"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:46:07 +00:00
parent 827f0618f1
commit 9952f85e5b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3304 additions and 3304 deletions

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-0598", "ID": "CVE-2008-0598",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=433938", "name": "SUSE-SA:2008:047",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=433938" "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html"
}, },
{ {
"name": "DSA-1630", "name": "DSA-1630",
@ -63,14 +63,9 @@
"url": "http://www.debian.org/security/2008/dsa-1630" "url": "http://www.debian.org/security/2008/dsa-1630"
}, },
{ {
"name" : "MDVSA-2008:220", "name": "29942",
"refsource" : "MANDRIVA", "refsource": "BID",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:220" "url": "http://www.securityfocus.com/bid/29942"
},
{
"name" : "RHSA-2008:0508",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2008-0508.html"
}, },
{ {
"name": "RHSA-2008:0519", "name": "RHSA-2008:0519",
@ -78,99 +73,104 @@
"url": "http://www.redhat.com/support/errata/RHSA-2008-0519.html" "url": "http://www.redhat.com/support/errata/RHSA-2008-0519.html"
}, },
{ {
"name" : "RHSA-2008:0973", "name": "linux-kernel-emulation-disclosure(43554)",
"refsource" : "REDHAT", "refsource": "XF",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0973.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43554"
},
{
"name" : "RHSA-2009:0009",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0009.html"
},
{
"name" : "SUSE-SA:2008:048",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html"
},
{
"name" : "SUSE-SA:2008:047",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html"
},
{
"name" : "SUSE-SA:2008:049",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html"
},
{
"name" : "USN-625-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-625-1"
},
{
"name" : "29942",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29942"
}, },
{ {
"name": "oval:org.mitre.oval:def:10721", "name": "oval:org.mitre.oval:def:10721",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10721" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10721"
}, },
{
"name" : "oval:org.mitre.oval:def:6201",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6201"
},
{
"name" : "1020367",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020367"
},
{ {
"name": "30849", "name": "30849",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30849" "url": "http://secunia.com/advisories/30849"
}, },
{
"name" : "30850",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30850"
},
{
"name" : "31107",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31107"
},
{
"name" : "31551",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31551"
},
{
"name" : "33586",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33586"
},
{
"name" : "33201",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33201"
},
{
"name" : "32103",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32103"
},
{ {
"name": "32104", "name": "32104",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32104" "url": "http://secunia.com/advisories/32104"
}, },
{ {
"name" : "linux-kernel-emulation-disclosure(43554)", "name": "31551",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43554" "url": "http://secunia.com/advisories/31551"
},
{
"name": "RHSA-2009:0009",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0009.html"
},
{
"name": "oval:org.mitre.oval:def:6201",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6201"
},
{
"name": "30850",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30850"
},
{
"name": "SUSE-SA:2008:048",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html"
},
{
"name": "32103",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32103"
},
{
"name": "33586",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33586"
},
{
"name": "1020367",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020367"
},
{
"name": "MDVSA-2008:220",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:220"
},
{
"name": "31107",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31107"
},
{
"name": "RHSA-2008:0973",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0973.html"
},
{
"name": "USN-625-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-625-1"
},
{
"name": "RHSA-2008:0508",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html"
},
{
"name": "SUSE-SA:2008:049",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html"
},
{
"name": "33201",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33201"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=433938",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=433938"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.securityfocus.com/bid/28165/exploit",
"refsource" : "MISC",
"url" : "http://www.securityfocus.com/bid/28165/exploit"
},
{ {
"name": "28165", "name": "28165",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/28165" "url": "http://www.securityfocus.com/bid/28165"
}, },
{
"name": "http://www.securityfocus.com/bid/28165/exploit",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/28165/exploit"
},
{ {
"name": "drake-cms-index-file-include(41345)", "name": "drake-cms-index-file-include(41345)",
"refsource": "XF", "refsource": "XF",

View File

@ -57,6 +57,11 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5252" "url": "https://www.exploit-db.com/exploits/5252"
}, },
{
"name": "myannonces-annoncespf-sql-injection(41214)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41214"
},
{ {
"name": "28254", "name": "28254",
"refsource": "BID", "refsource": "BID",
@ -66,11 +71,6 @@
"name": "29384", "name": "29384",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29384" "url": "http://secunia.com/advisories/29384"
},
{
"name" : "myannonces-annoncespf-sql-injection(41214)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41214"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-4312", "ID": "CVE-2008-4312",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,44 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20081014 CORE-2008-1010: VLC media player XSPF Memory Corruption", "name": "31758",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/497354/100/0/threaded" "url": "http://www.securityfocus.com/bid/31758"
}, },
{ {
"name": "6756", "name": "6756",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/6756" "url": "http://www.exploit-db.com/exploits/6756"
}, },
{
"name" : "http://www.coresecurity.com/content/vlc-xspf-memory-corruption",
"refsource" : "MISC",
"url" : "http://www.coresecurity.com/content/vlc-xspf-memory-corruption"
},
{
"name" : "31758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31758"
},
{ {
"name": "oval:org.mitre.oval:def:14726", "name": "oval:org.mitre.oval:def:14726",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14726" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14726"
}, },
{ {
"name" : "ADV-2008-2826", "name": "http://www.coresecurity.com/content/vlc-xspf-memory-corruption",
"refsource" : "VUPEN", "refsource": "MISC",
"url" : "http://www.vupen.com/english/advisories/2008/2826" "url": "http://www.coresecurity.com/content/vlc-xspf-memory-corruption"
}, },
{ {
"name": "32267", "name": "32267",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32267" "url": "http://secunia.com/advisories/32267"
}, },
{
"name": "ADV-2008-2826",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2826"
},
{ {
"name": "vlc-parsetracknode-code-execution(45869)", "name": "vlc-parsetracknode-code-execution(45869)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45869" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45869"
},
{
"name": "20081014 CORE-2008-1010: VLC media player XSPF Memory Corruption",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497354/100/0/threaded"
} }
] ]
} }

View File

@ -62,15 +62,15 @@
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/32341" "url": "http://www.securityfocus.com/bid/32341"
}, },
{
"name" : "1021294",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021294"
},
{ {
"name": "microsoft-communicator-rtcp-dos(46670)", "name": "microsoft-communicator-rtcp-dos(46670)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46670" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46670"
},
{
"name": "1021294",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021294"
} }
] ]
} }

View File

@ -52,41 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495674/100/0/threaded"
},
{
"name" : "http://www.ocert.org/analysis/2008-008/analysis.txt",
"refsource" : "MISC",
"url" : "http://www.ocert.org/analysis/2008-008/analysis.txt"
},
{
"name" : "FEDORA-2009-0542",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html"
},
{
"name" : "FEDORA-2008-7512",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html"
},
{
"name" : "FEDORA-2008-7572",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html"
},
{
"name" : "MDVSA-2009:020",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
},
{
"name" : "SUSE-SR:2009:004",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{ {
"name": "30797", "name": "30797",
"refsource": "BID", "refsource": "BID",
@ -98,19 +63,54 @@
"url": "http://secunia.com/advisories/33544" "url": "http://secunia.com/advisories/33544"
}, },
{ {
"name" : "31827", "name": "http://www.ocert.org/analysis/2008-008/analysis.txt",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/31827" "url": "http://www.ocert.org/analysis/2008-008/analysis.txt"
}, },
{ {
"name": "4648", "name": "4648",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4648" "url": "http://securityreason.com/securityalert/4648"
}, },
{
"name": "31827",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31827"
},
{
"name": "FEDORA-2008-7572",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{ {
"name": "xinelib-multiple-inputplugin-bo(44651)", "name": "xinelib-multiple-inputplugin-bo(44651)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44651" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44651"
},
{
"name": "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495674/100/0/threaded"
},
{
"name": "MDVSA-2009:020",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
},
{
"name": "FEDORA-2009-0542",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html"
},
{
"name": "FEDORA-2008-7512",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://jbrownsec.blogspot.com/2008/12/new-year-research-are-upon-us.html",
"refsource" : "MISC",
"url" : "http://jbrownsec.blogspot.com/2008/12/new-year-research-are-upon-us.html"
},
{ {
"name": "ms-money-prtstb06-dos(47756)", "name": "ms-money-prtstb06-dos(47756)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47756" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47756"
},
{
"name": "http://jbrownsec.blogspot.com/2008/12/new-year-research-are-upon-us.html",
"refsource": "MISC",
"url": "http://jbrownsec.blogspot.com/2008/12/new-year-research-are-upon-us.html"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-0659", "ID": "CVE-2013-0659",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://ics-cert.us-cert.gov/pdf/ICSA-13-084-01.pdf",
"refsource" : "MISC",
"url" : "http://ics-cert.us-cert.gov/pdf/ICSA-13-084-01.pdf"
},
{ {
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-628113.pdf", "name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-628113.pdf",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-628113.pdf" "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-628113.pdf"
},
{
"name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-084-01.pdf",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-084-01.pdf"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3178", "ID": "CVE-2013-3178",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -58,9 +58,9 @@
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052"
}, },
{ {
"name" : "TA13-190A", "name": "1028755",
"refsource" : "CERT", "refsource": "SECTRACK",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-190A" "url": "http://www.securitytracker.com/id/1028755"
}, },
{ {
"name": "oval:org.mitre.oval:def:16892", "name": "oval:org.mitre.oval:def:16892",
@ -73,9 +73,9 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17389" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17389"
}, },
{ {
"name" : "1028755", "name": "TA13-190A",
"refsource" : "SECTRACK", "refsource": "CERT",
"url" : "http://www.securitytracker.com/id/1028755" "url": "http://www.us-cert.gov/ncas/alerts/TA13-190A"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3900", "ID": "CVE-2013-3900",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://blogs.technet.com/b/srd/archive/2013/12/10/ms13-098-update-to-enhance-the-security-of-authenticode.aspx",
"refsource" : "CONFIRM",
"url" : "http://blogs.technet.com/b/srd/archive/2013/12/10/ms13-098-update-to-enhance-the-security-of-authenticode.aspx"
},
{ {
"name": "MS13-098", "name": "MS13-098",
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-098" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-098"
},
{
"name": "http://blogs.technet.com/b/srd/archive/2013/12/10/ms13-098-update-to-enhance-the-security-of-authenticode.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/b/srd/archive/2013/12/10/ms13-098-update-to-enhance-the-security-of-authenticode.aspx"
} }
] ]
} }

View File

@ -52,25 +52,25 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "RHSA-2017:0631",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0631.html"
},
{ {
"name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gmr1_bcch.c?r1=44674&r2=44673&pathrev=44674", "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gmr1_bcch.c?r1=44674&r2=44673&pathrev=44674",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gmr1_bcch.c?r1=44674&r2=44673&pathrev=44674" "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gmr1_bcch.c?r1=44674&r2=44673&pathrev=44674"
}, },
{
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44674",
"refsource" : "CONFIRM",
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44674"
},
{ {
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html"
}, },
{ {
"name" : "http://www.wireshark.org/security/wnpa-sec-2013-33.html", "name": "53762",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.wireshark.org/security/wnpa-sec-2013-33.html" "url": "http://secunia.com/advisories/53762"
}, },
{ {
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7664", "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7664",
@ -78,49 +78,49 @@
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7664" "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7664"
}, },
{ {
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8726", "name": "54425",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8726" "url": "http://secunia.com/advisories/54425"
},
{
"name" : "DSA-2709",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2709"
}, },
{ {
"name": "GLSA-201308-05", "name": "GLSA-201308-05",
"refsource": "GENTOO", "refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
}, },
{
"name" : "RHSA-2017:0631",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0631.html"
},
{
"name" : "openSUSE-SU-2013:1084",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html"
},
{ {
"name": "openSUSE-SU-2013:1086", "name": "openSUSE-SU-2013:1086",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html"
}, },
{
"name": "DSA-2709",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2709"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2013-33.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2013-33.html"
},
{
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44674",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44674"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8726",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8726"
},
{ {
"name": "oval:org.mitre.oval:def:16859", "name": "oval:org.mitre.oval:def:16859",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16859" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16859"
}, },
{ {
"name" : "53762", "name": "openSUSE-SU-2013:1084",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/53762" "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html"
},
{
"name" : "54425",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54425"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4134", "ID": "CVE-2013-4134",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.openafs.org/pages/security/OPENAFS-SA-2013-003.txt",
"refsource" : "CONFIRM",
"url" : "http://www.openafs.org/pages/security/OPENAFS-SA-2013-003.txt"
},
{ {
"name": "DSA-2729", "name": "DSA-2729",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -66,6 +61,11 @@
"name": "MDVSA-2014:244", "name": "MDVSA-2014:244",
"refsource": "MANDRIVA", "refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:244" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:244"
},
{
"name": "http://www.openafs.org/pages/security/OPENAFS-SA-2013-003.txt",
"refsource": "CONFIRM",
"url": "http://www.openafs.org/pages/security/OPENAFS-SA-2013-003.txt"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.phpmyadmin.net/home_page/security/PMASA-2013-7.php",
"refsource" : "CONFIRM",
"url" : "http://www.phpmyadmin.net/home_page/security/PMASA-2013-7.php"
},
{ {
"name": "https://github.com/phpmyadmin/phpmyadmin/commit/012464268420e53a9cd81cbb4a43988d70393c36", "name": "https://github.com/phpmyadmin/phpmyadmin/commit/012464268420e53a9cd81cbb4a43988d70393c36",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/phpmyadmin/phpmyadmin/commit/012464268420e53a9cd81cbb4a43988d70393c36" "url": "https://github.com/phpmyadmin/phpmyadmin/commit/012464268420e53a9cd81cbb4a43988d70393c36"
},
{
"name": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-7.php",
"refsource": "CONFIRM",
"url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-7.php"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-6311", "ID": "CVE-2013-6311",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676688",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676688"
},
{ {
"name": "ibm-marketing-cve20136311-sql-injection(88561)", "name": "ibm-marketing-cve20136311-sql-injection(88561)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88561" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88561"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676688",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676688"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6546", "ID": "CVE-2013-6546",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,9 +53,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html", "name": "DSA-2883",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html" "url": "http://www.debian.org/security/2014/dsa-2883"
},
{
"name": "openSUSE-SU-2014:0327",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00006.html"
}, },
{ {
"name": "https://code.google.com/p/chromium/issues/detail?id=331725", "name": "https://code.google.com/p/chromium/issues/detail?id=331725",
@ -68,14 +73,9 @@
"url": "https://src.chromium.org/viewvc/blink?revision=164749&view=revision" "url": "https://src.chromium.org/viewvc/blink?revision=164749&view=revision"
}, },
{ {
"name" : "DSA-2883", "name": "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2014/dsa-2883" "url": "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html"
},
{
"name" : "openSUSE-SU-2014:0327",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-03/msg00006.html"
} }
] ]
} }

View File

@ -62,20 +62,50 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "name": "RHSA-2017:1791",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" "url": "https://access.redhat.com/errata/RHSA-2017:1791"
},
{
"name": "99818",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99818"
},
{
"name": "RHSA-2017:1790",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1790"
}, },
{ {
"name": "https://security.netapp.com/advisory/ntap-20170720-0001/", "name": "https://security.netapp.com/advisory/ntap-20170720-0001/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20170720-0001/" "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
}, },
{
"name": "RHSA-2017:1789",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1789"
},
{ {
"name": "https://cert.vde.com/en-us/advisories/vde-2017-002", "name": "https://cert.vde.com/en-us/advisories/vde-2017-002",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2017-002" "url": "https://cert.vde.com/en-us/advisories/vde-2017-002"
}, },
{
"name": "1038931",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038931"
},
{
"name": "RHSA-2017:1792",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1792"
},
{
"name": "GLSA-201709-22",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201709-22"
},
{ {
"name": "DSA-3919", "name": "DSA-3919",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -87,44 +117,14 @@
"url": "http://www.debian.org/security/2017/dsa-3954" "url": "http://www.debian.org/security/2017/dsa-3954"
}, },
{ {
"name" : "GLSA-201709-22", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201709-22" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
}, },
{ {
"name": "RHSA-2017:3392", "name": "RHSA-2017:3392",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3392" "url": "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"name" : "RHSA-2017:1789",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1789"
},
{
"name" : "RHSA-2017:1790",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1790"
},
{
"name" : "RHSA-2017:1791",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1791"
},
{
"name" : "RHSA-2017:1792",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1792"
},
{
"name" : "99818",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99818"
},
{
"name" : "1038931",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038931"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf58392", "name": "1039285",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf58392" "url": "http://www.securitytracker.com/id/1039285"
}, },
{ {
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-prime-lms", "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-prime-lms",
@ -63,9 +63,9 @@
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-prime-lms" "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-prime-lms"
}, },
{ {
"name" : "1039285", "name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf58392",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1039285" "url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf58392"
} }
] ]
} }

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://github.com/cn-uofbasel/ccn-lite/issues/132",
"refsource" : "CONFIRM",
"url" : "https://github.com/cn-uofbasel/ccn-lite/issues/132"
},
{ {
"name": "https://github.com/cn-uofbasel/ccn-lite/releases/tag/2.0.0", "name": "https://github.com/cn-uofbasel/ccn-lite/releases/tag/2.0.0",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://github.com/cn-uofbasel/ccn-lite/releases/tag/2.0.0" "url": "https://github.com/cn-uofbasel/ccn-lite/releases/tag/2.0.0"
},
{
"name": "https://github.com/cn-uofbasel/ccn-lite/issues/132",
"refsource": "CONFIRM",
"url": "https://github.com/cn-uofbasel/ccn-lite/issues/132"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-01-02T00:00:00", "DATE_PUBLIC": "2018-01-02T00:00:00",
"ID": "CVE-2017-13205", "ID": "CVE-2017-13205",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-02-05T00:00:00", "DATE_PUBLIC": "2018-02-05T00:00:00",
"ID": "CVE-2017-13239", "ID": "CVE-2017-13239",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -52,25 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[debian-lts-announce] 20171231 [SECURITY] [DLA 1226-1] wireshark security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2017/12/msg00029.html"
},
{ {
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14236", "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14236",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14236" "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14236"
}, },
{ {
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8502fe94ef9e431860921507e1a351c5e3f5c634", "name": "102030",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8502fe94ef9e431860921507e1a351c5e3f5c634" "url": "http://www.securityfocus.com/bid/102030"
},
{
"name" : "https://www.wireshark.org/security/wnpa-sec-2017-47.html",
"refsource" : "CONFIRM",
"url" : "https://www.wireshark.org/security/wnpa-sec-2017-47.html"
}, },
{ {
"name": "DSA-4060", "name": "DSA-4060",
@ -78,9 +68,19 @@
"url": "https://www.debian.org/security/2017/dsa-4060" "url": "https://www.debian.org/security/2017/dsa-4060"
}, },
{ {
"name" : "102030", "name": "https://www.wireshark.org/security/wnpa-sec-2017-47.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/102030" "url": "https://www.wireshark.org/security/wnpa-sec-2017-47.html"
},
{
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8502fe94ef9e431860921507e1a351c5e3f5c634",
"refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8502fe94ef9e431860921507e1a351c5e3f5c634"
},
{
"name": "[debian-lts-announce] 20171231 [SECURITY] [DLA 1226-1] wireshark security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00029.html"
} }
] ]
} }

View File

@ -1,7 +1,7 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"AKA": "", "AKA": "",
"ASSIGNER" : "security@microfocus.com", "ASSIGNER": "security@suse.com",
"ID": "CVE-2017-9275", "ID": "CVE-2017-9275",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "NetIQ Identity Reporting XSS exposure" "TITLE": "NetIQ Identity Reporting XSS exposure"

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "1040709",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040709"
},
{ {
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wbs", "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wbs",
"refsource": "CONFIRM", "refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "103920", "name": "103920",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/103920" "url": "http://www.securityfocus.com/bid/103920"
},
{
"name" : "1040709",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040709"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.tenable.com/security/research/tra-2018-42",
"refsource" : "MISC",
"url" : "https://www.tenable.com/security/research/tra-2018-42"
},
{ {
"name": "20181204 Cisco Energy Management Suite Default PostgreSQL Password Vulnerability", "name": "20181204 Cisco Energy Management Suite Default PostgreSQL Password Vulnerability",
"refsource": "CISCO", "refsource": "CISCO",
@ -66,6 +61,11 @@
"name": "106124", "name": "106124",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/106124" "url": "http://www.securityfocus.com/bid/106124"
},
{
"name": "https://www.tenable.com/security/research/tra-2018-42",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2018-42"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com", "ASSIGNER": "security@google.com",
"ID": "CVE-2018-18355", "ID": "CVE-2018-18355",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -63,16 +63,16 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
}, },
{
"name" : "DSA-4352",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4352"
},
{ {
"name": "RHSA-2018:3803", "name": "RHSA-2018:3803",
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3803" "url": "https://access.redhat.com/errata/RHSA-2018:3803"
}, },
{
"name": "DSA-4352",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4352"
},
{ {
"name": "106084", "name": "106084",
"refsource": "BID", "refsource": "BID",