2013/mfsa2013-67.html"
},
{ {
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=879924", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=879924",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,6 +61,11 @@
"name": "oval:org.mitre.oval:def:18803", "name": "oval:org.mitre.oval:def:18803",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18803" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18803"
},
{
"name": "http://www.mozilla.org/security/announce/2013/mfsa2013-67.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-67.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1814", "ID": "CVE-2013-1814",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20130312 [CVE-2013-1814] Apache Rave exposes User over API",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-03/0078.html"
},
{ {
"name": "24744", "name": "24744",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/24744/" "url": "http://www.exploit-db.com/exploits/24744/"
},
{
"name": "20130312 [CVE-2013-1814] Apache Rave exposes User over API",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-03/0078.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-3975", "ID": "CVE-2013-3975",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21671201",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21671201"
},
{ {
"name": "sametime-cve20133975-info-disc(84855)", "name": "sametime-cve20133975-info-disc(84855)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84855" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84855"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21671201",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21671201"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-4043", "ID": "CVE-2013-4043",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21661169", "name": "ibm-spss-cve20134043-content(86419)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21661169" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86419"
}, },
{ {
"name": "PI07828", "name": "PI07828",
@ -63,9 +63,9 @@
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI07828" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI07828"
}, },
{ {
"name" : "ibm-spss-cve20134043-content(86419)", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21661169",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/86419" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21661169"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4542", "ID": "CVE-2013-4542",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "RHSA-2014:0743",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0743.html"
},
{ {
"name": "[Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released", "name": "[Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released",
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html" "url": "http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html"
}, },
{
"name": "RHSA-2014:0744",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-0744.html"
},
{ {
"name": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=3c3ce981423e0d6c18af82ee62f1850c2cda5976", "name": "http://git.qemu.org/?p=qemu.git;a=commitdiff;h=3c3ce981423e0d6c18af82ee62f1850c2cda5976",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -66,16 +76,6 @@
"name": "FEDORA-2014-6288", "name": "FEDORA-2014-6288",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html"
},
{
"name" : "RHSA-2014:0743",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0743.html"
},
{
"name" : "RHSA-2014:0744",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-0744.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2013-4804", "ID": "CVE-2013-4804",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,12 +53,12 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBMU02901", "name": "SSRT101197",
"refsource": "HP", "refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03844594" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03844594"
}, },
{ {
"name" : "SSRT101197", "name": "HPSBMU02901",
"refsource": "HP", "refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03844594" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03844594"
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-5050", "ID": "CVE-2013-5050",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID": "CVE-2013-5175", "ID": "CVE-2013-5175",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-asa" "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-asa"
}, },
{
"name" : "101165",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101165"
},
{ {
"name": "1039503", "name": "1039503",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039503" "url": "http://www.securitytracker.com/id/1039503"
},
{
"name": "101165",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101165"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-cpcp", "name": "1039711",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-cpcp" "url": "http://www.securitytracker.com/id/1039711"
}, },
{ {
"name": "101640", "name": "101640",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/101640" "url": "http://www.securityfocus.com/bid/101640"
}, },
{ {
"name" : "1039711", "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-cpcp",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1039711" "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-cpcp"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1", "name": "https://rt.perl.org/Public/Bug/Display.html?id=131665",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1" "url": "https://rt.perl.org/Public/Bug/Display.html?id=131665"
}, },
{ {
"name": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1", "name": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1",
@ -63,9 +63,9 @@
"url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1" "url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1"
}, },
{ {
"name" : "https://rt.perl.org/Public/Bug/Display.html?id=131665", "name": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url" : "https://rt.perl.org/Public/Bug/Display.html?id=131665" "url": "https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1"
}, },
{ {
"name": "https://security.netapp.com/advisory/ntap-20180426-0001/", "name": "https://security.netapp.com/advisory/ntap-20180426-0001/",

View File

@ -52,6 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://support.apple.com/HT208225",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208225"
},
{
"name": "https://support.apple.com/HT208222",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208222"
},
{ {
"name": "43175", "name": "43175",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -62,26 +72,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT208219" "url": "https://support.apple.com/HT208219"
}, },
{
"name" : "https://support.apple.com/HT208222",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208222"
},
{
"name" : "https://support.apple.com/HT208223",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208223"
},
{ {
"name": "https://support.apple.com/HT208224", "name": "https://support.apple.com/HT208224",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://support.apple.com/HT208224" "url": "https://support.apple.com/HT208224"
}, },
{
"name" : "https://support.apple.com/HT208225",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208225"
},
{ {
"name": "GLSA-201712-01", "name": "GLSA-201712-01",
"refsource": "GENTOO", "refsource": "GENTOO",
@ -91,6 +86,11 @@
"name": "1039703", "name": "1039703",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039703" "url": "http://www.securitytracker.com/id/1039703"
},
{
"name": "https://support.apple.com/HT208223",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208223"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "43295",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/43295/"
},
{ {
"name": "https://packetstormsecurity.com/files/145338/Readymade-PHP-Classified-Script-3.3-SQL-Injection.html", "name": "https://packetstormsecurity.com/files/145338/Readymade-PHP-Classified-Script-3.3-SQL-Injection.html",
"refsource": "MISC", "refsource": "MISC",
"url": "https://packetstormsecurity.com/files/145338/Readymade-PHP-Classified-Script-3.3-SQL-Injection.html" "url": "https://packetstormsecurity.com/files/145338/Readymade-PHP-Classified-Script-3.3-SQL-Injection.html"
},
{
"name": "43295",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43295/"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4274", "ID": "CVE-2017-4274",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4449", "ID": "CVE-2017-4449",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4597", "ID": "CVE-2017-4597",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4638", "ID": "CVE-2017-4638",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4840", "ID": "CVE-2017-4840",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/",
"refsource" : "CONFIRM",
"url" : "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/"
},
{ {
"name": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51113", "name": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51113",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51113" "url": "https://gitlab.com/gitlab-org/gitlab-ce/issues/51113"
},
{
"name": "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/",
"refsource": "CONFIRM",
"url": "https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/"
} }
] ]
} }

View File

@ -76,15 +76,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10731379",
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10731379"
},
{ {
"name": "ibm-sterling-cve20181800-info-disc(149607)", "name": "ibm-sterling-cve20181800-info-disc(149607)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/149607" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/149607"
},
{
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10731379",
"refsource": "CONFIRM",
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10731379"
} }
] ]
} }