mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 10:41:46 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
459af2cf02
commit
870d814698
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20041013 Buffer-overflow in ShixxNOTE 6.net",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=109778648232233&w=2"
|
||||
"name": "12822",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/12822/"
|
||||
},
|
||||
{
|
||||
"name": "11409",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.securityfocus.com/bid/11409"
|
||||
},
|
||||
{
|
||||
"name" : "12822",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/12822/"
|
||||
"name": "20041013 Buffer-overflow in ShixxNOTE 6.net",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=109778648232233&w=2"
|
||||
},
|
||||
{
|
||||
"name": "shixxnote-font-bo(17705)",
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20040408 [waraxe-2004-SA#015 - Multiple vulnerabilities in NukeCalendar v1.1.a]",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=108144168932458&w=2"
|
||||
},
|
||||
{
|
||||
"name": "10082",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/10082"
|
||||
},
|
||||
{
|
||||
"name": "20040408 [waraxe-2004-SA#015 - Multiple vulnerabilities in NukeCalendar v1.1.a]",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=108144168932458&w=2"
|
||||
},
|
||||
{
|
||||
"name": "nukecalendar-modulesphp-sql-injection(15799)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=428727",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=428727"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-0644",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00529.html"
|
||||
},
|
||||
{
|
||||
"name": "paramiko-randompool-info-disclosure(39749)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39749"
|
||||
},
|
||||
{
|
||||
"name": "http://people.debian.org/~nion/nmu-diff/paramiko-1.6.4-1_1.6.4-1.1.patch",
|
||||
"refsource": "MISC",
|
||||
@ -62,41 +77,11 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.lag.net/pipermail/paramiko/2008-January/000599.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=428727",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=428727"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=460706",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=460706"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-0644",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00529.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-0722",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00594.html"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200803-07",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200803-07.xml"
|
||||
},
|
||||
{
|
||||
"name" : "27307",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/27307"
|
||||
},
|
||||
{
|
||||
"name" : "28488",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28488"
|
||||
},
|
||||
{
|
||||
"name": "28510",
|
||||
"refsource": "SECUNIA",
|
||||
@ -108,9 +93,24 @@
|
||||
"url": "http://secunia.com/advisories/29168"
|
||||
},
|
||||
{
|
||||
"name" : "paramiko-randompool-info-disclosure(39749)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39749"
|
||||
"name": "28488",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28488"
|
||||
},
|
||||
{
|
||||
"name": "27307",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27307"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-0722",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00594.html"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=460706",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=460706"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,30 +53,20 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMA02133",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061201",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "TA08-017A",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
|
||||
"name": "1019218",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1019218"
|
||||
},
|
||||
{
|
||||
"name": "27229",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/27229"
|
||||
},
|
||||
{
|
||||
"name": "TA08-017A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA08-017A.html"
|
||||
},
|
||||
{
|
||||
"name": "ADV-2008-0150",
|
||||
"refsource": "VUPEN",
|
||||
@ -88,19 +78,29 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2008/0180"
|
||||
},
|
||||
{
|
||||
"name" : "1019218",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://securitytracker.com/id?1019218"
|
||||
"name": "SSRT061201",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "28518",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/28518"
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2008-086860.html"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMA02133",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=120058413923005&w=2"
|
||||
},
|
||||
{
|
||||
"name": "28556",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28556"
|
||||
},
|
||||
{
|
||||
"name": "28518",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/28518"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://community.mybboard.net/attachment.php?aid=9272"
|
||||
},
|
||||
{
|
||||
"name" : "http://community.mybboard.net/showthread.php?tid=31666",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://community.mybboard.net/showthread.php?tid=31666"
|
||||
},
|
||||
{
|
||||
"name": "31013",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31013"
|
||||
},
|
||||
{
|
||||
"name": "http://community.mybboard.net/showthread.php?tid=31666",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://community.mybboard.net/showthread.php?tid=31666"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20080710 CVE request: multiple drupal issues in < 6.3,5.8",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2008/07/10/3"
|
||||
"name": "30168",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30168"
|
||||
},
|
||||
{
|
||||
"name": "http://drupal.org/node/280571",
|
||||
@ -67,26 +67,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=454849"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-6411",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00551.html"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2008-6415",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00527.html"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-6916",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00016.html"
|
||||
},
|
||||
{
|
||||
"name" : "30168",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/30168"
|
||||
},
|
||||
{
|
||||
"name": "31079",
|
||||
"refsource": "SECUNIA",
|
||||
@ -96,6 +81,21 @@
|
||||
"name": "openid-unspecified-csrf(43702)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43702"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-6415",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00527.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20080710 CVE request: multiple drupal issues in < 6.3,5.8",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/07/10/3"
|
||||
},
|
||||
{
|
||||
"name": "FEDORA-2008-6411",
|
||||
"refsource": "FEDORA",
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00551.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,35 +57,35 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21255607"
|
||||
},
|
||||
{
|
||||
"name" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT"
|
||||
},
|
||||
{
|
||||
"name": "IZ12379",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IZ12379"
|
||||
},
|
||||
{
|
||||
"name" : "IZ12406",
|
||||
"refsource" : "AIXAPAR",
|
||||
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ12406"
|
||||
"name": "ibm-db2-das-bo(45141)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45141"
|
||||
},
|
||||
{
|
||||
"name": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT"
|
||||
},
|
||||
{
|
||||
"name": "29601",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/29601"
|
||||
},
|
||||
{
|
||||
"name": "IZ12406",
|
||||
"refsource": "AIXAPAR",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ12406"
|
||||
},
|
||||
{
|
||||
"name": "29784",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/29784"
|
||||
},
|
||||
{
|
||||
"name" : "ibm-db2-das-bo(45141)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45141"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2008-4189",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://packetstormsecurity.org/0809-exploits/phpportfolio-sql.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.org/0809-exploits/phpportfolio-sql.txt"
|
||||
},
|
||||
{
|
||||
"name": "31143",
|
||||
"refsource": "BID",
|
||||
@ -67,6 +62,11 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/31828"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.org/0809-exploits/phpportfolio-sql.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.org/0809-exploits/phpportfolio-sql.txt"
|
||||
},
|
||||
{
|
||||
"name": "phportfolio-photo-sql-injection(45078)",
|
||||
"refsource": "XF",
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6602",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6602"
|
||||
"name": "4475",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4475"
|
||||
},
|
||||
{
|
||||
"name": "31457",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31457"
|
||||
},
|
||||
{
|
||||
"name": "6602",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6602"
|
||||
},
|
||||
{
|
||||
"name": "32033",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/32033"
|
||||
},
|
||||
{
|
||||
"name" : "4475",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4475"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,31 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.opera.com/support/search/view/906/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.opera.com/support/search/view/906/"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200811-01",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-200811-01.xml"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SR:2008:023",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name" : "31991",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/31991"
|
||||
},
|
||||
{
|
||||
"name" : "1021128",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1021128"
|
||||
},
|
||||
{
|
||||
"name": "32538",
|
||||
"refsource": "SECUNIA",
|
||||
@ -86,6 +61,31 @@
|
||||
"name": "opera-historysearch-command-execution(46219)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46219"
|
||||
},
|
||||
{
|
||||
"name": "1021128",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1021128"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SR:2008:023",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.opera.com/support/search/view/906/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.opera.com/support/search/view/906/"
|
||||
},
|
||||
{
|
||||
"name": "31991",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/31991"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200811-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200811-01.xml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,30 +57,30 @@
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/10/30/2"
|
||||
},
|
||||
{
|
||||
"name" : "http://uvw.ru/report.lenny.txt",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://uvw.ru/report.lenny.txt"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.debian.org/496399",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.debian.org/496399"
|
||||
},
|
||||
{
|
||||
"name" : "http://dev.gentoo.org/~rbu/security/debiantemp/digitaldj",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://dev.gentoo.org/~rbu/security/debiantemp/digitaldj"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.gentoo.org/show_bug.cgi?id=235770",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.gentoo.org/show_bug.cgi?id=235770"
|
||||
},
|
||||
{
|
||||
"name": "http://uvw.ru/report.lenny.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://uvw.ru/report.lenny.txt"
|
||||
},
|
||||
{
|
||||
"name": "30904",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/30904"
|
||||
},
|
||||
{
|
||||
"name": "http://dev.gentoo.org/~rbu/security/debiantemp/digitaldj",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://dev.gentoo.org/~rbu/security/debiantemp/digitaldj"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "6967",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/6967"
|
||||
},
|
||||
{
|
||||
"name": "6971",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6971"
|
||||
},
|
||||
{
|
||||
"name": "6967",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/6967"
|
||||
},
|
||||
{
|
||||
"name": "32076",
|
||||
"refsource": "BID",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "33247",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33247"
|
||||
},
|
||||
{
|
||||
"name": "7531",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -62,20 +67,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32954"
|
||||
},
|
||||
{
|
||||
"name" : "51706",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://osvdb.org/51706"
|
||||
},
|
||||
{
|
||||
"name" : "33247",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33247"
|
||||
},
|
||||
{
|
||||
"name": "revou-index-file-upload(47500)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47500"
|
||||
},
|
||||
{
|
||||
"name": "51706",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://osvdb.org/51706"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2008-6800",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7071",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7071"
|
||||
},
|
||||
{
|
||||
"name" : "32220",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/32220"
|
||||
"name": "ADV-2008-3064",
|
||||
"refsource": "VUPEN",
|
||||
"url": "http://www.vupen.com/english/advisories/2008/3064"
|
||||
},
|
||||
{
|
||||
"name": "27638",
|
||||
@ -68,14 +63,19 @@
|
||||
"url": "http://secunia.com/advisories/27638"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2008-3064",
|
||||
"refsource" : "VUPEN",
|
||||
"url" : "http://www.vupen.com/english/advisories/2008/3064"
|
||||
"name": "7071",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7071"
|
||||
},
|
||||
{
|
||||
"name": "exophpdesk-admin-sql-injection(46493)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46493"
|
||||
},
|
||||
{
|
||||
"name": "32220",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/32220"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-2141",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,26 +52,26 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[oss-security] 20130604 Re: CVE Request: kernel info leak in tkill/tgkill",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2013/06/04/10"
|
||||
},
|
||||
{
|
||||
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=970873",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=970873"
|
||||
},
|
||||
{
|
||||
"name": "USN-1899-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1899-1"
|
||||
},
|
||||
{
|
||||
"name": "MDVSA-2013:176",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130604 Re: CVE Request: kernel info leak in tkill/tgkill",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2013/06/04/10"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/torvalds/linux/commit/b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f",
|
||||
"refsource": "CONFIRM",
|
||||
@ -83,14 +83,9 @@
|
||||
"url": "http://www.debian.org/security/2013/dsa-2766"
|
||||
},
|
||||
{
|
||||
"name" : "MDVSA-2013:176",
|
||||
"refsource" : "MANDRIVA",
|
||||
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:176"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2013:1801",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1801.html"
|
||||
"name": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2013:1971",
|
||||
@ -98,19 +93,24 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1899-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1899-1"
|
||||
},
|
||||
{
|
||||
"name" : "USN-1900-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1900-1"
|
||||
"name": "RHSA-2013:1801",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1801.html"
|
||||
},
|
||||
{
|
||||
"name": "55055",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/55055"
|
||||
},
|
||||
{
|
||||
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f"
|
||||
},
|
||||
{
|
||||
"name": "USN-1900-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "http://www.ubuntu.com/usn/USN-1900-1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2013-2218",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=980112",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=980112"
|
||||
},
|
||||
{
|
||||
"name": "http://libvirt.org/news.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://libvirt.org/news.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20130701 CVE-2013-2218 -- libvirt: crash when listing network interfaces with filters",
|
||||
"refsource": "MLIST",
|
||||
@ -61,16 +71,6 @@
|
||||
"name": "http://libvirt.org/git/?p=libvirt.git;a=commit;h=244e0b8cf15ca2ef48d82058e728656e6c4bad11",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://libvirt.org/git/?p=libvirt.git;a=commit;h=244e0b8cf15ca2ef48d82058e728656e6c4bad11"
|
||||
},
|
||||
{
|
||||
"name" : "http://libvirt.org/news.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://libvirt.org/news.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=980112",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=980112"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "hp-security-alert@hp.com",
|
||||
"ID": "CVE-2013-2332",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,7 +53,7 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "HPSBMU02883",
|
||||
"name": "SSRT101227",
|
||||
"refsource": "HP",
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03781657"
|
||||
},
|
||||
@ -63,7 +63,7 @@
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03781657"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT101227",
|
||||
"name": "HPSBMU02883",
|
||||
"refsource": "HP",
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03781657"
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2013-2868",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -53,14 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=commit;h=84ece2d5af0e6f746ca63e483e2dbdbcab8b1e6c",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=commit;h=84ece2d5af0e6f746ca63e483e2dbdbcab8b1e6c"
|
||||
},
|
||||
{
|
||||
"name" : "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html"
|
||||
"name": "oval:org.mitre.oval:def:17347",
|
||||
"refsource": "OVAL",
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17347"
|
||||
},
|
||||
{
|
||||
"name": "https://code.google.com/p/chromium/issues/detail?id=252034",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://www.debian.org/security/2013/dsa-2724"
|
||||
},
|
||||
{
|
||||
"name" : "oval:org.mitre.oval:def:17347",
|
||||
"refsource" : "OVAL",
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17347"
|
||||
"name": "http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=commit;h=84ece2d5af0e6f746ca63e483e2dbdbcab8b1e6c",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=commit;h=84ece2d5af0e6f746ca63e483e2dbdbcab8b1e6c"
|
||||
},
|
||||
{
|
||||
"name": "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://kb.isc.org/article/AA-01062",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kb.isc.org/article/AA-01062"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.isc.org/article/AA-01063",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "SSA:2014-175-01",
|
||||
"refsource": "SLACKWARE",
|
||||
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.518391"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.isc.org/article/AA-01062",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.isc.org/article/AA-01062"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,34 +53,34 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "30396",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "http://www.exploit-db.com/exploits/30396"
|
||||
},
|
||||
{
|
||||
"name" : "20131212 Ditto Forensic FieldStation, multiple vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2013/Dec/80"
|
||||
},
|
||||
{
|
||||
"name" : "http://packetstormsecurity.com/files/124420/Ditto-Forensic-FieldStation-2013Oct15a-XSS-CSRF-Command-Execution.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://packetstormsecurity.com/files/124420/Ditto-Forensic-FieldStation-2013Oct15a-XSS-CSRF-Command-Execution.html"
|
||||
"name": "55989",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/55989"
|
||||
},
|
||||
{
|
||||
"name": "http://www.cru-inc.com/support/software-downloads/ditto-firmware-updates/ditto-firmware-release-notes-2013jun30a/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.cru-inc.com/support/software-downloads/ditto-firmware-updates/ditto-firmware-release-notes-2013jun30a/"
|
||||
},
|
||||
{
|
||||
"name": "http://packetstormsecurity.com/files/124420/Ditto-Forensic-FieldStation-2013Oct15a-XSS-CSRF-Command-Execution.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://packetstormsecurity.com/files/124420/Ditto-Forensic-FieldStation-2013Oct15a-XSS-CSRF-Command-Execution.html"
|
||||
},
|
||||
{
|
||||
"name": "20131212 Ditto Forensic FieldStation, multiple vulnerabilities",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2013/Dec/80"
|
||||
},
|
||||
{
|
||||
"name": "30396",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "http://www.exploit-db.com/exploits/30396"
|
||||
},
|
||||
{
|
||||
"name": "http://www.cru-inc.com/support/software-downloads/ditto-firmware-updates/ditto-firmware-release-notes-2013oct15a/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.cru-inc.com/support/software-downloads/ditto-firmware-updates/ditto-firmware-release-notes-2013oct15a/"
|
||||
},
|
||||
{
|
||||
"name" : "55989",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/55989"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1039598",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1039598"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "101476",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101476"
|
||||
},
|
||||
{
|
||||
"name" : "1039598",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1039598"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://seclists.org/fulldisclosure/2017/Jul/77",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2017/Jul/77"
|
||||
},
|
||||
{
|
||||
"name": "https://sourceforge.net/p/openexif/bugs/18/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://sourceforge.net/p/openexif/bugs/18/"
|
||||
},
|
||||
{
|
||||
"name": "http://seclists.org/fulldisclosure/2017/Jul/77",
|
||||
"refsource": "MISC",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/77"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://crushftp.com/version7.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://crushftp.com/version7.html"
|
||||
},
|
||||
{
|
||||
"name": "https://crushftp.com/version8.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://crushftp.com/version8.html"
|
||||
},
|
||||
{
|
||||
"name": "https://crushftp.com/version7.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://crushftp.com/version7.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://seclists.org/fulldisclosure/2017/Oct/68",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://seclists.org/fulldisclosure/2017/Oct/68"
|
||||
},
|
||||
{
|
||||
"name": "101626",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/101626"
|
||||
},
|
||||
{
|
||||
"name": "http://seclists.org/fulldisclosure/2017/Oct/68",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Oct/68"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://blogs.gentoo.org/ago/2017/06/17/lame-stack-based-buffer-overflow-in-iii_i_stereo-layer3-c/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://blogs.gentoo.org/ago/2017/06/17/lame-stack-based-buffer-overflow-in-iii_i_stereo-layer3-c/"
|
||||
},
|
||||
{
|
||||
"name": "99289",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99289"
|
||||
},
|
||||
{
|
||||
"name": "https://blogs.gentoo.org/ago/2017/06/17/lame-stack-based-buffer-overflow-in-iii_i_stereo-layer3-c/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://blogs.gentoo.org/ago/2017/06/17/lame-stack-based-buffer-overflow-in-iii_i_stereo-layer3-c/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma"
|
||||
},
|
||||
{
|
||||
"name" : "102729",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/102729"
|
||||
},
|
||||
{
|
||||
"name": "1040221",
|
||||
"refsource": "SECTRACK",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "1040222",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1040222"
|
||||
},
|
||||
{
|
||||
"name": "102729",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102729"
|
||||
},
|
||||
{
|
||||
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -60,25 +60,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20180926 Cisco IOS XE Software and Cisco ASA 5500-X Series Adaptive Security Appliance IPsec Denial of Service Vulnerability",
|
||||
"refsource" : "CISCO",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ipsec"
|
||||
},
|
||||
{
|
||||
"name": "105418",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105418"
|
||||
},
|
||||
{
|
||||
"name": "1041737",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041737"
|
||||
},
|
||||
{
|
||||
"name": "1041735",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041735"
|
||||
},
|
||||
{
|
||||
"name" : "1041737",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041737"
|
||||
"name": "20180926 Cisco IOS XE Software and Cisco ASA 5500-X Series Adaptive Security Appliance IPsec Denial of Service Vulnerability",
|
||||
"refsource": "CISCO",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ipsec"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.cybozu.com/ja-jp/article/10058",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.cybozu.com/ja-jp/article/10058"
|
||||
},
|
||||
{
|
||||
"name": "JVN#65268217",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN65268217/index.html"
|
||||
},
|
||||
{
|
||||
"name": "https://support.cybozu.com/ja-jp/article/10058",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.cybozu.com/ja-jp/article/10058"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.au.com/information/notice_mobile/service/2018-002/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.nttdocomo.co.jp/info/notice/page/180927_00.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.nttdocomo.co.jp/info/notice/page/180927_00.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.softbank.jp/mobile/info/personal/news/service/20180927a/",
|
||||
"refsource": "MISC",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "JVN#37288228",
|
||||
"refsource": "JVN",
|
||||
"url": "http://jvn.jp/en/jp/JVN37288228/index.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.nttdocomo.co.jp/info/notice/page/180927_00.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.nttdocomo.co.jp/info/notice/page/180927_00.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-01-19",
|
||||
"ID": "CVE-2018-1000006",
|
||||
"REQUESTER": "phillmv@github.com",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Electron",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "GitHub"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-78"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -60,9 +60,9 @@
|
||||
"url": "https://www.exploit-db.com/exploits/43899/"
|
||||
},
|
||||
{
|
||||
"name" : "44357",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/44357/"
|
||||
"name": "https://github.com/electron/electron/releases/tag/v1.8.2-beta.4",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/electron/electron/releases/tag/v1.8.2-beta.4"
|
||||
},
|
||||
{
|
||||
"name": "https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374",
|
||||
@ -74,15 +74,15 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://electronjs.org/blog/protocol-handler-fix"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/electron/electron/releases/tag/v1.8.2-beta.4",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/electron/electron/releases/tag/v1.8.2-beta.4"
|
||||
},
|
||||
{
|
||||
"name": "102796",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102796"
|
||||
},
|
||||
{
|
||||
"name": "44357",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/44357/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-12-28T04:34:37.683171",
|
||||
"ID": "CVE-2018-1000419",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
@ -13,18 +13,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins HipChat Plugin",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "2.2.0 and earlier"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins project"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-285, CWE-200"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -54,15 +54,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-984%20(2)",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-984%20(2)"
|
||||
},
|
||||
{
|
||||
"name": "106532",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106532"
|
||||
},
|
||||
{
|
||||
"name": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-984%20(2)",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-09-25/#SECURITY-984%20(2)"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-06-25T11:12:00.703611",
|
||||
"DATE_REQUESTED": "2018-06-25T00:00:00",
|
||||
"ID": "CVE-2018-1000604",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "Jenkins Badge Plugin",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "1.4 and earlier"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Jenkins project"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "CWE-79"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"DATE_ASSIGNED": "2018-11-27T13:54:33.466844",
|
||||
"DATE_REQUESTED": "2018-10-28T04:07:12",
|
||||
"ID": "CVE-2018-1000831",
|
||||
@ -14,18 +14,18 @@
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name" : "K9Mail",
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "<= v5.600"
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "K9Mail"
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -47,7 +47,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value" : "XML External Entity (XXE)"
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -55,15 +55,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://0dd.zone/2018/10/28/k9mail-XXE-MitM/",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://0dd.zone/2018/10/28/k9mail-XXE-MitM/"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/k9mail/k-9/issues/3681",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/k9mail/k-9/issues/3681"
|
||||
},
|
||||
{
|
||||
"name": "https://0dd.zone/2018/10/28/k9mail-XXE-MitM/",
|
||||
"refsource": "MISC",
|
||||
"url": "https://0dd.zone/2018/10/28/k9mail-XXE-MitM/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2018-16105",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20180926 [SECURITY] [DLA 1522-1] strongswan security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/09/msg00032.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.strongswan.org/blog/2018/09/24/strongswan-vulnerability-(cve-2018-16151,-cve-2018-16152).html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.strongswan.org/blog/2018/09/24/strongswan-vulnerability-(cve-2018-16151,-cve-2018-16152).html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4305",
|
||||
"refsource": "DEBIAN",
|
||||
@ -72,6 +62,16 @@
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201811-16"
|
||||
},
|
||||
{
|
||||
"name": "https://www.strongswan.org/blog/2018/09/24/strongswan-vulnerability-(cve-2018-16151,-cve-2018-16152).html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.strongswan.org/blog/2018/09/24/strongswan-vulnerability-(cve-2018-16151,-cve-2018-16152).html"
|
||||
},
|
||||
{
|
||||
"name": "[debian-lts-announce] 20180926 [SECURITY] [DLA 1522-1] strongswan security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00032.html"
|
||||
},
|
||||
{
|
||||
"name": "USN-3771-1",
|
||||
"refsource": "UBUNTU",
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://support.apple.com/HT208848",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT208848"
|
||||
},
|
||||
{
|
||||
"name": "1041031",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041031"
|
||||
},
|
||||
{
|
||||
"name": "https://support.apple.com/HT208848",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.apple.com/HT208848"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user