"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:46:07 +00:00
parent 827f0618f1
commit 9952f85e5b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3304 additions and 3304 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2008-0598",
"STATE": "PUBLIC"
},
@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=433938",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=433938"
"name": "SUSE-SA:2008:047",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html"
},
{
"name": "DSA-1630",
@ -63,14 +63,9 @@
"url": "http://www.debian.org/security/2008/dsa-1630"
},
{
"name" : "MDVSA-2008:220",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:220"
},
{
"name" : "RHSA-2008:0508",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2008-0508.html"
"name": "29942",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29942"
},
{
"name": "RHSA-2008:0519",
@ -78,99 +73,104 @@
"url": "http://www.redhat.com/support/errata/RHSA-2008-0519.html"
},
{
"name" : "RHSA-2008:0973",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0973.html"
},
{
"name" : "RHSA-2009:0009",
"refsource" : "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0009.html"
},
{
"name" : "SUSE-SA:2008:048",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html"
},
{
"name" : "SUSE-SA:2008:047",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html"
},
{
"name" : "SUSE-SA:2008:049",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html"
},
{
"name" : "USN-625-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/usn-625-1"
},
{
"name" : "29942",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29942"
"name": "linux-kernel-emulation-disclosure(43554)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43554"
},
{
"name": "oval:org.mitre.oval:def:10721",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10721"
},
{
"name" : "oval:org.mitre.oval:def:6201",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6201"
},
{
"name" : "1020367",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020367"
},
{
"name": "30849",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30849"
},
{
"name" : "30850",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30850"
},
{
"name" : "31107",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31107"
},
{
"name" : "31551",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31551"
},
{
"name" : "33586",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33586"
},
{
"name" : "33201",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/33201"
},
{
"name" : "32103",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32103"
},
{
"name": "32104",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32104"
},
{
"name" : "linux-kernel-emulation-disclosure(43554)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43554"
"name": "31551",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31551"
},
{
"name": "RHSA-2009:0009",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0009.html"
},
{
"name": "oval:org.mitre.oval:def:6201",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6201"
},
{
"name": "30850",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30850"
},
{
"name": "SUSE-SA:2008:048",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html"
},
{
"name": "32103",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32103"
},
{
"name": "33586",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33586"
},
{
"name": "1020367",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020367"
},
{
"name": "MDVSA-2008:220",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:220"
},
{
"name": "31107",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31107"
},
{
"name": "RHSA-2008:0973",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0973.html"
},
{
"name": "USN-625-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-625-1"
},
{
"name": "RHSA-2008:0508",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2008-0508.html"
},
{
"name": "SUSE-SA:2008:049",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html"
},
{
"name": "33201",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33201"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=433938",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=433938"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.securityfocus.com/bid/28165/exploit",
"refsource" : "MISC",
"url" : "http://www.securityfocus.com/bid/28165/exploit"
},
{
"name": "28165",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/28165"
},
{
"name": "http://www.securityfocus.com/bid/28165/exploit",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/28165/exploit"
},
{
"name": "drake-cms-index-file-include(41345)",
"refsource": "XF",

View File

@ -57,6 +57,11 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5252"
},
{
"name": "myannonces-annoncespf-sql-injection(41214)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41214"
},
{
"name": "28254",
"refsource": "BID",
@ -66,11 +71,6 @@
"name": "29384",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/29384"
},
{
"name" : "myannonces-annoncespf-sql-injection(41214)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41214"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-4312",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,44 +53,44 @@
"references": {
"reference_data": [
{
"name" : "20081014 CORE-2008-1010: VLC media player XSPF Memory Corruption",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/497354/100/0/threaded"
"name": "31758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31758"
},
{
"name": "6756",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/6756"
},
{
"name" : "http://www.coresecurity.com/content/vlc-xspf-memory-corruption",
"refsource" : "MISC",
"url" : "http://www.coresecurity.com/content/vlc-xspf-memory-corruption"
},
{
"name" : "31758",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/31758"
},
{
"name": "oval:org.mitre.oval:def:14726",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14726"
},
{
"name" : "ADV-2008-2826",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2826"
"name": "http://www.coresecurity.com/content/vlc-xspf-memory-corruption",
"refsource": "MISC",
"url": "http://www.coresecurity.com/content/vlc-xspf-memory-corruption"
},
{
"name": "32267",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32267"
},
{
"name": "ADV-2008-2826",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2826"
},
{
"name": "vlc-parsetracknode-code-execution(45869)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45869"
},
{
"name": "20081014 CORE-2008-1010: VLC media player XSPF Memory Corruption",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/497354/100/0/threaded"
}
]
}

View File

@ -62,15 +62,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32341"
},
{
"name" : "1021294",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1021294"
},
{
"name": "microsoft-communicator-rtcp-dos(46670)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46670"
},
{
"name": "1021294",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021294"
}
]
}

View File

@ -52,41 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/495674/100/0/threaded"
},
{
"name" : "http://www.ocert.org/analysis/2008-008/analysis.txt",
"refsource" : "MISC",
"url" : "http://www.ocert.org/analysis/2008-008/analysis.txt"
},
{
"name" : "FEDORA-2009-0542",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html"
},
{
"name" : "FEDORA-2008-7512",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html"
},
{
"name" : "FEDORA-2008-7572",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html"
},
{
"name" : "MDVSA-2009:020",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
},
{
"name" : "SUSE-SR:2009:004",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "30797",
"refsource": "BID",
@ -98,19 +63,54 @@
"url": "http://secunia.com/advisories/33544"
},
{
"name" : "31827",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/31827"
"name": "http://www.ocert.org/analysis/2008-008/analysis.txt",
"refsource": "MISC",
"url": "http://www.ocert.org/analysis/2008-008/analysis.txt"
},
{
"name": "4648",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4648"
},
{
"name": "31827",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31827"
},
{
"name": "FEDORA-2008-7572",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html"
},
{
"name": "SUSE-SR:2009:004",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
},
{
"name": "xinelib-multiple-inputplugin-bo(44651)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44651"
},
{
"name": "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495674/100/0/threaded"
},
{
"name": "MDVSA-2009:020",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
},
{
"name": "FEDORA-2009-0542",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html"
},
{
"name": "FEDORA-2008-7512",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://jbrownsec.blogspot.com/2008/12/new-year-research-are-upon-us.html",
"refsource" : "MISC",
"url" : "http://jbrownsec.blogspot.com/2008/12/new-year-research-are-upon-us.html"
},
{
"name": "ms-money-prtstb06-dos(47756)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47756"
},
{
"name": "http://jbrownsec.blogspot.com/2008/12/new-year-research-are-upon-us.html",
"refsource": "MISC",
"url": "http://jbrownsec.blogspot.com/2008/12/new-year-research-are-upon-us.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-0659",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://ics-cert.us-cert.gov/pdf/ICSA-13-084-01.pdf",
"refsource" : "MISC",
"url" : "http://ics-cert.us-cert.gov/pdf/ICSA-13-084-01.pdf"
},
{
"name": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-628113.pdf",
"refsource": "CONFIRM",
"url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-628113.pdf"
},
{
"name": "http://ics-cert.us-cert.gov/pdf/ICSA-13-084-01.pdf",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-084-01.pdf"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3178",
"STATE": "PUBLIC"
},
@ -58,9 +58,9 @@
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052"
},
{
"name" : "TA13-190A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-190A"
"name": "1028755",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1028755"
},
{
"name": "oval:org.mitre.oval:def:16892",
@ -73,9 +73,9 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17389"
},
{
"name" : "1028755",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1028755"
"name": "TA13-190A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-190A"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3900",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://blogs.technet.com/b/srd/archive/2013/12/10/ms13-098-update-to-enhance-the-security-of-authenticode.aspx",
"refsource" : "CONFIRM",
"url" : "http://blogs.technet.com/b/srd/archive/2013/12/10/ms13-098-update-to-enhance-the-security-of-authenticode.aspx"
},
{
"name": "MS13-098",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-098"
},
{
"name": "http://blogs.technet.com/b/srd/archive/2013/12/10/ms13-098-update-to-enhance-the-security-of-authenticode.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/b/srd/archive/2013/12/10/ms13-098-update-to-enhance-the-security-of-authenticode.aspx"
}
]
}

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name": "RHSA-2017:0631",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0631.html"
},
{
"name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gmr1_bcch.c?r1=44674&r2=44673&pathrev=44674",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gmr1_bcch.c?r1=44674&r2=44673&pathrev=44674"
},
{
"name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44674",
"refsource" : "CONFIRM",
"url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44674"
},
{
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html"
},
{
"name" : "http://www.wireshark.org/security/wnpa-sec-2013-33.html",
"refsource" : "CONFIRM",
"url" : "http://www.wireshark.org/security/wnpa-sec-2013-33.html"
"name": "53762",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53762"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7664",
@ -78,49 +78,49 @@
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7664"
},
{
"name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8726",
"refsource" : "CONFIRM",
"url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8726"
},
{
"name" : "DSA-2709",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2013/dsa-2709"
"name": "54425",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54425"
},
{
"name": "GLSA-201308-05",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"
},
{
"name" : "RHSA-2017:0631",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0631.html"
},
{
"name" : "openSUSE-SU-2013:1084",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html"
},
{
"name": "openSUSE-SU-2013:1086",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html"
},
{
"name": "DSA-2709",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2709"
},
{
"name": "http://www.wireshark.org/security/wnpa-sec-2013-33.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/security/wnpa-sec-2013-33.html"
},
{
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44674",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44674"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8726",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8726"
},
{
"name": "oval:org.mitre.oval:def:16859",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16859"
},
{
"name" : "53762",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/53762"
},
{
"name" : "54425",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54425"
"name": "openSUSE-SU-2013:1084",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4134",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.openafs.org/pages/security/OPENAFS-SA-2013-003.txt",
"refsource" : "CONFIRM",
"url" : "http://www.openafs.org/pages/security/OPENAFS-SA-2013-003.txt"
},
{
"name": "DSA-2729",
"refsource": "DEBIAN",
@ -66,6 +61,11 @@
"name": "MDVSA-2014:244",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:244"
},
{
"name": "http://www.openafs.org/pages/security/OPENAFS-SA-2013-003.txt",
"refsource": "CONFIRM",
"url": "http://www.openafs.org/pages/security/OPENAFS-SA-2013-003.txt"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www.phpmyadmin.net/home_page/security/PMASA-2013-7.php",
"refsource" : "CONFIRM",
"url" : "http://www.phpmyadmin.net/home_page/security/PMASA-2013-7.php"
},
{
"name": "https://github.com/phpmyadmin/phpmyadmin/commit/012464268420e53a9cd81cbb4a43988d70393c36",
"refsource": "CONFIRM",
"url": "https://github.com/phpmyadmin/phpmyadmin/commit/012464268420e53a9cd81cbb4a43988d70393c36"
},
{
"name": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-7.php",
"refsource": "CONFIRM",
"url": "http://www.phpmyadmin.net/home_page/security/PMASA-2013-7.php"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2013-6311",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676688",
"refsource" : "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676688"
},
{
"name": "ibm-marketing-cve20136311-sql-injection(88561)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88561"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676688",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676688"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6546",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -53,9 +53,14 @@
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html"
"name": "DSA-2883",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2883"
},
{
"name": "openSUSE-SU-2014:0327",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00006.html"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=331725",
@ -68,14 +73,9 @@
"url": "https://src.chromium.org/viewvc/blink?revision=164749&view=revision"
},
{
"name" : "DSA-2883",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2014/dsa-2883"
},
{
"name" : "openSUSE-SU-2014:0327",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-03/msg00006.html"
"name": "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html"
}
]
}

View File

@ -62,20 +62,50 @@
"references": {
"reference_data": [
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
"name": "RHSA-2017:1791",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1791"
},
{
"name": "99818",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99818"
},
{
"name": "RHSA-2017:1790",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1790"
},
{
"name": "https://security.netapp.com/advisory/ntap-20170720-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
},
{
"name": "RHSA-2017:1789",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1789"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2017-002",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2017-002"
},
{
"name": "1038931",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038931"
},
{
"name": "RHSA-2017:1792",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1792"
},
{
"name": "GLSA-201709-22",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201709-22"
},
{
"name": "DSA-3919",
"refsource": "DEBIAN",
@ -87,44 +117,14 @@
"url": "http://www.debian.org/security/2017/dsa-3954"
},
{
"name" : "GLSA-201709-22",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201709-22"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name": "RHSA-2017:3392",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3392"
},
{
"name" : "RHSA-2017:1789",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1789"
},
{
"name" : "RHSA-2017:1790",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1790"
},
{
"name" : "RHSA-2017:1791",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1791"
},
{
"name" : "RHSA-2017:1792",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:1792"
},
{
"name" : "99818",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/99818"
},
{
"name" : "1038931",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1038931"
}
]
}

View File

@ -53,9 +53,9 @@
"references": {
"reference_data": [
{
"name" : "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf58392",
"refsource" : "CONFIRM",
"url" : "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf58392"
"name": "1039285",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039285"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-prime-lms",
@ -63,9 +63,9 @@
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-prime-lms"
},
{
"name" : "1039285",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1039285"
"name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf58392",
"refsource": "CONFIRM",
"url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvf58392"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/cn-uofbasel/ccn-lite/issues/132",
"refsource" : "CONFIRM",
"url" : "https://github.com/cn-uofbasel/ccn-lite/issues/132"
},
{
"name": "https://github.com/cn-uofbasel/ccn-lite/releases/tag/2.0.0",
"refsource": "CONFIRM",
"url": "https://github.com/cn-uofbasel/ccn-lite/releases/tag/2.0.0"
},
{
"name": "https://github.com/cn-uofbasel/ccn-lite/issues/132",
"refsource": "CONFIRM",
"url": "https://github.com/cn-uofbasel/ccn-lite/issues/132"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-01-02T00:00:00",
"ID": "CVE-2017-13205",
"STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "security@google.com",
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-02-05T00:00:00",
"ID": "CVE-2017-13239",
"STATE": "PUBLIC"

View File

@ -52,25 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20171231 [SECURITY] [DLA 1226-1] wireshark security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2017/12/msg00029.html"
},
{
"name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14236",
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14236"
},
{
"name" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8502fe94ef9e431860921507e1a351c5e3f5c634",
"refsource" : "CONFIRM",
"url" : "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8502fe94ef9e431860921507e1a351c5e3f5c634"
},
{
"name" : "https://www.wireshark.org/security/wnpa-sec-2017-47.html",
"refsource" : "CONFIRM",
"url" : "https://www.wireshark.org/security/wnpa-sec-2017-47.html"
"name": "102030",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102030"
},
{
"name": "DSA-4060",
@ -78,9 +68,19 @@
"url": "https://www.debian.org/security/2017/dsa-4060"
},
{
"name" : "102030",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102030"
"name": "https://www.wireshark.org/security/wnpa-sec-2017-47.html",
"refsource": "CONFIRM",
"url": "https://www.wireshark.org/security/wnpa-sec-2017-47.html"
},
{
"name": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8502fe94ef9e431860921507e1a351c5e3f5c634",
"refsource": "CONFIRM",
"url": "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8502fe94ef9e431860921507e1a351c5e3f5c634"
},
{
"name": "[debian-lts-announce] 20171231 [SECURITY] [DLA 1226-1] wireshark security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00029.html"
}
]
}

View File

@ -1,7 +1,7 @@
{
"CVE_data_meta": {
"AKA": "",
"ASSIGNER" : "security@microfocus.com",
"ASSIGNER": "security@suse.com",
"ID": "CVE-2017-9275",
"STATE": "PUBLIC",
"TITLE": "NetIQ Identity Reporting XSS exposure"

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "1040709",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040709"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wbs",
"refsource": "CONFIRM",
@ -61,11 +66,6 @@
"name": "103920",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103920"
},
{
"name" : "1040709",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1040709"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "https://www.tenable.com/security/research/tra-2018-42",
"refsource" : "MISC",
"url" : "https://www.tenable.com/security/research/tra-2018-42"
},
{
"name": "20181204 Cisco Energy Management Suite Default PostgreSQL Password Vulnerability",
"refsource": "CISCO",
@ -66,6 +61,11 @@
"name": "106124",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106124"
},
{
"name": "https://www.tenable.com/security/research/tra-2018-42",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2018-42"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "chrome-cve-admin@google.com",
"ASSIGNER": "security@google.com",
"ID": "CVE-2018-18355",
"STATE": "PUBLIC"
},
@ -63,16 +63,16 @@
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
},
{
"name" : "DSA-4352",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4352"
},
{
"name": "RHSA-2018:3803",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3803"
},
{
"name": "DSA-4352",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4352"
},
{
"name": "106084",
"refsource": "BID",