"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:04:26 +00:00
parent 3ccf9564eb
commit 9081ef56ee
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
58 changed files with 3699 additions and 3699 deletions

View File

@ -52,20 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20010112 Trustix Security Advisory - diffutils squid",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-01/0212.html"
},
{
"name": "20010110 Immunix OS Security update for lots of temp file problems",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=97916374410647&w=2"
},
{
"name" : "MDKSA-2001:003",
"refsource" : "MANDRAKE",
"url" : "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-003.php3"
"name": "2184",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2184"
},
{
"name": "DSA-019",
@ -78,9 +73,14 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5921"
},
{
"name" : "2184",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2184"
"name": "MDKSA-2001:003",
"refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-003.php3"
},
{
"name": "20010112 Trustix Security Advisory - diffutils squid",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-01/0212.html"
}
]
}

View File

@ -52,40 +52,20 @@
},
"references": {
"reference_data": [
{
"name" : "MDKSA-2001:012",
"refsource" : "MANDRAKE",
"url" : "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-012.php3?dis=7.2"
},
{
"name": "SuSE-SA:2001:01",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2001_001_glibc_txt.html"
},
{
"name" : "CSSA-2001-007",
"refsource" : "CALDERA",
"url" : "http://www.calderasystems.com/support/security/advisories/CSSA-2001-007.0.txt"
},
{
"name" : "RHSA-2001:002",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2001-002.html"
},
{
"name": "DSA-039",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2001/dsa-039"
},
{
"name" : "TLSA2000021-2",
"refsource" : "TURBO",
"url" : "http://archives.neohapsis.com/archives/linux/turbolinux/2001-q1/0004.html"
},
{
"name" : "20010121 Trustix Security Advisory - glibc",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/157650"
"name": "linux-glibc-preload-overwrite(5971)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5971"
},
{
"name": "2223",
@ -93,9 +73,29 @@
"url": "http://www.securityfocus.com/bid/2223"
},
{
"name" : "linux-glibc-preload-overwrite(5971)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5971"
"name": "20010121 Trustix Security Advisory - glibc",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/157650"
},
{
"name": "MDKSA-2001:012",
"refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-012.php3?dis=7.2"
},
{
"name": "RHSA-2001:002",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2001-002.html"
},
{
"name": "TLSA2000021-2",
"refsource": "TURBO",
"url": "http://archives.neohapsis.com/archives/linux/turbolinux/2001-q1/0004.html"
},
{
"name": "CSSA-2001-007",
"refsource": "CALDERA",
"url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-007.0.txt"
}
]
}

View File

@ -52,15 +52,20 @@
},
"references": {
"reference_data": [
{
"name": "20010409 BINTEC X1200",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=98697054804197&w=2"
},
{
"name": "20010404 BinTec X4000 Access Router DoS Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=98644414226344&w=2"
},
{
"name" : "20010406 X4000 DoS: Details and workaround",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=98659862317070&w=2"
"name": "bintec-x4000-nmap-dos(6323)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6323"
},
{
"name": "20010410 BinTec Router DoS: Workaround and Details",
@ -68,14 +73,9 @@
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0145.html"
},
{
"name" : "20010409 BINTEC X1200",
"name": "20010406 X4000 DoS: Details and workaround",
"refsource": "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=98697054804197&w=2"
},
{
"name" : "bintec-x4000-nmap-dos(6323)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6323"
"url": "http://marc.info/?l=bugtraq&m=98659862317070&w=2"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20010618 Multiple Vulnerabilities In AMLServer",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-06/0228.html"
},
{
"name": "2883",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2883"
},
{
"name": "20010618 Multiple Vulnerabilities In AMLServer",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0228.html"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "CONFIRM",
"url": "http://www.greenepa.net/~averett/cerberus-releasenotes.htm#ReleaseNotes"
},
{
"name" : "http://www.securiteam.com/windowsntfocus/5SP0M0055W.html",
"refsource" : "MISC",
"url" : "http://www.securiteam.com/windowsntfocus/5SP0M0055W.html"
},
{
"name": "cerberus-ftp-directory-traversal(7004)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7004.php"
},
{
"name": "http://www.securiteam.com/windowsntfocus/5SP0M0055W.html",
"refsource": "MISC",
"url": "http://www.securiteam.com/windowsntfocus/5SP0M0055W.html"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "Q241352",
"refsource" : "MSKB",
"url" : "http://support.microsoft.com/default.aspx?scid=KB;en-us;q241352"
},
{
"name" : "VU#109475",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/109475"
"name": "nt-ms-dns-cachepollution(3675)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3675"
},
{
"name": "6791",
@ -68,9 +63,14 @@
"url": "http://www.securityfocus.com/bid/6791"
},
{
"name" : "nt-ms-dns-cachepollution(3675)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/3675"
"name": "VU#109475",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/109475"
},
{
"name": "Q241352",
"refsource": "MSKB",
"url": "http://support.microsoft.com/default.aspx?scid=KB;en-us;q241352"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/01-e.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/01-e.html"
},
{
"name" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/index-e.html",
"refsource" : "CONFIRM",
"url" : "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/index-e.html"
"name": "hitachi-groupmax-client-dos(26099)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26099"
},
{
"name": "JVN#89344424",
@ -68,9 +63,9 @@
"url": "http://jvn.jp/jp/JVN%2389344424/index.html"
},
{
"name" : "ADV-2006-1539",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1539"
"name": "19840",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19840"
},
{
"name": "24969",
@ -78,14 +73,19 @@
"url": "http://www.osvdb.org/24969"
},
{
"name" : "19840",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19840"
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/01-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/01-e.html"
},
{
"name" : "hitachi-groupmax-client-dos(26099)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26099"
"name": "ADV-2006-1539",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1539"
},
{
"name": "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/index-e.html",
"refsource": "CONFIRM",
"url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/index-e.html"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "MISC",
"url": "http://evuln.com/vulns/131/summary.html"
},
{
"name" : "ADV-2006-1603",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1603"
},
{
"name": "19899",
"refsource": "SECUNIA",
@ -71,6 +66,11 @@
"name": "advancedpoll-header-spoofing(26154)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26154"
},
{
"name": "ADV-2006-1603",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1603"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20060608 cms-bandits 2.5, Remote command execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/436430/100/0/threaded"
},
{
"name": "ADV-2006-2211",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/2211"
},
{
"name": "20060608 cms-bandits 2.5, Remote command execution",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/436430/100/0/threaded"
},
{
"name": "26241",
"refsource": "OSVDB",
@ -73,9 +73,9 @@
"url": "http://www.osvdb.org/26242"
},
{
"name" : "20507",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/20507"
"name": "cmsbandits-spawroot-file-include(27001)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27001"
},
{
"name": "1068",
@ -83,9 +83,9 @@
"url": "http://securityreason.com/securityalert/1068"
},
{
"name" : "cmsbandits-spawroot-file-include(27001)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27001"
"name": "20507",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20507"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-devel] 20080811 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages",
"refsource" : "MLIST",
"url" : "http://lists.debian.org/debian-devel/2008/08/msg00285.html"
},
{
"name": "FEDORA-2009-1366",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00187.html"
},
{
"name": "31694",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31694"
},
{
"name": "33825",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33825"
},
{
"name" : "31694",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31694"
"name": "[debian-devel] 20080811 Re: Possible mass bug filing: The possibility of attack with the help of symlinks in some Debian packages",
"refsource": "MLIST",
"url": "http://lists.debian.org/debian-devel/2008/08/msg00285.html"
}
]
}

View File

@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name": "1021493",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021493"
},
{
"name": "20081223 PGP Desktop 9.0.6 Denial Of Service - ZeroDay",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499572/100/0/threaded"
},
{
"name" : "7556",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/7556"
},
{
"name" : "http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service.php",
"refsource" : "MISC",
"url" : "http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service.php"
},
{
"name": "http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service_POC.php",
"refsource": "MISC",
"url": "http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service_POC.php"
},
{
"name": "33310",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33310"
},
{
"name": "7556",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7556"
},
{
"name": "32991",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32991"
},
{
"name": "4811",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4811"
},
{
"name": "50914",
"refsource": "OSVDB",
"url": "http://osvdb.org/50914"
},
{
"name" : "1021493",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021493"
},
{
"name" : "33310",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33310"
},
{
"name" : "4811",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4811"
"name": "http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service.php",
"refsource": "MISC",
"url": "http://www.evilfingers.com/advisory/PGPDesktop_9_0_6_Denial_Of_Service.php"
}
]
}

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MDVSA-2011:059",
"name": "MDVSA-2011:088",
"refsource": "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:059"
},
{
"name" : "MDVSA-2011:060",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:060"
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:088"
},
{
"name": "MDVSA-2011:061",
@ -72,15 +67,20 @@
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:062"
},
{
"name" : "MDVSA-2011:088",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:088"
},
{
"name": "MDVSA-2011:089",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:089"
},
{
"name": "MDVSA-2011:059",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:059"
},
{
"name": "MDVSA-2011:060",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:060"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2196",
"STATE": "PUBLIC"
},
@ -53,25 +53,15 @@
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=712283",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=712283"
},
{
"name" : "RHSA-2011:0945",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0945.html"
"name": "48716",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48716"
},
{
"name": "RHSA-2011:0946",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0946.html"
},
{
"name" : "RHSA-2011:0947",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0947.html"
},
{
"name": "RHSA-2011:0948",
"refsource": "REDHAT",
@ -82,25 +72,35 @@
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0949.html"
},
{
"name" : "RHSA-2011:0950",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0950.html"
},
{
"name": "RHSA-2011:0951",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0951.html"
},
{
"name": "RHSA-2011:0945",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0945.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=712283",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=712283"
},
{
"name": "RHSA-2011:0950",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0950.html"
},
{
"name": "RHSA-2011:0947",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0947.html"
},
{
"name": "RHSA-2011:0952",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0952.html"
},
{
"name" : "48716",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/48716"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2443",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "17918",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/17918/"
},
{
"name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5049.php",
"refsource": "MISC",
"url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5049.php"
},
{
"name": "8410",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8410"
},
{
"name": "http://www.adobe.com/support/security/advisories/apsa11-03.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/advisories/apsa11-03.html"
},
{
"name" : "8410",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/8410"
"name": "17918",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/17918/"
}
]
}

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/software/lotus/symphony/buzz.nsf/web_DisPlayPlugin?open&unid=9717F6F587AAA939852578D300404BCF&category=announcements",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/software/lotus/symphony/buzz.nsf/web_DisPlayPlugin?open&unid=9717F6F587AAA939852578D300404BCF&category=announcements"
},
{
"name" : "http://www.ibm.com/software/lotus/symphony/idcontents/releasenotes/en/readme_fixpack3_standalone_long.htm",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/software/lotus/symphony/idcontents/releasenotes/en/readme_fixpack3_standalone_long.htm"
},
{
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21505448",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21505448"
},
{
"name" : "https://www-304.ibm.com/jct03001c/software/lotus/symphony/idcontents/releasenotes/en/readme_embedded_in_fixpack3_long.htm",
"refsource" : "CONFIRM",
"url" : "https://www-304.ibm.com/jct03001c/software/lotus/symphony/idcontents/releasenotes/en/readme_embedded_in_fixpack3_long.htm"
"name": "lotus-symphony-document-dos(68889)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68889"
},
{
"name": "48936",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48936"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21505448",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21505448"
},
{
"name": "http://www.ibm.com/software/lotus/symphony/buzz.nsf/web_DisPlayPlugin?open&unid=9717F6F587AAA939852578D300404BCF&category=announcements",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/software/lotus/symphony/buzz.nsf/web_DisPlayPlugin?open&unid=9717F6F587AAA939852578D300404BCF&category=announcements"
},
{
"name": "https://www-304.ibm.com/jct03001c/software/lotus/symphony/idcontents/releasenotes/en/readme_embedded_in_fixpack3_long.htm",
"refsource": "CONFIRM",
"url": "https://www-304.ibm.com/jct03001c/software/lotus/symphony/idcontents/releasenotes/en/readme_embedded_in_fixpack3_long.htm"
},
{
"name": "http://www.ibm.com/software/lotus/symphony/idcontents/releasenotes/en/readme_fixpack3_standalone_long.htm",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/software/lotus/symphony/idcontents/releasenotes/en/readme_fixpack3_standalone_long.htm"
},
{
"name": "74163",
"refsource": "OSVDB",
"url": "http://osvdb.org/74163"
},
{
"name" : "lotus-symphony-document-dos(68889)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/68889"
}
]
}

View File

@ -53,34 +53,34 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110720 Re: CVE Request: ruby PRNG fixes",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2011/07/20/1"
},
{
"name" : "http://redmine.ruby-lang.org/issues/show/4338",
"refsource" : "MISC",
"url" : "http://redmine.ruby-lang.org/issues/show/4338"
"name": "49126",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49126"
},
{
"name": "RHSA-2011:1581",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1581.html"
},
{
"name": "ruby-random-number-weak-security(69157)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69157"
},
{
"name": "RHSA-2012:0070",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0070.html"
},
{
"name" : "49126",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/49126"
"name": "http://redmine.ruby-lang.org/issues/show/4338",
"refsource": "MISC",
"url": "http://redmine.ruby-lang.org/issues/show/4338"
},
{
"name" : "ruby-random-number-weak-security(69157)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/69157"
"name": "[oss-security] 20110720 Re: CVE Request: ruby PRNG fixes",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/07/20/1"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3343",
"STATE": "PUBLIC"
},
@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20110902 CVE request for OpenTTD",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/09/02/4"
},
{
"name" : "[oss-security] 20110906 Re: CVE request for OpenTTD",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2011/09/06/2"
},
{
"name" : "http://bugs.openttd.org/task/4746",
"refsource" : "CONFIRM",
"url" : "http://bugs.openttd.org/task/4746"
},
{
"name" : "http://bugs.openttd.org/task/4747",
"refsource" : "CONFIRM",
"url" : "http://bugs.openttd.org/task/4747"
},
{
"name": "http://security.openttd.org/en/CVE-2011-3343",
"refsource": "CONFIRM",
"url": "http://security.openttd.org/en/CVE-2011-3343"
},
{
"name" : "DSA-2386",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2386"
},
{
"name": "FEDORA-2011-12975",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066128.html"
},
{
"name": "46075",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46075"
},
{
"name": "DSA-2386",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2386"
},
{
"name": "http://bugs.openttd.org/task/4746",
"refsource": "CONFIRM",
"url": "http://bugs.openttd.org/task/4746"
},
{
"name": "[oss-security] 20110902 CVE request for OpenTTD",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/09/02/4"
},
{
"name": "http://bugs.openttd.org/task/4747",
"refsource": "CONFIRM",
"url": "http://bugs.openttd.org/task/4747"
},
{
"name": "49439",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49439"
},
{
"name" : "46075",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/46075"
"name": "[oss-security] 20110906 Re: CVE request for OpenTTD",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/09/06/2"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2011-3411",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MS11-091",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091"
"name": "oval:org.mitre.oval:def:14346",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14346"
},
{
"name": "TA11-347A",
@ -67,15 +67,15 @@
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/361441"
},
{
"name" : "oval:org.mitre.oval:def:14346",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14346"
},
{
"name": "1026414",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1026414"
},
{
"name": "MS11-091",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4297",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-0113",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0334",
"STATE": "PUBLIC"
},
@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "GLSA-201609-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201609-02"
},
{
"name": "FEDORA-2014-11649",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140609.html"
},
{
"name": "FEDORA-2014-11630",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140654.html"
},
{
"name": "http://bundler.io/blog/2014/08/14/bundler-may-install-gems-from-a-different-source-than-expected-cve-2013-0334.html",
"refsource": "CONFIRM",
@ -62,26 +77,11 @@
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name" : "FEDORA-2014-11630",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140654.html"
},
{
"name" : "FEDORA-2014-11649",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140609.html"
},
{
"name": "FEDORA-2014-11677",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140655.html"
},
{
"name" : "GLSA-201609-02",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201609-02"
},
{
"name": "openSUSE-SU-2015:0628",
"refsource": "SUSE",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-1532",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
"name": "53372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53372"
},
{
"name": "GLSA-201308-06",
@ -63,9 +63,9 @@
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"name" : "MDVSA-2013:150",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
"name": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
},
{
"name": "RHSA-2013:0772",
@ -73,9 +73,9 @@
"url": "http://rhn.redhat.com/errata/RHSA-2013-0772.html"
},
{
"name" : "53372",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/53372"
"name": "MDVSA-2013:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://supportforums.adtran.com/docs/DOC-6414",
"refsource" : "CONFIRM",
"url" : "https://supportforums.adtran.com/docs/DOC-6414"
},
{
"name": "https://supportforums.adtran.com/servlet/JiveServlet/downloadBody/6414-102-3-7862/NetVanta%207000%20Series%20Products%20AOS%20R10.8.1%20Release%20Notes.pdf",
"refsource": "CONFIRM",
"url": "https://supportforums.adtran.com/servlet/JiveServlet/downloadBody/6414-102-3-7862/NetVanta%207000%20Series%20Products%20AOS%20R10.8.1%20Release%20Notes.pdf"
},
{
"name": "https://supportforums.adtran.com/docs/DOC-6414",
"refsource": "CONFIRM",
"url": "https://supportforums.adtran.com/docs/DOC-6414"
}
]
}

View File

@ -53,29 +53,24 @@
"references": {
"reference_data": [
{
"name" : "20131110 D-Link Router 2760N (DSL-2760U-BN) Multiple XSS",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2013/Nov/76"
},
{
"name" : "http://packetstormsecurity.com/files/123976",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/123976"
},
{
"name" : "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10002",
"refsource" : "CONFIRM",
"url" : "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10002"
},
{
"name" : "99603",
"name": "99611",
"refsource": "OSVDB",
"url" : "http://osvdb.org/99603"
"url": "http://osvdb.org/99611"
},
{
"name" : "99604",
"name": "99609",
"refsource": "OSVDB",
"url" : "http://osvdb.org/99604"
"url": "http://osvdb.org/99609"
},
{
"name": "dlink-cve20135223-xss(88723)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88723"
},
{
"name": "dlink-cve20135223-multiple-xss(88724)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88724"
},
{
"name": "99605",
@ -83,9 +78,9 @@
"url": "http://osvdb.org/99605"
},
{
"name" : "99606",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/99606"
"name": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10002",
"refsource": "CONFIRM",
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10002"
},
{
"name": "99607",
@ -98,9 +93,9 @@
"url": "http://osvdb.org/99608"
},
{
"name" : "99609",
"name": "99606",
"refsource": "OSVDB",
"url" : "http://osvdb.org/99609"
"url": "http://osvdb.org/99606"
},
{
"name": "99610",
@ -108,39 +103,44 @@
"url": "http://osvdb.org/99610"
},
{
"name" : "99611",
"name": "99604",
"refsource": "OSVDB",
"url" : "http://osvdb.org/99611"
},
{
"name" : "99612",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/99612"
},
{
"name" : "99613",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/99613"
"url": "http://osvdb.org/99604"
},
{
"name": "99615",
"refsource": "OSVDB",
"url": "http://osvdb.org/99615"
},
{
"name": "20131110 D-Link Router 2760N (DSL-2760U-BN) Multiple XSS",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Nov/76"
},
{
"name": "99603",
"refsource": "OSVDB",
"url": "http://osvdb.org/99603"
},
{
"name": "99612",
"refsource": "OSVDB",
"url": "http://osvdb.org/99612"
},
{
"name": "99616",
"refsource": "OSVDB",
"url": "http://osvdb.org/99616"
},
{
"name" : "dlink-cve20135223-multiple-xss(88724)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/88724"
"name": "http://packetstormsecurity.com/files/123976",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/123976"
},
{
"name" : "dlink-cve20135223-xss(88723)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/88723"
"name": "99613",
"refsource": "OSVDB",
"url": "http://osvdb.org/99613"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2013-5793",
"STATE": "PUBLIC"
},
@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name" : "GLSA-201409-04",
"refsource" : "GENTOO",
"url" : "http://security.gentoo.org/glsa/glsa-201409-04.xml"
},
{
"name": "63116",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/63116"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
},
{
"name": "1029184",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029184"
},
{
"name": "GLSA-201409-04",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201409-04.xml"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "MISC",
"url": "http://www.security-assessment.com/files/documents/advisory/reversesegment.pdf"
},
{
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0040",
"refsource" : "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0040"
},
{
"name": "96094",
"refsource": "BID",
@ -71,6 +66,11 @@
"name": "1038008",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038008"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0040",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0040"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"ID": "CVE-2017-0489",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-12-29",
"ID": "CVE-2017-1000421",
"REQUESTER": "junxzm@hotmail.com",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "Gifsicle (Gifview)",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "1.89 and older"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "Eddie Kohler"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Use-After-Free"
"value": "n/a"
}
]
}
@ -59,15 +59,15 @@
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00006.html"
},
{
"name" : "https://github.com/kohler/gifsicle/issues/114",
"refsource" : "CONFIRM",
"url" : "https://github.com/kohler/gifsicle/issues/114"
},
{
"name": "DSA-4084",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4084"
},
{
"name": "https://github.com/kohler/gifsicle/issues/114",
"refsource": "CONFIRM",
"url": "https://github.com/kohler/gifsicle/issues/114"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2017-12-29",
"ID": "CVE-2017-1000453",
"REQUESTER": "m.daniel.legall@gmail.com",
@ -13,18 +13,18 @@
"product": {
"product_data": [
{
"product_name" : "CMS Made Simple",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value" : "2.1.6, 2.2"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name" : "CMS Made Simple"
"vendor_name": "n/a"
}
]
}
@ -46,7 +46,7 @@
"description": [
{
"lang": "eng",
"value" : "Server Side Template Injection"
"value": "n/a"
}
]
}

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9e3f7a29694049edd728e2400ab57ad7553e5aa9",
"name": "https://github.com/torvalds/linux/commit/9e3f7a29694049edd728e2400ab57ad7553e5aa9",
"refsource": "CONFIRM",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9e3f7a29694049edd728e2400ab57ad7553e5aa9"
"url": "https://github.com/torvalds/linux/commit/9e3f7a29694049edd728e2400ab57ad7553e5aa9"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.11",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.11"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9e3f7a29694049edd728e2400ab57ad7553e5aa9",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9e3f7a29694049edd728e2400ab57ad7553e5aa9"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1492984",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492984"
},
{
"name" : "https://github.com/torvalds/linux/commit/9e3f7a29694049edd728e2400ab57ad7553e5aa9",
"refsource" : "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/9e3f7a29694049edd728e2400ab57ad7553e5aa9"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbmu03753en_us",
"refsource" : "CONFIRM",
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbmu03753en_us"
"name": "1039437",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039437"
},
{
"name": "101029",
@ -63,9 +63,9 @@
"url": "http://www.securityfocus.com/bid/101029"
},
{
"name" : "1039437",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039437"
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbmu03753en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbmu03753en_us"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/radare/radare2/commit/0b973e28166636e0ff1fad80baa0385c9c09c53a",
"refsource" : "CONFIRM",
"url" : "https://github.com/radare/radare2/commit/0b973e28166636e0ff1fad80baa0385c9c09c53a"
},
{
"name": "https://github.com/radare/radare2/issues/8742",
"refsource": "CONFIRM",
"url": "https://github.com/radare/radare2/issues/8742"
},
{
"name": "https://github.com/radare/radare2/commit/0b973e28166636e0ff1fad80baa0385c9c09c53a",
"refsource": "CONFIRM",
"url": "https://github.com/radare/radare2/commit/0b973e28166636e0ff1fad80baa0385c9c09c53a"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16509",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "43219",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/43219/"
},
{
"name": "https://m4.rkw.io/blog/cve201716777-local-root-privesc-in-hashicorp-vagrantvmwarefusion-503.html",
"refsource": "MISC",
"url": "https://m4.rkw.io/blog/cve201716777-local-root-privesc-in-hashicorp-vagrantvmwarefusion-503.html"
},
{
"name": "43219",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43219/"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4167",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4305",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-4694",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com",
"ASSIGNER": "security@google.com",
"ID": "CVE-2018-18337",
"STATE": "PUBLIC"
},
@ -63,16 +63,16 @@
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
},
{
"name" : "DSA-4352",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4352"
},
{
"name": "RHSA-2018:3803",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3803"
},
{
"name": "DSA-4352",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4352"
},
{
"name": "106084",
"refsource": "BID",

View File

@ -57,15 +57,15 @@
"refsource": "MISC",
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=698860"
},
{
"name" : "DSA-4334",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4334"
},
{
"name": "GLSA-201811-15",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-15"
},
{
"name": "DSA-4334",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4334"
}
]
}