"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 02:34:26 +00:00
parent 8a44456dc4
commit a5acd57c0f
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
54 changed files with 3575 additions and 3575 deletions

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-0112", "ID": "CVE-2008-0112",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,14 +53,19 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBST02320", "name": "1019583",
"refsource" : "HP", "refsource": "SECTRACK",
"url" : "http://marc.info/?l=bugtraq&m=120585858807305&w=2" "url": "http://www.securitytracker.com/id?1019583"
}, },
{ {
"name" : "SSRT080028", "name": "TA08-071A",
"refsource" : "HP", "refsource": "CERT",
"url" : "http://marc.info/?l=bugtraq&m=120585858807305&w=2" "url": "http://www.us-cert.gov/cas/techalerts/TA08-071A.html"
},
{
"name": "oval:org.mitre.oval:def:5284",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5284"
}, },
{ {
"name": "MS08-014", "name": "MS08-014",
@ -68,9 +73,14 @@
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014"
}, },
{ {
"name" : "TA08-071A", "name": "SSRT080028",
"refsource" : "CERT", "refsource": "HP",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-071A.html" "url": "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
},
{
"name": "HPSBST02320",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=120585858807305&w=2"
}, },
{ {
"name": "28095", "name": "28095",
@ -81,16 +91,6 @@
"name": "ADV-2008-0846", "name": "ADV-2008-0846",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0846/references" "url": "http://www.vupen.com/english/advisories/2008/0846/references"
},
{
"name" : "oval:org.mitre.oval:def:5284",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5284"
},
{
"name" : "1019583",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1019583"
} }
] ]
} }

View File

@ -53,44 +53,44 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080104 Some DoS in some telnet servers", "name": "3525",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/485812/100/0/threaded" "url": "http://securityreason.com/securityalert/3525"
},
{
"name" : "20080219 Two heap overflow in Foxit WAC Server 2.0 Build 3503",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/488366/100/200/threaded"
},
{
"name" : "http://aluigi.altervista.org/adv/waccaz-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/waccaz-adv.txt"
},
{
"name" : "http://aluigi.altervista.org/adv/wachof-adv.txt",
"refsource" : "MISC",
"url" : "http://aluigi.altervista.org/adv/wachof-adv.txt"
}, },
{ {
"name": "27142", "name": "27142",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/27142" "url": "http://www.securityfocus.com/bid/27142"
}, },
{
"name": "wacserver-option-dos(39427)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39427"
},
{
"name": "http://aluigi.altervista.org/adv/waccaz-adv.txt",
"refsource": "MISC",
"url": "http://aluigi.altervista.org/adv/waccaz-adv.txt"
},
{
"name": "20080219 Two heap overflow in Foxit WAC Server 2.0 Build 3503",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/488366/100/200/threaded"
},
{
"name": "20080104 Some DoS in some telnet servers",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/485812/100/0/threaded"
},
{ {
"name": "28272", "name": "28272",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28272" "url": "http://secunia.com/advisories/28272"
}, },
{ {
"name" : "3525", "name": "http://aluigi.altervista.org/adv/wachof-adv.txt",
"refsource" : "SREASON", "refsource": "MISC",
"url" : "http://securityreason.com/securityalert/3525" "url": "http://aluigi.altervista.org/adv/wachof-adv.txt"
},
{
"name" : "wacserver-option-dos(39427)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39427"
} }
] ]
} }

View File

@ -53,14 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080124 Pre Dynamic Institution bypass", "name": "predynamic-login-sql-injection(39942)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://www.securityfocus.com/archive/1/487054/100/0/threaded" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39942"
},
{
"name" : "27451",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27451"
}, },
{ {
"name": "28651", "name": "28651",
@ -73,9 +68,14 @@
"url": "http://securityreason.com/securityalert/3603" "url": "http://securityreason.com/securityalert/3603"
}, },
{ {
"name" : "predynamic-login-sql-injection(39942)", "name": "20080124 Pre Dynamic Institution bypass",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39942" "url": "http://www.securityfocus.com/archive/1/487054/100/0/threaded"
},
{
"name": "27451",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27451"
} }
] ]
} }

View File

@ -52,11 +52,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20080205 dBpowerAMP Audio Player Release 2 Remote Buffer Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/487605/100/0/threaded"
},
{ {
"name": "5067", "name": "5067",
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
@ -67,20 +62,25 @@
"refsource": "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5069" "url": "https://www.exploit-db.com/exploits/5069"
}, },
{
"name" : "27635",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/27635"
},
{ {
"name": "27639", "name": "27639",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/27639" "url": "http://www.securityfocus.com/bid/27639"
}, },
{
"name": "20080205 dBpowerAMP Audio Player Release 2 Remote Buffer Overflow",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/487605/100/0/threaded"
},
{ {
"name": "3623", "name": "3623",
"refsource": "SREASON", "refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3623" "url": "http://securityreason.com/securityalert/3623"
},
{
"name": "27635",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27635"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-1092", "ID": "CVE-2008-1092",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "HPSBST02336", "name": "1019686",
"refsource" : "HP", "refsource": "SECTRACK",
"url" : "http://marc.info/?l=bugtraq&m=121129490723574&w=2" "url": "http://www.securitytracker.com/id?1019686"
},
{
"name" : "SSRT080071",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=121129490723574&w=2"
},
{
"name" : "MS08-028",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-028"
},
{
"name" : "950627",
"refsource" : "MSKB",
"url" : "http://www.microsoft.com/technet/security/advisory/950627.mspx"
}, },
{ {
"name": "VU#936529", "name": "VU#936529",
@ -78,14 +63,29 @@
"url": "http://www.kb.cert.org/vuls/id/936529" "url": "http://www.kb.cert.org/vuls/id/936529"
}, },
{ {
"name" : "1019686", "name": "MS08-028",
"refsource" : "SECTRACK", "refsource": "MS",
"url" : "http://www.securitytracker.com/id?1019686" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-028"
}, },
{ {
"name": "microsoft-jet-msjet40-bo(41380)", "name": "microsoft-jet-msjet40-bo(41380)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41380" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41380"
},
{
"name": "SSRT080071",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=121129490723574&w=2"
},
{
"name": "HPSBST02336",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=121129490723574&w=2"
},
{
"name": "950627",
"refsource": "MSKB",
"url": "http://www.microsoft.com/technet/security/advisory/950627.mspx"
} }
] ]
} }

View File

@ -52,16 +52,16 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "5204",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5204"
},
{ {
"name": "http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html", "name": "http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html" "url": "http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html"
}, },
{
"name": "5204",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5204"
},
{ {
"name": "28022", "name": "28022",
"refsource": "BID", "refsource": "BID",

View File

@ -53,39 +53,39 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "APPLE-SA-2008-07-11", "name": "ipod-iphone-certificate-info-disclosure(43734)",
"refsource" : "APPLE", "refsource": "XF",
"url" : "http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43734"
},
{
"name" : "JVN#88676089",
"refsource" : "JVN",
"url" : "http://jvn.jp/en/jp/JVN88676089/index.html"
},
{
"name" : "JVNDB-2008-000039",
"refsource" : "JVNDB",
"url" : "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000039.html"
}, },
{ {
"name": "30186", "name": "30186",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/30186" "url": "http://www.securityfocus.com/bid/30186"
}, },
{
"name": "JVN#88676089",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN88676089/index.html"
},
{
"name": "APPLE-SA-2008-07-11",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html"
},
{ {
"name": "ADV-2008-2094", "name": "ADV-2008-2094",
"refsource": "VUPEN", "refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2094/references" "url": "http://www.vupen.com/english/advisories/2008/2094/references"
}, },
{
"name": "JVNDB-2008-000039",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000039.html"
},
{ {
"name": "31074", "name": "31074",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31074" "url": "http://secunia.com/advisories/31074"
},
{
"name" : "ipod-iphone-certificate-info-disclosure(43734)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/43734"
} }
] ]
} }

View File

@ -53,24 +53,24 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "20080404 KwsPHP Module ConcoursPhoto XSS", "name": "3809",
"refsource" : "BUGTRAQ", "refsource": "SREASON",
"url" : "http://www.securityfocus.com/archive/1/490470/100/0/threaded" "url": "http://securityreason.com/securityalert/3809"
}, },
{ {
"name": "28612", "name": "28612",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/28612" "url": "http://www.securityfocus.com/bid/28612"
}, },
{
"name" : "3809",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/3809"
},
{ {
"name": "concoursphoto-index-xss(41814)", "name": "concoursphoto-index-xss(41814)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41814" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41814"
},
{
"name": "20080404 KwsPHP Module ConcoursPhoto XSS",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/490470/100/0/threaded"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://packetstorm.linuxsecurity.com/0808-exploits/atmail542-xss.txt", "name": "atmail-parse-showmail-abook-xss(44860)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://packetstorm.linuxsecurity.com/0808-exploits/atmail542-xss.txt" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44860"
}, },
{ {
"name": "31720", "name": "31720",
@ -68,9 +68,9 @@
"url": "http://secunia.com/advisories/31727" "url": "http://secunia.com/advisories/31727"
}, },
{ {
"name" : "atmail-parse-showmail-abook-xss(44860)", "name": "http://packetstorm.linuxsecurity.com/0808-exploits/atmail542-xss.txt",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44860" "url": "http://packetstorm.linuxsecurity.com/0808-exploits/atmail542-xss.txt"
} }
] ]
} }

View File

@ -52,30 +52,30 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "6388",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/6388"
},
{
"name" : "http://z0rlu.blogspot.com/2008/09/vastal-i-tech-dating-zone-fage-sql.html",
"refsource" : "MISC",
"url" : "http://z0rlu.blogspot.com/2008/09/vastal-i-tech-dating-zone-fage-sql.html"
},
{ {
"name": "31043", "name": "31043",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/31043" "url": "http://www.securityfocus.com/bid/31043"
}, },
{
"name": "datingzone-advancedsearch-sql-injection(44946)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44946"
},
{
"name": "6388",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6388"
},
{ {
"name": "31747", "name": "31747",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31747" "url": "http://secunia.com/advisories/31747"
}, },
{ {
"name" : "datingzone-advancedsearch-sql-injection(44946)", "name": "http://z0rlu.blogspot.com/2008/09/vastal-i-tech-dating-zone-fage-sql.html",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44946" "url": "http://z0rlu.blogspot.com/2008/09/vastal-i-tech-dating-zone-fage-sql.html"
} }
] ]
} }

View File

@ -53,24 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20081015 CVE request: jhead", "name": "31921",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2008/10/15/5" "url": "http://www.securityfocus.com/bid/31921"
},
{
"name" : "[oss-security] 20081015 Re: CVE request: jhead",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/10/15/6"
},
{
"name" : "[oss-security] 20081016 Re: CVE request: jhead",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/10/16/3"
},
{
"name" : "[oss-security] 20081127 Re: CVE request: jhead",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2008/11/26/4"
}, },
{ {
"name": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/271020", "name": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/271020",
@ -78,9 +63,24 @@
"url": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/271020" "url": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/271020"
}, },
{ {
"name" : "31921", "name": "[oss-security] 20081015 CVE request: jhead",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/31921" "url": "http://www.openwall.com/lists/oss-security/2008/10/15/5"
},
{
"name": "[oss-security] 20081127 Re: CVE request: jhead",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/11/26/4"
},
{
"name": "[oss-security] 20081016 Re: CVE request: jhead",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/10/16/3"
},
{
"name": "[oss-security] 20081015 Re: CVE request: jhead",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2008/10/15/6"
} }
] ]
} }

View File

@ -52,6 +52,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro",
"refsource": "MISC",
"url": "http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro"
},
{
"name": "4721",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4721"
},
{
"name": "32702",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32702"
},
{ {
"name": "20081208 DoS attacks on MIME-capable software via complex MIME emails", "name": "20081208 DoS attacks on MIME-capable software via complex MIME emails",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
@ -61,21 +76,6 @@
"name": "20081209 Re: DoS attacks on MIME-capable software via complex MIME emails", "name": "20081209 Re: DoS attacks on MIME-capable software via complex MIME emails",
"refsource": "BUGTRAQ", "refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/499045/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/499045/100/0/threaded"
},
{
"name" : "http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro",
"refsource" : "MISC",
"url" : "http://mime.recurity.com/cgi-bin/twiki/view/Main/AttackIntro"
},
{
"name" : "32702",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/32702"
},
{
"name" : "4721",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4721"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3194", "ID": "CVE-2013-3194",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,15 +57,15 @@
"refsource": "MS", "refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-059" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-059"
}, },
{
"name" : "TA13-225A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-225A"
},
{ {
"name": "oval:org.mitre.oval:def:18267", "name": "oval:org.mitre.oval:def:18267",
"refsource": "OVAL", "refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18267" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18267"
},
{
"name": "TA13-225A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA13-225A"
} }
] ]
} }

View File

@ -58,9 +58,9 @@
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000228.html" "url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000228.html"
}, },
{ {
"name" : "[rt-announce] 20130522 RT 4.0.13 released", "name": "93610",
"refsource" : "MLIST", "refsource": "OSVDB",
"url" : "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000227.html" "url": "http://www.osvdb.org/93610"
}, },
{ {
"name": "[rt-announce] 20130522 Security vulnerabilities in RT", "name": "[rt-announce] 20130522 Security vulnerabilities in RT",
@ -68,20 +68,20 @@
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000226.html" "url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000226.html"
}, },
{ {
"name" : "DSA-2670", "name": "[rt-announce] 20130522 RT 4.0.13 released",
"refsource" : "DEBIAN", "refsource": "MLIST",
"url" : "http://www.debian.org/security/2012/dsa-2670" "url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000227.html"
},
{
"name" : "93610",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/93610"
}, },
{ {
"name": "53505", "name": "53505",
"refsource": "SECUNIA", "refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53505" "url": "http://secunia.com/advisories/53505"
}, },
{
"name": "DSA-2670",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2670"
},
{ {
"name": "53522", "name": "53522",
"refsource": "SECUNIA", "refsource": "SECUNIA",

View File

@ -52,40 +52,40 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "20130402 NGS00248 Patch Notification: Virtual Access Monitor Multiple SQL Injection Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2013-04/0011.html"
},
{
"name" : "http://packetstormsecurity.com/files/121051/Virtual-Access-Monitor-SQL-Injection.html",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.com/files/121051/Virtual-Access-Monitor-SQL-Injection.html"
},
{ {
"name": "http://www.nccgroup.com/media/244196/patch_notificatio_virtual_access_monitor_multiple_sql_injection_vulnerabilities.pdf", "name": "http://www.nccgroup.com/media/244196/patch_notificatio_virtual_access_monitor_multiple_sql_injection_vulnerabilities.pdf",
"refsource": "MISC", "refsource": "MISC",
"url": "http://www.nccgroup.com/media/244196/patch_notificatio_virtual_access_monitor_multiple_sql_injection_vulnerabilities.pdf" "url": "http://www.nccgroup.com/media/244196/patch_notificatio_virtual_access_monitor_multiple_sql_injection_vulnerabilities.pdf"
}, },
{
"name": "20130402 NGS00248 Patch Notification: Virtual Access Monitor Multiple SQL Injection Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-04/0011.html"
},
{ {
"name": "58816", "name": "58816",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/58816" "url": "http://www.securityfocus.com/bid/58816"
}, },
{
"name": "http://packetstormsecurity.com/files/121051/Virtual-Access-Monitor-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/121051/Virtual-Access-Monitor-SQL-Injection.html"
},
{ {
"name": "91887", "name": "91887",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/91887" "url": "http://osvdb.org/91887"
}, },
{
"name" : "52801",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/52801"
},
{ {
"name": "virtualaccess-unspecified-sql-injection(83179)", "name": "virtualaccess-unspecified-sql-injection(83179)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83179" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83179"
},
{
"name": "52801",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52801"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4344", "ID": "CVE-2013-4344",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -52,50 +52,50 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "[oss-security] 20131002 Xen Security Advisory 65 (CVE-2013-4344) - qemu SCSI REPORT LUNS buffer overflow",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/10/02/2"
},
{
"name" : "[qemu-devel] 20131009 [ANNOUNCE] QEMU 1.6.1 Stable released",
"refsource" : "MLIST",
"url" : "http://article.gmane.org/gmane.comp.emulators.qemu/237191"
},
{
"name" : "RHSA-2013:1553",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1553.html"
},
{
"name" : "RHSA-2013:1754",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1754.html"
},
{
"name" : "openSUSE-SU-2014:1279",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html"
},
{ {
"name": "openSUSE-SU-2014:1281", "name": "openSUSE-SU-2014:1281",
"refsource": "SUSE", "refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html"
}, },
{
"name" : "USN-2092-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2092-1"
},
{ {
"name": "62773", "name": "62773",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/62773" "url": "http://www.securityfocus.com/bid/62773"
}, },
{
"name": "[qemu-devel] 20131009 [ANNOUNCE] QEMU 1.6.1 Stable released",
"refsource": "MLIST",
"url": "http://article.gmane.org/gmane.comp.emulators.qemu/237191"
},
{
"name": "openSUSE-SU-2014:1279",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html"
},
{
"name": "[oss-security] 20131002 Xen Security Advisory 65 (CVE-2013-4344) - qemu SCSI REPORT LUNS buffer overflow",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/10/02/2"
},
{ {
"name": "98028", "name": "98028",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/98028" "url": "http://osvdb.org/98028"
},
{
"name": "RHSA-2013:1754",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1754.html"
},
{
"name": "RHSA-2013:1553",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1553.html"
},
{
"name": "USN-2092-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2092-1"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4421", "ID": "CVE-2013-4421",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "[oss-security] 20131010 Re: CVE Request: dropbear sshd daemon 2013.59 release", "name": "55173",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://www.openwall.com/lists/oss-security/2013/10/11/4" "url": "http://secunia.com/advisories/55173"
}, },
{ {
"name": "https://matt.ucc.asn.au/dropbear/CHANGES", "name": "https://matt.ucc.asn.au/dropbear/CHANGES",
@ -67,26 +67,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://secure.ucc.asn.au/hg/dropbear/rev/0bf76f54de6f" "url": "https://secure.ucc.asn.au/hg/dropbear/rev/0bf76f54de6f"
}, },
{
"name" : "https://support.citrix.com/article/CTX216642",
"refsource" : "CONFIRM",
"url" : "https://support.citrix.com/article/CTX216642"
},
{ {
"name": "FEDORA-2013-18593", "name": "FEDORA-2013-18593",
"refsource": "FEDORA", "refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119323.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119323.html"
}, },
{
"name" : "FEDORA-2013-18606",
"refsource" : "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119300.html"
},
{
"name" : "openSUSE-SU-2013:1616",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-updates/2013-10/msg00061.html"
},
{ {
"name": "openSUSE-SU-2013:1696", "name": "openSUSE-SU-2013:1696",
"refsource": "SUSE", "refsource": "SUSE",
@ -98,9 +83,24 @@
"url": "http://www.securityfocus.com/bid/62958" "url": "http://www.securityfocus.com/bid/62958"
}, },
{ {
"name" : "55173", "name": "https://support.citrix.com/article/CTX216642",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/55173" "url": "https://support.citrix.com/article/CTX216642"
},
{
"name": "FEDORA-2013-18606",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119300.html"
},
{
"name": "openSUSE-SU-2013:1616",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-10/msg00061.html"
},
{
"name": "[oss-security] 20131010 Re: CVE Request: dropbear sshd daemon 2013.59 release",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/10/11/4"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-6395", "ID": "CVE-2013-6395",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
@ -57,25 +57,20 @@
"refsource": "MLIST", "refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2013/q4/346" "url": "http://seclists.org/oss-sec/2013/q4/346"
}, },
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507",
"refsource" : "MISC",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507"
},
{
"name" : "http://www.rusty-ice.de/advisory/advisory_2013002.txt",
"refsource" : "MISC",
"url" : "http://www.rusty-ice.de/advisory/advisory_2013002.txt"
},
{ {
"name": "https://github.com/ganglia/ganglia-web/issues/218", "name": "https://github.com/ganglia/ganglia-web/issues/218",
"refsource": "MISC", "refsource": "MISC",
"url": "https://github.com/ganglia/ganglia-web/issues/218" "url": "https://github.com/ganglia/ganglia-web/issues/218"
}, },
{ {
"name" : "100380", "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://osvdb.org/100380" "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507"
},
{
"name": "gangliaweb-cve20136395-xss(89272)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89272"
}, },
{ {
"name": "55854", "name": "55854",
@ -83,9 +78,14 @@
"url": "http://secunia.com/advisories/55854" "url": "http://secunia.com/advisories/55854"
}, },
{ {
"name" : "gangliaweb-cve20136395-xss(89272)", "name": "http://www.rusty-ice.de/advisory/advisory_2013002.txt",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/89272" "url": "http://www.rusty-ice.de/advisory/advisory_2013002.txt"
},
{
"name": "100380",
"refsource": "OSVDB",
"url": "http://osvdb.org/100380"
} }
] ]
} }

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6533", "ID": "CVE-2013-6533",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2013-6586", "ID": "CVE-2013-6586",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -53,34 +53,34 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "https://blog.rack911.com/security-advisories/hostbill-xss-admin-hijack-security-vulnerability-r911-0099", "name": "56124",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "https://blog.rack911.com/security-advisories/hostbill-xss-admin-hijack-security-vulnerability-r911-0099" "url": "http://secunia.com/advisories/56124"
}, },
{ {
"name": "http://extras.hostbillapp.com/security-advisory-hostbill-version-2013-12-14/", "name": "http://extras.hostbillapp.com/security-advisory-hostbill-version-2013-12-14/",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://extras.hostbillapp.com/security-advisory-hostbill-version-2013-12-14/" "url": "http://extras.hostbillapp.com/security-advisory-hostbill-version-2013-12-14/"
}, },
{
"name" : "http://hostbillapp.com/changelog",
"refsource" : "CONFIRM",
"url" : "http://hostbillapp.com/changelog"
},
{ {
"name": "101030", "name": "101030",
"refsource": "OSVDB", "refsource": "OSVDB",
"url": "http://osvdb.org/101030" "url": "http://osvdb.org/101030"
}, },
{
"name" : "56124",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56124"
},
{ {
"name": "hostbill-unspecified-xss(89750)", "name": "hostbill-unspecified-xss(89750)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89750" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89750"
},
{
"name": "http://hostbillapp.com/changelog",
"refsource": "CONFIRM",
"url": "http://hostbillapp.com/changelog"
},
{
"name": "https://blog.rack911.com/security-advisories/hostbill-xss-admin-hijack-security-vulnerability-r911-0099",
"refsource": "MISC",
"url": "https://blog.rack911.com/security-advisories/hostbill-xss-admin-hijack-security-vulnerability-r911-0099"
} }
] ]
} }

View File

@ -86,15 +86,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
}, },
{
"name" : "101332",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/101332"
},
{ {
"name": "1039592", "name": "1039592",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039592" "url": "http://www.securitytracker.com/id/1039592"
},
{
"name": "101332",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101332"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2018-01-02T00:00:00", "DATE_PUBLIC": "2018-01-02T00:00:00",
"ID": "CVE-2017-13184", "ID": "CVE-2017-13184",
"STATE": "PUBLIC" "STATE": "PUBLIC"
@ -61,15 +61,15 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2018-01-01" "url": "https://source.android.com/security/bulletin/2018-01-01"
}, },
{
"name" : "102414",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102414"
},
{ {
"name": "1040106", "name": "1040106",
"refsource": "SECTRACK", "refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040106" "url": "http://www.securitytracker.com/id/1040106"
},
{
"name": "102414",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102414"
} }
] ]
} }

View File

@ -52,6 +52,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name": "https://twitter.com/silascutler/status/938052460328968192",
"refsource": "MISC",
"url": "https://twitter.com/silascutler/status/938052460328968192"
},
{ {
"name": "20171212 Three exploits for Zivif Web Cameras (may impact others)", "name": "20171212 Three exploits for Zivif Web Cameras (may impact others)",
"refsource": "FULLDISC", "refsource": "FULLDISC",
@ -61,11 +66,6 @@
"name": "http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html", "name": "http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html",
"refsource": "MISC", "refsource": "MISC",
"url": "http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html" "url": "http://packetstormsecurity.com/files/145386/Zivif-PR115-204-P-RS-2.3.4.2103-Bypass-Command-Injection-Hardcoded-Password.html"
},
{
"name" : "https://twitter.com/silascutler/status/938052460328968192",
"refsource" : "MISC",
"url" : "https://twitter.com/silascutler/status/938052460328968192"
} }
] ]
} }

View File

@ -58,15 +58,35 @@
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f659a03a0ba9289b9aeb9b4470e6fb263d6f483" "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f659a03a0ba9289b9aeb9b4470e6fb263d6f483"
}, },
{ {
"name" : "https://github.com/torvalds/linux/commit/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483", "name": "USN-3582-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "https://github.com/torvalds/linux/commit/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483" "url": "https://usn.ubuntu.com/3582-1/"
}, },
{ {
"name": "https://source.android.com/security/bulletin/pixel/2018-04-01", "name": "https://source.android.com/security/bulletin/pixel/2018-04-01",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/pixel/2018-04-01" "url": "https://source.android.com/security/bulletin/pixel/2018-04-01"
}, },
{
"name": "https://github.com/torvalds/linux/commit/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483"
},
{
"name": "USN-3581-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3581-1/"
},
{
"name": "USN-3581-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3581-3/"
},
{
"name": "USN-3581-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3581-2/"
},
{ {
"name": "DSA-4073", "name": "DSA-4073",
"refsource": "DEBIAN", "refsource": "DEBIAN",
@ -77,26 +97,6 @@
"refsource": "REDHAT", "refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0502" "url": "https://access.redhat.com/errata/RHSA-2018:0502"
}, },
{
"name" : "USN-3581-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3581-1/"
},
{
"name" : "USN-3581-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3581-2/"
},
{
"name" : "USN-3581-3",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3581-3/"
},
{
"name" : "USN-3582-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3582-1/"
},
{ {
"name": "USN-3582-2", "name": "USN-3582-2",
"refsource": "UBUNTU", "refsource": "UBUNTU",

View File

@ -52,15 +52,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://docs.wixstatic.com/ugd/28ba71_6ecc3158975a484d827e935edda4fa17.pdf",
"refsource" : "MISC",
"url" : "https://docs.wixstatic.com/ugd/28ba71_6ecc3158975a484d827e935edda4fa17.pdf"
},
{ {
"name": "https://www.trustworks.at/publications", "name": "https://www.trustworks.at/publications",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.trustworks.at/publications" "url": "https://www.trustworks.at/publications"
},
{
"name": "https://docs.wixstatic.com/ugd/28ba71_6ecc3158975a484d827e935edda4fa17.pdf",
"refsource": "MISC",
"url": "https://docs.wixstatic.com/ugd/28ba71_6ecc3158975a484d827e935edda4fa17.pdf"
} }
] ]
} }

View File

@ -53,9 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"name" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=cfde94be1d4286bc47633c6e6eaf4e659bd78066", "name": "GLSA-201811-12",
"refsource" : "CONFIRM", "refsource": "GENTOO",
"url" : "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=cfde94be1d4286bc47633c6e6eaf4e659bd78066" "url": "https://security.gentoo.org/glsa/201811-12"
}, },
{ {
"name": "https://bugs.ghostscript.com/show_bug.cgi?id=697985", "name": "https://bugs.ghostscript.com/show_bug.cgi?id=697985",
@ -67,15 +67,15 @@
"refsource": "DEBIAN", "refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3986" "url": "http://www.debian.org/security/2017/dsa-3986"
}, },
{
"name" : "GLSA-201811-12",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201811-12"
},
{ {
"name": "99991", "name": "99991",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/99991" "url": "http://www.securityfocus.com/bid/99991"
},
{
"name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=cfde94be1d4286bc47633c6e6eaf4e659bd78066",
"refsource": "CONFIRM",
"url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=cfde94be1d4286bc47633c6e6eaf4e659bd78066"
} }
] ]
} }

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "security@qnapsecurity.com.tw", "ASSIGNER": "security@qnap.com",
"ID": "CVE-2018-0716", "ID": "CVE-2018-0716",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,12 +1,12 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2018-1208", "ID": "CVE-2018-1208",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT" "STATE": "REJECT"
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {

View File

@ -56,11 +56,6 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "45400",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45400/"
},
{ {
"name": "http://syncope.apache.org/security.html#CVE-2018-1322:_Information_disclosure_via_FIQL_and_ORDER_BY_sorting", "name": "http://syncope.apache.org/security.html#CVE-2018-1322:_Information_disclosure_via_FIQL_and_ORDER_BY_sorting",
"refsource": "MISC", "refsource": "MISC",
@ -70,6 +65,11 @@
"name": "103507", "name": "103507",
"refsource": "BID", "refsource": "BID",
"url": "http://www.securityfocus.com/bid/103507" "url": "http://www.securityfocus.com/bid/103507"
},
{
"name": "45400",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45400/"
} }
] ]
} }

View File

@ -100,15 +100,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10719841",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10719841"
},
{ {
"name": "ibm-dng-cve20181610-xss(143931)", "name": "ibm-dng-cve20181610-xss(143931)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/143931" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/143931"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=ibm10719841",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10719841"
} }
] ]
} }

View File

@ -76,15 +76,15 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"name" : "https://www.ibm.com/support/docview.wss?uid=ibm10737069",
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10737069"
},
{ {
"name": "ibm-guardium-cve20181817-xss(150021)", "name": "ibm-guardium-cve20181817-xss(150021)",
"refsource": "XF", "refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150021" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150021"
},
{
"name": "https://www.ibm.com/support/docview.wss?uid=ibm10737069",
"refsource": "CONFIRM",
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10737069"
} }
] ]
} }