"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:43:39 +00:00
parent 24e79b9c96
commit 791e172033
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
60 changed files with 4005 additions and 4005 deletions

View File

@ -53,49 +53,9 @@
"references": {
"reference_data": [
{
"name" : "20080318 Multiple Vendor CUPS CGI Heap Overflow Vulnerability",
"refsource" : "IDEFENSE",
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=307562",
"refsource" : "CONFIRM",
"url" : "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name" : "APPLE-SA-2008-03-18",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name" : "DSA-1530",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1530"
},
{
"name" : "FEDORA-2008-2131",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00091.html"
},
{
"name" : "FEDORA-2008-2897",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html"
},
{
"name" : "GLSA-200804-01",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-200804-01.xml"
},
{
"name" : "MDVSA-2008:081",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081"
},
{
"name" : "RHSA-2008:0192",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0192.html"
"name": "29485",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29485"
},
{
"name": "SUSE-SA:2008:015",
@ -103,15 +63,55 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00005.html"
},
{
"name" : "USN-598-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-598-1"
"name": "29573",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29573"
},
{
"name": "ADV-2008-0921",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0921/references"
},
{
"name": "TA08-079A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html"
},
{
"name": "1019646",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019646"
},
{
"name": "ADV-2008-0924",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0924/references"
},
{
"name": "FEDORA-2008-2131",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00091.html"
},
{
"name": "USN-598-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-598-1"
},
{
"name": "MDVSA-2008:081",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081"
},
{
"name": "29420",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29420"
},
{
"name": "APPLE-SA-2008-03-18",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
},
{
"name": "28307",
"refsource": "BID",
@ -123,24 +123,9 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10085"
},
{
"name" : "ADV-2008-0921",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0921/references"
},
{
"name" : "ADV-2008-0924",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0924/references"
},
{
"name" : "1019646",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019646"
},
{
"name" : "29431",
"name": "29750",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/29431"
"url": "http://secunia.com/advisories/29750"
},
{
"name": "29448",
@ -148,39 +133,54 @@
"url": "http://secunia.com/advisories/29448"
},
{
"name" : "29420",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29420"
},
{
"name" : "29485",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29485"
"name": "FEDORA-2008-2897",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html"
},
{
"name": "29634",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29634"
},
{
"name" : "29573",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29573"
},
{
"name" : "29603",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29603"
},
{
"name": "29655",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29655"
},
{
"name" : "29750",
"name": "http://docs.info.apple.com/article.html?artnum=307562",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=307562"
},
{
"name": "29431",
"refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/29750"
"url": "http://secunia.com/advisories/29431"
},
{
"name": "20080318 Multiple Vendor CUPS CGI Heap Overflow Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674"
},
{
"name": "DSA-1530",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1530"
},
{
"name": "RHSA-2008:0192",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html"
},
{
"name": "GLSA-200804-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200804-01.xml"
},
{
"name": "29603",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29603"
}
]
}

View File

@ -53,25 +53,25 @@
"references": {
"reference_data": [
{
"name" : "http://www-1.ibm.com/support/docview.wss?uid=swg27011539",
"refsource" : "CONFIRM",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg27011539"
"name": "ADV-2008-0086",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0086"
},
{
"name": "27215",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27215"
},
{
"name" : "ADV-2008-0086",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0086"
},
{
"name": "28411",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28411"
},
{
"name": "http://www-1.ibm.com/support/docview.wss?uid=swg27011539",
"refsource": "CONFIRM",
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg27011539"
},
{
"name": "lotus-domino-unspecified-dos(39588)",
"refsource": "XF",

View File

@ -58,29 +58,29 @@
"url": "http://www.securityfocus.com/archive/1/487956/100/0/threaded"
},
{
"name" : "http://aluigi.altervista.org/adv/lstnpsx-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/lstnpsx-adv.txt"
"name": "28890",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28890"
},
{
"name": "27732",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27732"
},
{
"name" : "ADV-2008-0500",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/0500"
},
{
"name" : "28890",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/28890"
},
{
"name": "networkprintserver-logging-format-string(40420)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40420"
},
{
"name": "http://aluigi.altervista.org/adv/lstnpsx-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/lstnpsx-adv.txt"
},
{
"name": "ADV-2008-0500",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0500"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20080215 joomla SQL Injection(com_salesrep)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488267/100/0/threaded"
"name": "salesrep-index-sql-injection(40619)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40619"
},
{
"name": "27827",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27827"
},
{
"name": "20080215 joomla SQL Injection(com_salesrep)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488267/100/0/threaded"
},
{
"name": "3678",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3678"
},
{
"name" : "salesrep-index-sql-injection(40619)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/40619"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-0892",
"STATE": "PUBLIC"
},
@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=437301",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=437301"
},
{
"name" : "FEDORA-2008-3214",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html"
"name": "rhds-replmonitor-command-execution(41840)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41840"
},
{
"name": "FEDORA-2008-3220",
@ -72,6 +67,21 @@
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01433676"
},
{
"name": "30114",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30114"
},
{
"name": "1019856",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019856"
},
{
"name": "28802",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28802"
},
{
"name": "SSRT080034",
"refsource": "HP",
@ -83,14 +93,9 @@
"url": "http://www.redhat.com/support/errata/RHSA-2008-0201.html"
},
{
"name" : "RHSA-2008:0199",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0199.html"
},
{
"name" : "28802",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/28802"
"name": "FEDORA-2008-3214",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00380.html"
},
{
"name": "ADV-2008-1449",
@ -98,9 +103,9 @@
"url": "http://www.vupen.com/english/advisories/2008/1449/references"
},
{
"name" : "1019856",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019856"
"name": "RHSA-2008:0199",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0199.html"
},
{
"name": "29761",
@ -113,14 +118,9 @@
"url": "http://secunia.com/advisories/29826"
},
{
"name" : "30114",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30114"
},
{
"name" : "rhds-replmonitor-command-execution(41840)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41840"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=437301",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=437301"
}
]
}

View File

@ -53,29 +53,29 @@
"references": {
"reference_data": [
{
"name" : "5314",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5314"
"name": "29508",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29508"
},
{
"name": "http://www.offensive-security.com/0day/sourceforge-tftpd.py.txt",
"refsource": "MISC",
"url": "http://www.offensive-security.com/0day/sourceforge-tftpd.py.txt"
},
{
"name": "tftpserver-filename-bo(41496)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41496"
},
{
"name": "28462",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28462"
},
{
"name" : "29508",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/29508"
},
{
"name" : "tftpserver-filename-bo(41496)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41496"
"name": "5314",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5314"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "6007",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6007"
},
{
"name" : "30095",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30095"
},
{
"name": "30946",
"refsource": "SECUNIA",
@ -71,6 +61,16 @@
"name": "kasselercms-index-xss(43604)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43604"
},
{
"name": "30095",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30095"
},
{
"name": "6007",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6007"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT3298",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3298"
},
{
"name" : "http://support.apple.com/kb/HT3338",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3338"
},
{
"name": "http://support.apple.com/kb/HT3639",
"refsource": "CONFIRM",
@ -73,49 +63,59 @@
"url": "http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html"
},
{
"name" : "APPLE-SA-2008-12-15",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"
},
{
"name" : "APPLE-SA-2009-06-17-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"name" : "TA08-350A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-350A.html"
},
{
"name" : "32291",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32291"
},
{
"name" : "1021225",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021225"
},
{
"name" : "32706",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32706"
"name": "ADV-2009-1621",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"name": "ADV-2008-3444",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3444"
},
{
"name": "TA08-350A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-350A.html"
},
{
"name": "33179",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33179"
},
{
"name" : "ADV-2009-1621",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/1621"
"name": "1021225",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021225"
},
{
"name": "APPLE-SA-2009-06-17-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"name": "32706",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32706"
},
{
"name": "32291",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32291"
},
{
"name": "http://support.apple.com/kb/HT3338",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3338"
},
{
"name": "http://support.apple.com/kb/HT3298",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3298"
},
{
"name": "APPLE-SA-2008-12-15",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html"
}
]
}

View File

@ -57,16 +57,16 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6216"
},
{
"name" : "30621",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30621"
},
{
"name": "4159",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4159"
},
{
"name": "30621",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30621"
},
{
"name": "jcomsoft-anigif-readgif-readgif2-bo(44412)",
"refsource": "XF",

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "6249",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6249"
},
{
"name" : "30711",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30711"
"name": "zeejobsite-bannerclick-sql-injection(44500)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44500"
},
{
"name": "31515",
@ -73,9 +68,14 @@
"url": "http://securityreason.com/securityalert/4162"
},
{
"name" : "zeejobsite-bannerclick-sql-injection(44500)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44500"
"name": "6249",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6249"
},
{
"name": "30711",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30711"
}
]
}

View File

@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495968",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495968"
},
{
"name": "[oss-security] 20080826 Re: CVE Request (gpicview)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/08/26/10"
},
{
"name": "http://sourceforge.net/tracker/index.php?func=detail&aid=2019481&group_id=180858&atid=894869",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/tracker/index.php?func=detail&aid=2019481&group_id=180858&atid=894869"
},
{
"name": "[oss-security] 20080825 CVE Request (gpicview)",
"refsource": "MLIST",
@ -62,25 +77,10 @@
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/08/26/5"
},
{
"name" : "[oss-security] 20080826 Re: CVE Request (gpicview)",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/08/26/10"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495968",
"refsource" : "CONFIRM",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495968"
},
{
"name": "http://lxde.svn.sourceforge.net/viewvc/lxde?view=rev&sortby=date&revision=845",
"refsource": "CONFIRM",
"url": "http://lxde.svn.sourceforge.net/viewvc/lxde?view=rev&sortby=date&revision=845"
},
{
"name" : "http://sourceforge.net/tracker/index.php?func=detail&aid=2019481&group_id=180858&atid=894869",
"refsource" : "CONFIRM",
"url" : "http://sourceforge.net/tracker/index.php?func=detail&aid=2019481&group_id=180858&atid=894869"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20080911 CVE request for Joomla multiple vuln.",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=122118210029084&w=2"
},
{
"name" : "[oss-security] 20080911 CVE request: joomla < 1.5.7",
"refsource" : "MLIST",
"url" : "http://marc.info/?l=oss-security&m=122115344915232&w=2"
},
{
"name": "[oss-security] 20080916 Re: CVE request: joomla < 1.5.7",
"refsource": "MLIST",
@ -72,16 +62,16 @@
"refsource": "CONFIRM",
"url": "http://developer.joomla.org/security/news/271-20080901-core-jrequest-variable-injection.html"
},
{
"name" : "1020843",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1020843"
},
{
"name": "31789",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31789"
},
{
"name": "[oss-security] 20080911 CVE request: joomla < 1.5.7",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=122115344915232&w=2"
},
{
"name": "4275",
"refsource": "SREASON",
@ -91,6 +81,16 @@
"name": "joomla-jrequest-command-execution(45069)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45069"
},
{
"name": "[oss-security] 20080911 CVE request for Joomla multiple vuln.",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security&m=122118210029084&w=2"
},
{
"name": "1020843",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1020843"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "6423",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6423"
"name": "zanficmslite-page-sql-injection(45029)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45029"
},
{
"name": "31116",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31116"
},
{
"name": "6423",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6423"
},
{
"name": "4283",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4283"
},
{
"name" : "zanficmslite-page-sql-injection(45029)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45029"
}
]
}

View File

@ -53,35 +53,35 @@
"references": {
"reference_data": [
{
"name" : "http://support.apple.com/kb/HT3318",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT3318"
"name": "1021271",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021271"
},
{
"name": "APPLE-SA-2008-11-20",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008/Nov/msg00002.html"
},
{
"name" : "32394",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32394"
},
{
"name": "ADV-2008-3232",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3232"
},
{
"name": "http://support.apple.com/kb/HT3318",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3318"
},
{
"name": "32394",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32394"
},
{
"name": "50025",
"refsource": "OSVDB",
"url": "http://osvdb.org/50025"
},
{
"name" : "1021271",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021271"
},
{
"name": "32756",
"refsource": "SECUNIA",

View File

@ -53,25 +53,15 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20081006 CVE request: kernel: sctp: Fix kernel panic while process protocol violation parameter",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/10/06/1"
"name": "32998",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32998"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=ba0166708ef4da7eeb61dd92bbba4d5a749d6561",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=ba0166708ef4da7eeb61dd92bbba4d5a749d6561"
},
{
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27",
"refsource" : "CONFIRM",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27"
},
{
"name" : "DSA-1681",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2008/dsa-1681"
},
{
"name": "RHSA-2009:0009",
"refsource": "REDHAT",
@ -83,14 +73,14 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00010.html"
},
{
"name" : "USN-679-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-679-1"
"name": "33586",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33586"
},
{
"name" : "31848",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31848"
"name": "[oss-security] 20081006 CVE request: kernel: sctp: Fix kernel panic while process protocol violation parameter",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/10/06/1"
},
{
"name": "32918",
@ -98,14 +88,24 @@
"url": "http://secunia.com/advisories/32918"
},
{
"name" : "32998",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32998"
"name": "USN-679-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-679-1"
},
{
"name" : "33586",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33586"
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27"
},
{
"name": "31848",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31848"
},
{
"name": "DSA-1681",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1681"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0318",
"refsource" : "CONFIRM",
"url" : "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0318"
},
{
"name" : "https://issues.rpath.com/browse/RPL-2857",
"refsource" : "CONFIRM",
"url" : "https://issues.rpath.com/browse/RPL-2857"
},
{
"name": "32710",
"refsource": "SECUNIA",
@ -71,6 +61,16 @@
"name": "rpath-initscripts-rcsysinit-symlink(46700)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46700"
},
{
"name": "https://issues.rpath.com/browse/RPL-2857",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-2857"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0318",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0318"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-3786",
"STATE": "PUBLIC"
},
@ -52,20 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "95309",
"refsource": "OSVDB",
"url": "http://osvdb.org/95309"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html"
},
{
"name" : "61266",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/61266"
},
{
"name" : "95309",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/95309"
"name": "oracle-cpujuly2013-cve20133786(85696)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85696"
},
{
"name": "oval:org.mitre.oval:def:18562",
@ -73,9 +73,9 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18562"
},
{
"name" : "oracle-cpujuly2013-cve20133786(85696)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/85696"
"name": "61266",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61266"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-3904",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2013-6195",
"STATE": "PUBLIC"
},
@ -58,12 +58,12 @@
"url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03822422"
},
{
"name" : "SSRT101253",
"name": "SSRT101348",
"refsource": "HP",
"url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03822422"
},
{
"name" : "SSRT101348",
"name": "SSRT101253",
"refsource": "HP",
"url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03822422"
}

View File

@ -52,115 +52,115 @@
},
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=294687",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=294687"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=312016",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=312016"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=313005",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=313005"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=314088",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=314088"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=324812",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=324812"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=326860",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=326860"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=328620",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=328620"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=329651",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=329651"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=330222",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=330222"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=330750",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=330750"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=332957",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=332957"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=333885",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=333885"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=334274",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=334274"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=338464",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=338464"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=338532",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=338532"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=338561",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=338561"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=339337",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=339337"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=341220",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=341220"
},
{
"name" : "https://code.google.com/p/chromium/issues/detail?id=344876",
"refsource" : "CONFIRM",
"url" : "https://code.google.com/p/chromium/issues/detail?id=344876"
},
{
"name": "DSA-2883",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2883"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=339337",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=339337"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=314088",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=314088"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=344876",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=344876"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=341220",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=341220"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=313005",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=313005"
},
{
"name": "openSUSE-SU-2014:0327",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00006.html"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=330750",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=330750"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=324812",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=324812"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=294687",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=294687"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=333885",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=333885"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=338561",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=338561"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=328620",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=328620"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=332957",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=332957"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=338532",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=338532"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=326860",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=326860"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=334274",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=334274"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=312016",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=312016"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=329651",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=329651"
},
{
"name": "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=338464",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=338464"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2013-6706",
"STATE": "PUBLIC"
},
@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31950",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=31950"
},
{
"name" : "20131127 Cisco IOS XE Software IP Header Sanity Check Denial of Service Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6706"
},
{
"name": "63979",
"refsource": "BID",
@ -72,11 +62,21 @@
"refsource": "OSVDB",
"url": "http://osvdb.org/100394"
},
{
"name": "20131127 Cisco IOS XE Software IP Header Sanity Check Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-6706"
},
{
"name": "1029407",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029407"
},
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31950",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=31950"
},
{
"name": "55817",
"refsource": "SECUNIA",

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20131126 CVE Request: FFmpeg 2.1 multiple problems",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2013/11/26/7"
},
{
"name" : "[oss-security] 20131208 Re: CVE Request: FFmpeg 2.1 multiple problems",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2013/12/08/3"
},
{
"name" : "http://ffmpeg.org/security.html",
"name": "https://trac.ffmpeg.org/ticket/2898",
"refsource": "CONFIRM",
"url" : "http://ffmpeg.org/security.html"
"url": "https://trac.ffmpeg.org/ticket/2898"
},
{
"name": "https://github.com/FFmpeg/FFmpeg/commit/a1b9004b768bef606ee98d417bceb9392ceb788d",
"refsource": "CONFIRM",
"url": "https://github.com/FFmpeg/FFmpeg/commit/a1b9004b768bef606ee98d417bceb9392ceb788d"
},
{
"name" : "https://trac.ffmpeg.org/ticket/2898",
"refsource" : "CONFIRM",
"url" : "https://trac.ffmpeg.org/ticket/2898"
},
{
"name": "GLSA-201603-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201603-06"
},
{
"name": "http://ffmpeg.org/security.html",
"refsource": "CONFIRM",
"url": "http://ffmpeg.org/security.html"
},
{
"name": "[oss-security] 20131208 Re: CVE Request: FFmpeg 2.1 multiple problems",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2013/12/08/3"
},
{
"name": "[oss-security] 20131126 CVE Request: FFmpeg 2.1 multiple problems",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2013/11/26/7"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://packetstormsecurity.com/files/124444/LiveZilla-5.1.2.0-Insecure-Password-Storage.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/124444/LiveZilla-5.1.2.0-Insecure-Password-Storage.html"
},
{
"name": "http://forums.livezilla.net/index.php?/topic/163-livezilla-changelog/",
"refsource": "CONFIRM",
"url": "http://forums.livezilla.net/index.php?/topic/163-livezilla-changelog/"
},
{
"name": "http://packetstormsecurity.com/files/124444/LiveZilla-5.1.2.0-Insecure-Password-Storage.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/124444/LiveZilla-5.1.2.0-Insecure-Password-Storage.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-7437",
"STATE": "PUBLIC"
},
@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "openSUSE-SU-2015:1909",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00034.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=955808",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=955808"
},
{
"name": "[oss-security] 20150206 potrace: possible heap overflow",
"refsource": "MLIST",
@ -61,16 +71,6 @@
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778646",
"refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778646"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=955808",
"refsource" : "MISC",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=955808"
},
{
"name" : "openSUSE-SU-2015:1909",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-11/msg00034.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name": "1039608",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039608"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://zerodayinitiative.com/advisories/ZDI-17-455",
"refsource" : "MISC",
"url" : "https://zerodayinitiative.com/advisories/ZDI-17-455"
},
{
"name": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "CONFIRM",
"url": "https://www.foxitsoftware.com/support/security-bulletins.php"
},
{
"name": "https://zerodayinitiative.com/advisories/ZDI-17-455",
"refsource": "MISC",
"url": "https://zerodayinitiative.com/advisories/ZDI-17-455"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=22510",
"refsource" : "MISC",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=22510"
"name": "GLSA-201811-17",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-17"
},
{
"name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f425ec6600b69e39eb605f3128806ff688137ea8",
@ -63,9 +63,9 @@
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f425ec6600b69e39eb605f3128806ff688137ea8"
},
{
"name" : "GLSA-201811-17",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201811-17"
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=22510",
"refsource": "MISC",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22510"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@microfocus.com",
"ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2017-09-26T00:00:00",
"ID": "CVE-2017-9273",
"STATE": "PUBLIC"

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20170605 CVE-2017-9375 Qemu: usb: xhci infinite recursive call via xhci_kick_ep",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2017/06/05/2"
},
{
"name": "http://git.qemu.org/?p=qemu.git;a=commit;h=96d87bdda3919bb16f754b3d3fd1227e1f38f13c",
"refsource": "CONFIRM",
"url": "http://git.qemu.org/?p=qemu.git;a=commit;h=96d87bdda3919bb16f754b3d3fd1227e1f38f13c"
},
{
"name": "98915",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98915"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1458744",
"refsource": "CONFIRM",
@ -77,15 +77,15 @@
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2392"
},
{
"name": "[oss-security] 20170605 CVE-2017-9375 Qemu: usb: xhci infinite recursive call via xhci_kick_ep",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/06/05/2"
},
{
"name": "RHSA-2017:2408",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2408"
},
{
"name" : "98915",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/98915"
}
]
}

View File

@ -59,15 +59,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20170921-01--security-notice-for-ca-identity-manager.html",
"refsource" : "CONFIRM",
"url" : "https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20170921-01--security-notice-for-ca-identity-manager.html"
},
{
"name": "100956",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100956"
},
{
"name": "https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20170921-01--security-notice-for-ca-identity-manager.html",
"refsource": "CONFIRM",
"url": "https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20170921-01--security-notice-for-ca-identity-manager.html"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "99300",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99300"
},
{
"name": "USN-3602-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3602-1/"
},
{
"name": "42300",
"refsource": "EXPLOIT-DB",
@ -66,16 +76,6 @@
"name": "DSA-3903",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3903"
},
{
"name" : "USN-3602-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3602-1/"
},
{
"name" : "99300",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99300"
}
]
}

View File

@ -65,15 +65,15 @@
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-webdos"
},
{
"name" : "105397",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/105397"
},
{
"name": "1041737",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041737"
},
{
"name": "105397",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105397"
}
]
},

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "https://www.wireshark.org/security/wnpa-sec-2018-52.html",
"refsource": "MISC",
"url": "https://www.wireshark.org/security/wnpa-sec-2018-52.html"
},
{
"name": "[debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update",
"refsource": "MLIST",
@ -63,14 +68,9 @@
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15130"
},
{
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=c5a65115ebab55cfd5ce0a855c2256e01cab6449",
"refsource" : "MISC",
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=c5a65115ebab55cfd5ce0a855c2256e01cab6449"
},
{
"name" : "https://www.wireshark.org/security/wnpa-sec-2018-52.html",
"refsource" : "MISC",
"url" : "https://www.wireshark.org/security/wnpa-sec-2018-52.html"
"name": "106051",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106051"
},
{
"name": "DSA-4359",
@ -78,9 +78,9 @@
"url": "https://www.debian.org/security/2018/dsa-4359"
},
{
"name" : "106051",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/106051"
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=c5a65115ebab55cfd5ce0a855c2256e01cab6449",
"refsource": "MISC",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=c5a65115ebab55cfd5ce0a855c2256e01cab6449"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-1224",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -76,15 +76,15 @@
},
"references": {
"reference_data": [
{
"name" : "20180711 DSA-2018-084: RSA Identity Governance and Lifecycle Multiple Vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/Jul/46"
},
{
"name": "1041287",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041287"
},
{
"name": "20180711 DSA-2018-084: RSA Identity Governance and Lifecycle Multiple Vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Jul/46"
}
]
},

View File

@ -77,9 +77,9 @@
"references": {
"reference_data": [
{
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10843130",
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10843130"
"name": "ibm-api-cve20181976-info-disc(154031)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/154031"
},
{
"name": "106792",
@ -87,9 +87,9 @@
"url": "http://www.securityfocus.com/bid/106792"
},
{
"name" : "ibm-api-cve20181976-info-disc(154031)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/154031"
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10843130",
"refsource": "CONFIRM",
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10843130"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{
"name": "102996",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102996"
},
{
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html"
},
{
"name": "1040364",
"refsource": "SECTRACK",